If bandwidth will increase what will happen?
No Answer is Posted For this Question
Be the First to Post Answer
What is the regional Telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
Identify 3 characteristics of IP RIP? A.) Distance vector B.) Administrative distance is 120 C.) Periodic updates every 60 seconds D.) Uses a composite metric E.) Can load balance
Why is vlan used?
Which ISDN protocol prefix specifies switching and signaling? A.) I B.) E C.) Q D.) S
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
In which layer switch is work?
Novell IPX network addresses have two conferrable parts. The network administrator specifies the IPX network number. How is the node number determined? A. It is the serial number of the given device B. It is assigned as a lease by Novell DHCP C. It is also set by the network administrator D. It is usually the MAC address of one Interface E. It is downloaded by Netware Core Protocol (NCP)
what are two security appliances that can be installed a network
Which statement about the data link connection identifier (DLCI) is true? A. It is a number that identifies a local virtual circuit in a Frame Relay network B. It is a signaling standard between the CIDE device and the Frame Relay switch C. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay Cloud D. It is the Maximum number of uncommitted bits that the Frame Relay switch will attempt to transfer beyond the Committed Information Rate (CIP)
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?
Which OSI layer handles physical address, network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network
Identify 2 features of X.25? A.) Supports only IP B.) Utilizes switched and permanent virtual circuits C.) Contains minimal flow control and error recovery D.) Utilizes LAPB as it's data-link protocol