Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What network design is becoming common when there is a
central office with one or more remote locations?

A. ISDN PRI at the central location and ISDN BRI at the
remote locations.

B. Using core routers at all sites

C. Only using access routers

D. Using a full mesh network



What network design is becoming common when there is a central office with one or more remote locat..

Answer / guest

Answer: A

The network design that is becoming common when there is a
central office with one or more remote locations is ISDN PRI
at the central location and ISDN BRI at the remote locations.

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCDA Interview Questions

What layer of the OSI reference model does TCP reside in? A. Session B. Transport C. Network D. Data-Link

1 Answers  


Which address is updated at each hop in the path in path switching?

1 Answers  


Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25

1 Answers  


What AppleTalk protocol permits AppleTalk workstations to share files across a network?

1 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


Match the following routing protocols with their routing algorithm. A. OSPF 1. Distance Vector B. IGRP 2. Link-State C. RIP D. IS-IS E. NLSP F. RTMP G. AURP H. BGP

1 Answers  


How can change k-value in EIGRP configuration.

1 Answers  


Which Of the Statements best describes VPLS ?

1 Answers   Pari Networks,


The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems

1 Answers  


Which of the following are true regarding switched virtual circuits (SVCs) and permanent virtual circuits (PVCs)? Choose two. A. SVCs and PVCs can use the same circuit. B. PVCs are permanently established virtual circuits. C. SVCs and PVCs terminate the circuit when data transmission is complete. D. SVCs are virtual circuits that are dynamically established on demand and terminated when data transmission is complete.

1 Answers  


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


What happens to performance if the maximum MTU (Maximum Transmission Unit) size is used? A. Performance increases B. Performance decreases C. Performance stays the same D. Performance has nothing to do with the MTU

1 Answers  


Categories