OSPF supports priority routing for which TCP/IP feature?
A. PA
B. TCP
C. IP
D. SNA
How can I release the restriction of CISCO2811C/K9? 10M optical fiber, Speed limit of 125kb / s, made by last network administrator, how can I release the restriction? Please tell me the detail, thanks! Cisco configuration: CISCO2811C/K9 ! ! ! ! ! ! ! interface FastEthernet0/0 description WANpork ip address x.x.x.x 255.255.255.248 ip access-group 110 in no ip proxy-arp ip verify unicast reverse-path ip nat outside ip virtual-reassembly duplex auto speed auto ! interface FastEthernet0/1 description LANpork ip address 192.168.x.x 255.255.255.0 ip access-group 101 in no ip proxy-arp ip verify unicast reverse-path ip nat inside ip virtual-reassembly rate-limit output 1000000 1000000 1000000 conform-action transmit exceed-action drop duplex auto speed auto !
Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
Which of the following is not true in regards to route summarization? A. It increases the size of the routing table B. It increases the complexity of the network C. IP networks must be contiguous to be safely summarized D. Routing tables must have the capacity to support classless routing
What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones
What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems
6. Which of these statements best describes VPLS ?
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted
What device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD