What would a TE2 device be used for in an ISDN connection?
A. as a connection from an NT1 device to an NT2 device
B. as a connection from a non-ISDN terminal through a TA to
the ISDN network
C. as a connection from four-wire subscriber wiring to the
conventional two-wire local loop
D. as a connection to the ISDN network through a four-wire,
twisted-pair digital link
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
A TE2 device would be used for an ISDN connection as a
non-ISDN terminal (such as a standard telephone) through a
TA to the ISDN network. A TE2 is not a connection from an
NT1 device to an NT2 device. A connection from four-wire
subscriber wiring to the conventional two-wire local loop
pertains to NT1 and NT2 devices. A connection to the ISDN
network through a four-wire, twisted-pair digital link
pertains to a TE1 device.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / kaliraj
connecting to ISDN through a four-wire,twisted-pair digital
link
Reason:
The TE2 is a device that does not understand ISDN
standards and uses a four-wire connection . The TE2 must
connect into a terminal adapter(TA) and then into an NT1
device to be converted to a two-wire network.
| Is This Answer Correct ? | 4 Yes | 0 No |
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
Which Of the Statements best describes VPLS ?
What are the four basic components of an AppleTalk network? A. Sockets B. Nodes C. Networks D. Areas E. Zones
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
Which two of the following describe ASN.1 (Abstract Syntax Notation One)? A. It is an abstract routing protocol that is not used very often. B. It is an OSI language for describing data types independent of particular computer structures and representation techniques. C. Consists of only one basic routing algorithm. D. Uses BER (Basic Encoding Rules).
Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0
Which of the following is not true in regards to route summarization? A. It increases the size of the routing table B. It increases the complexity of the network C. IP networks must be contiguous to be safely summarized D. Routing tables must have the capacity to support classless routing
What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON
What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed
How can change k-value in EIGRP configuration.
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter
difference between layer 3 switch and router
0 Answers Aptron, Tech Mahindra,