how many switches can be cascaded
Answers were Sorted based on User's Feedback
Answer / pachicoo
It depends on a lot of things make, model, port density and
more. You would have to research to find each manufacturers
point of view, one example could be a 3750 from cisco which
I think is limited to nine switches when using the serial
uplink cables.
Is This Answer Correct ? | 1 Yes | 4 No |
Which tools help to characterize a network? A. Sniffer B. CiscoWorks 2000 C. Netsys D. All of the above
What PPP frame initiates the network layer protocols to be used during a connection?
In an ATM network, which type of device is in a LAN per ELAN (Emulated LAN)? A. LAN Emulation Workstation B. LAN Emulation Router C. LAN Emulation Server D. LAN Emulation Bridge
difference between layer 3 switch and router
0 Answers Aptron, Tech Mahindra,
What device initiates a session in an X.25 network? A. DTE B. DCE C. PSE D. PAD
What are two true statements regarding DDR (Dial-on-Demand Routing)? A. Allows a router to automatically initiate and end a circuit-switched session B. DDR cannot be configured because it is set with a default configuration C. Can configure it to be used during non-peak hours D. Can only be used with Cisco PIX
When are SNMP traps sent? A. When the SNMP manager wants to perform remote configuration on a networking device B. When an SNMP agent wants to inform the SNMP manager about a change of state on the networking device C. When the SNMP manager wants to access large chunks of data D. When the NMS wants to share trap information
6. Which of these statements best describes VPLS ?
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data
What layer of the OSI reference model does TCP reside in? A. Session B. Transport C. Network D. Data-Link