Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify 3 characteristics of ISDN?

A.) Transports voice and data

B.) Transports voice only

C.) Support both BRI and PRI

D.) Runs over existing phone lines

E.) Same as X.25



Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only ..

Answer / guest

Answer: A C D

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

The Cisco IOS is stored in: A.) ROM B.) CD C.) Flash D.) NVRAM

5 Answers  


Identify the command that displays the SAP table? A.) show ipx servers B.) display SAP table C.) display SAP's D.) show sap table

1 Answers  


why we assingn the wild card mask in the use of ospf and access list.

6 Answers   IBM,


Which of the following is a connectionless protocol at the Transport layer? A.) UDP B.) ARP C.) ICMP D.) RARP E.) IP F.) FTP

2 Answers  


What is HDLC?

0 Answers  


Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default

1 Answers  


How much hold down time of eigrep protocol?

0 Answers  


Hi I asking one thing that my company having cisco ip phone with connected to cisco poe switch.But sometime when my agent calling to customer on that time customer voice is break only few 2 to 3 sec.I have already checked my wan link by isp and also lan connection,but this problem is not sorted out so pls help me.

5 Answers   Infotech,


hello friends im murtaza frm indore... and my question is that im doing hardware engenering and networking and im intrested in make a good career in networking so can you suggest.. which institiue is good for me...plzzz replyy im waiting...

1 Answers  


Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17

6 Answers  


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

2 Answers  


Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25

1 Answers  


Categories