When should you apply SAP filters to Netware service
advertisement messages?

A. When services are not required for a particular area or
network

B. Only after service advertisement messages have flooded
the network

C. Before any type of router convergence takes place

D. When no change in network services has taken place for 40
minutes



When should you apply SAP filters to Netware service advertisement messages? A. When services ar..

Answer / guest

Answer: A

SAP filters conserve network bandwidth and are useful in
large Netware installations where hundreds of SAP services
exist. They should be used for services that are not
required for a particular area or network.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding

1 Answers  


SNMP agents are: A. Management devices B. NMS (Network Management Stations) C. network devices such as routers, switches, or hubs D. PDUs

1 Answers  


With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False

1 Answers  


What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM

1 Answers  


Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks

1 Answers  






What protocol advertises Netware services to network clients? (Type acronym).

1 Answers  


You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling

1 Answers  


What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.

2 Answers  


When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100

1 Answers  


What AppleTalk protocol permits AppleTalk workstations to share files across a network?

1 Answers  


What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management

2 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


Categories