Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


You may receive a case study including Token Ring and
Ethernet, so you may want to look at any constraints with
cabling between Token Ring and Ethernet networks.

Which statement describes the constraints imposed by the
existing network?

A. Replace all cabling

B. Test all cabling

C. Do not replace cabling

D. Use microwave instead of cabling



You may receive a case study including Token Ring and Ethernet, so you may want to look at any cons..

Answer / guest

B. Test all cabling

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCDA Interview Questions

SNMP agents are: A. Management devices B. NMS (Network Management Stations) C. network devices such as routers, switches, or hubs D. PDUs

1 Answers  


Match the following services with the correct descriptions: A. BRI 1. Provides two 64 Kbps B channels B. PRI 2. Provides 23 or 30 B channels 3. Provides one 16 Kbps D channel 4. Provides one 64 Kbps D channel 5. Provides a total bit rate of 2.048 Mbps in Europe and Australia 6. Provides a total bit rate of 144 Kbps 7. Provides a total bit rate of 1.544 Kbps in North America and Japan

1 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


Which two LAN switching features apply to store-and-forward switches? A. CRC B. Frame length C. Source address D. Collision Windows

1 Answers  


Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0

1 Answers  


Which of the following three protocols replace SDLC? A. 802.2 B. HDLC C. QLLC D. X.25

1 Answers  


EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP

7 Answers  


How can change k-value in EIGRP configuration.

1 Answers  


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems

1 Answers  


Which of the following are true regarding switched virtual circuits (SVCs) and permanent virtual circuits (PVCs)? Choose two. A. SVCs and PVCs can use the same circuit. B. PVCs are permanently established virtual circuits. C. SVCs and PVCs terminate the circuit when data transmission is complete. D. SVCs are virtual circuits that are dynamically established on demand and terminated when data transmission is complete.

1 Answers  


What happens to performance if the maximum MTU (Maximum Transmission Unit) size is used? A. Performance increases B. Performance decreases C. Performance stays the same D. Performance has nothing to do with the MTU

1 Answers  


Categories