Match the following services with the correct descriptions:
A. BRI 1. Provides two 64 Kbps B channels
B. PRI 2. Provides 23 or 30 B channels
3. Provides one 16 Kbps D channel
4. Provides one 64 Kbps D channel
5. Provides a total bit rate of 2.048 Mbps
in Europe and Australia
6. Provides a total bit rate of 144 Kbps
7. Provides a total bit rate of 1.544 Kbps
in North America and Japan
Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted
What would you include in your prototype design for this particular case study?
It is not necessary to build an entire network to prove your network design. A. True B. False
What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM
OSPF supports priority routing for which TCP/IP feature? A. PA B. TCP C. IP D. SNA
What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing