What are three ASN.1 (Abstract Syntax Notation One) data types?
A. data feeds
B. name
C. syntax
D. encoding
Answer / guest
Answer: B, C, and D
Three ASN.1 (Abstract Syntax Notation One) data types are
name, syntax, and encoding. The name serves as the object
ID, the syntax defines the data type of the object, and the
encoding describes how information associated with the
object is formatted.
| Is This Answer Correct ? | 2 Yes | 0 No |
What is the standard ethernet cabling specification? (not IEEE 802.3) A. STP B. Coax (thin) C. Coax (thick) D. UTP
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
Distance Vector and Link-State protocols converge more quickly if: A. there is router redundancy B. there is router redistribution C. the update interval is set to its maximum D. the whole routing table is sent to announce changes
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address
What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache
What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS