What is the standard ethernet cabling specification? (not
IEEE 802.3)
A. STP
B. Coax (thin)
C. Coax (thick)
D. UTP
Answer / guest
Answer: C
Ethernet was created by Xerox in the 1970?s and IEEE 802.3
was developed in 1980. Standard ethernet cabling is 50 ohm
coax (thick) and IEEE 802.3 specifications include coax
(thick or thin), UTP, and Fiber Optic.
| Is This Answer Correct ? | 1 Yes | 1 No |
5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
how many switches can be cascaded
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
What PPP frame initiates the network layer protocols to be used during a connection?
Which of the following are true regarding switched virtual circuits (SVCs) and permanent virtual circuits (PVCs)? Choose two. A. SVCs and PVCs can use the same circuit. B. PVCs are permanently established virtual circuits. C. SVCs and PVCs terminate the circuit when data transmission is complete. D. SVCs are virtual circuits that are dynamically established on demand and terminated when data transmission is complete.
What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances
Match the following devices with the correct description. A. Switch 1. Operates at the physical layer and extends the cable as if it is a single cable. B. Router 2. Operates at the physical layer and connects all connections into one device or concentrator. C. Repeater 3. Operates at the network layer and can filter both hardware and network addresses. D. Hub 4. Works at the Data-Link layer and transmits a digital signal only to the specific port where the destination MAC address is located.
Regarding a full-mesh network and a partial-mesh network, what is the most accurate statement? A. Split Horizon will not work on a full-mesh network B. A full-mesh network is more expensive because more routers are used C. A partial-mesh network is less expensive because less virtual circuits are used D. Broadcasts are more plentiful on a partial-mesh network
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs