Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


It is not necessary to build an entire network to prove your
network design.

A. True

B. False



It is not necessary to build an entire network to prove your network design. A. True B. False..

Answer / guest

Answer: A

It is not necessary to build an entire network to prove your
network design. A prototype or pilot should be sufficient.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?

2 Answers   Pari Networks,


difference between layer 3 switch and router

0 Answers   Aptron, Tech Mahindra,


What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs

1 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25

1 Answers  


What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed

1 Answers  


How can I release the restriction of CISCO2811C/K9? 10M optical fiber, Speed limit of 125kb / s, made by last network administrator, how can I release the restriction? Please tell me the detail, thanks! Cisco configuration: CISCO2811C/K9 ! ! ! ! ! ! ! interface FastEthernet0/0 description WANpork ip address x.x.x.x 255.255.255.248 ip access-group 110 in no ip proxy-arp ip verify unicast reverse-path ip nat outside ip virtual-reassembly duplex auto speed auto ! interface FastEthernet0/1 description LANpork ip address 192.168.x.x 255.255.255.0 ip access-group 101 in no ip proxy-arp ip verify unicast reverse-path ip nat inside ip virtual-reassembly rate-limit output 1000000 1000000 1000000 conform-action transmit exceed-action drop duplex auto speed auto !

1 Answers  


Traffic Shaping does which one of the following? A. Eliminates bottlenecks by throttling back traffic volume at the source or outbound end B. Reduces the frame size so bandwidth is better utilized C. It increases source traffic to a configured bit rate D. Allows you to control hubs and repeaters

1 Answers  


What happens to performance if the maximum MTU (Maximum Transmission Unit) size is used? A. Performance increases B. Performance decreases C. Performance stays the same D. Performance has nothing to do with the MTU

1 Answers  


Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0

1 Answers  


What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network

1 Answers  


What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.

2 Answers  


Categories