How is data transmitted in a Token Ring network?
A. The node calls for a token, appends the data, modifies a
bit in the frame, then sends the token
B. The node waits for the token, gains possession of it,
appends the data, modifies a bit in the frame, then sends
the token
C. The node transmits the data whenever it wants to
D. The active monitor must first grant permission for the
node to transmit data. After it receives permission, it
sends the data
Answer / guest
Answer: B
Data is transmitted in a Token Ring network differently than
Ethernet nodes. The node must wait for the token, gains
possession of it, appends the data, modifies a bit in the
frame, then sends the token.
Is This Answer Correct ? | 6 Yes | 1 No |
6. Which of these statements best describes VPLS ?
What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network
how many default route can be configure on a router
Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0
Which address is updated at each hop in the path in path switching?
How can change k-value in EIGRP configuration.
In which category should Frame Relay be placed within the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments
With Centralized Routing, each node must determine and maintain its routing information independently? A. True B. False
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
What are metrics used with IGRP? A. Ticks B. Load C. Hops D. Delay
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances