Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


The following are the four steps in establishing an X.25
virtual circuit. Place them in the correct order.

A. The PSE (Packet Switch Exchange) passes the packet to the
next remote DCE

B. The local DCE packet binder sends packet to the closest
PSE (Packet Switch Exchange)

C. The source DTE sends packet to the local DCE

D. The remote DCE examines the packet header of destination DTE



The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct..

Answer / guest

Answer: C, B, A, and D

The correct order of the four steps used in establishing an
X.25 virtual circuit are as follows:

1.)The source DTE sends packet to the local DCE

2.)The local DCE packet binder sends packet to the closest

PSE (Packet Switch Exchange)

3.)The PSE (Packet Switch Exchange) passes the packet to the

next remote DCE

4.)The remote DCE examines the packet header of destination

DTE

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCDA Interview Questions

Client traffic is being bridged trough LAN interfaces on two WLCs.Which roaming option will Keep them on the same IP Subnet ?

2 Answers   Pari Networks,


What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing

1 Answers   Cisco,


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON

1 Answers  


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


Match the following services with the correct descriptions: A. BRI 1. Provides two 64 Kbps B channels B. PRI 2. Provides 23 or 30 B channels 3. Provides one 16 Kbps D channel 4. Provides one 64 Kbps D channel 5. Provides a total bit rate of 2.048 Mbps in Europe and Australia 6. Provides a total bit rate of 144 Kbps 7. Provides a total bit rate of 1.544 Kbps in North America and Japan

1 Answers  


With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False

1 Answers  


What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed

1 Answers  


What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network

1 Answers  


When doing an RFP (Request for Purchase) for a customer, at what step do you reiterate your solution and the customer requirements? A. Design Requirements B. Design Solution C. Summary D. Appendices

1 Answers  


What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network address C. Protocol type, MAC, and network address D. MAC address

2 Answers  


What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices

1 Answers  


Categories