Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


When should you apply SAP filters to Netware service
advertisement messages?

A. When services are not required for a particular area or
network

B. Only after service advertisement messages have flooded
the network

C. Before any type of router convergence takes place

D. When no change in network services has taken place for 40
minutes



When should you apply SAP filters to Netware service advertisement messages? A. When services ar..

Answer / guest

Answer: A

SAP filters conserve network bandwidth and are useful in
large Netware installations where hundreds of SAP services
exist. They should be used for services that are not
required for a particular area or network.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch

2 Answers  


difference between layer 3 switch and router

0 Answers   Aptron, Tech Mahindra,


What PPP frame initiates the network layer protocols to be used during a connection?

1 Answers  


What task do you complete to identify organizational objectives that will reflect your design? A. Business Objectives B. Scheduling requirements C. Vacation time D. Meetings

2 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch

1 Answers  


What device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD

1 Answers  


The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems

1 Answers  


Which two of the following describe ASN.1 (Abstract Syntax Notation One)? A. It is an abstract routing protocol that is not used very often. B. It is an OSI language for describing data types independent of particular computer structures and representation techniques. C. Consists of only one basic routing algorithm. D. Uses BER (Basic Encoding Rules).

1 Answers  


Which two LAN switching features apply to store-and-forward switches? A. CRC B. Frame length C. Source address D. Collision Windows

1 Answers  


What are two differences between 10BaseT and 100BaseT? A. Speed B. Frame format C. Addressing D. Network diameter

2 Answers  


Distance Vector and Link-State protocols converge more quickly if: A. there is router redundancy B. there is router redistribution C. the update interval is set to its maximum D. the whole routing table is sent to announce changes

1 Answers  


Categories