Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


A ISDN BRI circuit can be described as a which of the following?

A.) 3B channels

B.) 2-64Kbps B channels and 1-16Kbps D channel

C.) none of the above

D.) 2-64Kbps B channels and 1-16Kbps C channel



A ISDN BRI circuit can be described as a which of the following? A.) 3B channels B.) 2-64Kbps ..

Answer / guest

Answer: B

There are two types of ISDN Channels :

BRI (Basic Rate Interface) - is 2 64Kbps B channels for data
and one

16Kbps D channel for link management.

PRI (Primary Rate Interface) - is 23Kbps B channels and 1
64Kbps D channel.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM

1 Answers  


Can you explain the basic of encryption in VPN?

0 Answers   CCIE,


Name which protocols are link states?

0 Answers  


Identify 2 features of PPP CHAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) Less secure then PAP D.) Local router 'challenges' the remote router

1 Answers  


Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2

1 Answers  


can we measure how much a host exact bandwidth using by a network cable which is communicating over the network? options: 1- via Router 2- Switch, 3- other device... if yes.. then how ( with every option)

3 Answers  


What is the routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) TTL D.) Hop count

1 Answers  


Identify the 2 commands that will display the status and information about interface E0 only? A.) show interface ethernet E0 B.) show interface E0 C.) show E0 D.) show int E0 E.) show interface

1 Answers  


The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability

1 Answers  


Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking

2 Answers  


Based on the DR AND BDR discussion i want to put one question the question is what is the name of protocol which is responsible;e for DR and BDR selection

7 Answers   Patni,


When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 Answers   Wipro,


Categories