When should you apply SAP filters to Netware service
advertisement messages?
A. When services are not required for a particular area or
network
B. Only after service advertisement messages have flooded
the network
C. Before any type of router convergence takes place
D. When no change in network services has taken place for 40
minutes
Answer / guest
Answer: A
SAP filters conserve network bandwidth and are useful in
large Netware installations where hundreds of SAP services
exist. They should be used for services that are not
required for a particular area or network.
Is This Answer Correct ? | 0 Yes | 0 No |
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
SNMP agents are: A. Management devices B. NMS (Network Management Stations) C. network devices such as routers, switches, or hubs D. PDUs
With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False
What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
What protocol advertises Netware services to network clients? (Type acronym).
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.
When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100
What AppleTalk protocol permits AppleTalk workstations to share files across a network?
What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data