Which two LAN switching features apply to store-and-forward
switches?
A. CRC
B. Frame length
C. Source address
D. Collision Windows
Answer / guest
Answer: A and B
Store-and-forward switches copy the entire frame into its
onboard buffers and compute the CRC (cyclic redundancy
check). Since this type of switching copies the entire frame
and runs a CRC, latency time can vary depending on the frame
length.
| Is This Answer Correct ? | 3 Yes | 0 No |
How many networks will be advertised using route summarization within an OSPF network if you are given the following networks? 192.108.168.0 192.108.169.0 192.108.170.0 192.108.171.0 192.108.172.0 192.108.173.0 192.108.174.0 192.108.175.0 A. 1 B. 2 C. 3 D. 4 E. 5
Which Of the Statements best describes VPLS ?
What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch
Which of the following is not true in regards to route summarization? A. It increases the size of the routing table B. It increases the complexity of the network C. IP networks must be contiguous to be safely summarized D. Routing tables must have the capacity to support classless routing
Match the following services with the correct descriptions: A. BRI 1. Provides two 64 Kbps B channels B. PRI 2. Provides 23 or 30 B channels 3. Provides one 16 Kbps D channel 4. Provides one 64 Kbps D channel 5. Provides a total bit rate of 2.048 Mbps in Europe and Australia 6. Provides a total bit rate of 144 Kbps 7. Provides a total bit rate of 1.544 Kbps in North America and Japan
A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?
What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200
The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE