What would a TE2 device be used for in an ISDN connection?
A. as a connection from an NT1 device to an NT2 device
B. as a connection from a non-ISDN terminal through a TA to
the ISDN network
C. as a connection from four-wire subscriber wiring to the
conventional two-wire local loop
D. as a connection to the ISDN network through a four-wire,
twisted-pair digital link
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B
A TE2 device would be used for an ISDN connection as a
non-ISDN terminal (such as a standard telephone) through a
TA to the ISDN network. A TE2 is not a connection from an
NT1 device to an NT2 device. A connection from four-wire
subscriber wiring to the conventional two-wire local loop
pertains to NT1 and NT2 devices. A connection to the ISDN
network through a four-wire, twisted-pair digital link
pertains to a TE1 device.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / kaliraj
connecting to ISDN through a four-wire,twisted-pair digital
link
Reason:
The TE2 is a device that does not understand ISDN
standards and uses a four-wire connection . The TE2 must
connect into a terminal adapter(TA) and then into an NT1
device to be converted to a two-wire network.
| Is This Answer Correct ? | 4 Yes | 0 No |
A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?
What are the five areas of the ISO Network Management Model? A. Performance management B. Accounting management C. Flow management D. Configuration management E. Operating management F. Fault management G. Routing management H. Security management
Our company order a cisco ws-c3750x-48t-s(here i bought from http://www.3anetwork.com/cisco-ws-c3750x-48t-s-price_p104.html), As for the switch, in addition to the port module and optical module can be extended, what else module can also be extended?
You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling
What are three ASN.1 (Abstract Syntax Notation One) data types? A. data feeds B. name C. syntax D. encoding
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter
when ever we apply show flash comand on the router it givesthat informatin router#show flash syatem file directory: file length name/status 1 8121000 c2500-js-L.112-18.bin what does it nean plz help i have read it from book but not bale to understand i am looking towards u for the help
What category or categories does Client/Server fit into the following Job Aid? Name of Protocol Type of Protocol # of Users # of Hosts or Servers Comments
When would you suggest static routes to your customers? A. When scalability is important B. When bandwidth is limited C. When the network will be changing frequently D. Always suggest static routes
In an ATM network, which type of device is in a LAN per ELAN (Emulated LAN)? A. LAN Emulation Workstation B. LAN Emulation Router C. LAN Emulation Server D. LAN Emulation Bridge
Which router would you choose for your design? A. 1600 B. 1700 C. 3600 D. 3640 E. 7200