What type of address is analyzed by a Layer 2 switch?
A. network address
B. MAC and network address
C. Protocol type, MAC, and network address
D. MAC address
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Since a switch operates at Layer 2 and MAC addresses reside
at Layer 2, a MAC address is the type of address analyzed by
a Layer 2 switch. Network addresses are Layer 3.
Is This Answer Correct ? | 3 Yes | 0 No |
What would you include in your prototype design for this particular case study?
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON
When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted
Regarding a full-mesh network and a partial-mesh network, what is the most accurate statement? A. Split Horizon will not work on a full-mesh network B. A full-mesh network is more expensive because more routers are used C. A partial-mesh network is less expensive because less virtual circuits are used D. Broadcasts are more plentiful on a partial-mesh network
Match the following routing techniques with the correct descriptions: A. Static Routing 1. Mandatory configuration B. Dynamic Routing 2. No route updates 3. Can better tolerate failures 4. Sends update when topology changes 5. Path is determined by the router 7. Traffic is reduced
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?
When doing an RFP (Request for Purchase) for a customer, at what step do you reiterate your solution and the customer requirements? A. Design Requirements B. Design Solution C. Summary D. Appendices
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
Distance Vector and Link-State protocols converge more quickly if: A. there is router redundancy B. there is router redistribution C. the update interval is set to its maximum D. the whole routing table is sent to announce changes