Which of the following does not specify an application
requirement that affects your network design?
A. The number of users
B. The peak hours that the applications are used
C. The types of applications used
D. Security risks
Answer / guest
Answer: D
Using the Application Job Aid, when characterizing the
customer?s applications, you would need the following
information: Name of Application, Type of Application,
Number of Users, and Number of Hosts and Servers. Even
though the peak hours that the applications are used isn?t a
category of the Job Aid, we feel that it is something you
would want to know when characterizing customer?s
applications. This leaves Security Risks which would fall
within another category of the design.
| Is This Answer Correct ? | 0 Yes | 0 No |
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
What layer of the OSI reference model does TCP reside in? A. Session B. Transport C. Network D. Data-Link
What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems
What category or categories does Client/Server fit into the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments
6. Which of these statements best describes VPLS ?
Match the following routing techniques with the correct descriptions: A. Static Routing 1. Mandatory configuration B. Dynamic Routing 2. No route updates 3. Can better tolerate failures 4. Sends update when topology changes 5. Path is determined by the router 7. Traffic is reduced
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter
You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address