Match the following devices with the correct description.
A. Switch 1. Operates at the physical layer and
extends the cable as if it is a single
cable.
B. Router 2. Operates at the physical layer and
connects all connections into one
device or concentrator.
C. Repeater 3. Operates at the network layer and
can filter both hardware and network
addresses.
D. Hub 4. Works at the Data-Link layer and
transmits a digital signal only to the
specific port where the destination
MAC address is located.
What are two differences between 10BaseT and 100BaseT? A. Speed B. Frame format C. Addressing D. Network diameter
when ever we apply show flash comand on the router it givesthat informatin router#show flash syatem file directory: file length name/status 1 8121000 c2500-js-L.112-18.bin what does it nean plz help i have read it from book but not bale to understand i am looking towards u for the help
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
OSPF supports priority routing for which TCP/IP feature? A. PA B. TCP C. IP D. SNA
What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch
What layer of the OSI reference model does TCP reside in? A. Session B. Transport C. Network D. Data-Link
What AppleTalk protocol permits AppleTalk workstations to share files across a network?
difference between layer 3 switch and router
0 Answers Aptron, Tech Mahindra,
EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP
Which of the following is not true in regards to route summarization? A. It increases the size of the routing table B. It increases the complexity of the network C. IP networks must be contiguous to be safely summarized D. Routing tables must have the capacity to support classless routing
Which Of the Statements best describes VPLS ?
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data