Description : In Frame Relay, when a _____ is selected, the correspondingtable entry is recorded for all switches by the administrator A) PVC B) SVC C) either (a) or (b) D) neither (a) nor (b)
Last Answer : PVC
Description : VCIs in Frame Relay arecalled ______. A) PVC B) SVC C) DLCIs D) none of the above
Last Answer : DLCIs
Description : Frame Relay provides ________. A) PVCs B) SVCs C) either (a) or (b) D) neither (a) nor (b)
Last Answer : Frame Relay
Description : - MAC is to Ethernet what ________ is to Frame Relay. A. DLCI B. LCI C. PVC D. None of the above
Last Answer : DLCI
Description : At the data link layer, Frame Relayusesa protocol that supports _____control. A) flow B) error C) either (a) or (b D) neither (a) nor (b)
Last Answer : neither (a) nor (b)
Description : A backbone is usually a ______. A) bus B) star C) either (a)or (b) D) neither (a) nor (b)
Last Answer : either (a)or (b)
Description : ______ isa standard developed by ITU-T. A) SONET B) SDH C) either (a) or (b) D) neither (a) nor (b)
Last Answer : either (a) or (b)
Description : ______ eliminates the varying delay times associated withdifferent-size packets. A) X.25 B) Frame Relay C) ATM D) all of theabove
Last Answer : ATM
Description : ______ is the cell relay protocol designed by the corresponding Forum and adopted by the ITU-T. A) X.25 B) Frame Relay C) ATM D) none of the above
Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)
Last Answer : PCF
Description : In IEEE 802.11, a BSS with an AP is sometimes referred toas ____________. A) an ad hocarchitecture B) an infrastructurenetwork C) either (a) or (b) D) neither (a) nor (b)
Last Answer : an infrastructurenetwork
Description : In IEEE 802.11, a BSS without an AP is called an _________. A) an ad hocarchitecture B) an infrastructurenetwork C) either (a) or (b) D) neither (a) nor (b)
Last Answer : an ad hocarchitecture
Description : ________ is actually a multiport repeater. It is normally usedto createconnections between stations in a physical star topology. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)
Last Answer : An activehub
Description : _______ ispart of the media; its location in the Internet model is below thephysical layer. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)
Last Answer : A passivehub
Description : In astar-topology Ethernet LAN, _______ is just a point where the signals coming from different stations collide; it is thecollision point. A) An activehub B) A passivehub C) either (a)or (b) D) neither (a) nor (b)
Description : _________is just aconnector. A) An activehub B) A passive hub C) either (a)or (b) D) neither (a)nor (b)
Last Answer : A passive hub
Description : Analog-to-analog conversionis needed if the available bandwidthis _______. A) low-pass B) band-pass C) either (a)or (b) D) neither (a) nor (b)
Last Answer : band-pass
Description : A(n)_________ signal is a composite analogsignal with an infinite bandwidth. A) digital B) analog C) either (a)or (b) D) neither (a) nor (b
Last Answer : digital
Description : Signals can be ________. A) analog B) digital C) either (a)or (b) D) neither (a) nor (b)
Description : A ring SONET network can be _________. A) unidirectional B) bidirectional. C) either (a) or (b) D) neither (a) nor (b)
Last Answer : bidirectional.
Description : A linear SONET network can be __________. A) point-to-point B) multipoint C) either (a) or (b) D) neither (a) nor (b)
Last Answer : point-to-point
Description : SDH hasdefined ahierarchy of signals called ________. A) STSs B) STMs C) either (a) or (b) D) neither (a) nor (b)
Last Answer : STSs
Description : isa standard developed by ANSI for fiber-opticnetworks. A) SONET B) SDH C) either (a) or (b) D) neither (a) nor (b)
Last Answer : SDH
Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b
Last Answer : B. -i
Description : . In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module is loaded the first time a call is made to the kernel that requires the module. A. "m" B. "Y" C. "n" D. "r"
Last Answer : A. "m"
Description : Frame Relay networks offer an optioncalled ______________that sends voice through the network. A) VOFR B) FRAD C) MUX D) none of the above
Last Answer : VOFR
Description : To handleframesarrivingfrom other protocols, Frame Relay uses adevice calleda _________. A) VOFR B) FRAD C) MUX D) none of the above
Last Answer : FRAD
Description : In Frame Relay, the EA field defines thenumber of bytes; it is _____ in the last byte of the address. A) 0 B) 1 C) 2 D) 3
Last Answer : 1
Description : In Frame Relay, an address can be________ bytes. A) only 2 B) 2 to 3 C) 2 to 4 D) none of the above
Last Answer : 2 to 4
Description : Frame Relay has_______. A) only the physical layer B) only thedata link C) the physical and data link layers D) the physical, data link, andnetwork layers
Last Answer : the physical and data link layers
Description : ________ is a virtual-circuit wide-area network that was designed in response to demands fora new type of WAN in thelate1980s and early 1990s. A) X.25 B) Frame Relay C) ATM D) none of the above
Description : Which protocols adopted the standards of HDLC (High Level Link Control) protocol? a. X.25 protocol as LAPB (Link Access Procedure Balanced, V.42 protocol as LAPM (Link Access Procedure for ... Services Digital Network) protocol as LAPD (Link Access Procedure on D channel) d. All the above
Last Answer : d. All the above
Description : Choose the Protocols working in the Data Link Control Layer of OSI model below. a. ATM (Asynchronous Transfer Mode), Frame Relay b. HDLC (High Level Data Link Control), SDLC (Synchronous Data Link Control) c. ARP (Address Resolution Protocol), IEEE802.3 d. All the above
Description : To avoid ambiguity, the names assigned to machines must be carefully selected from a ______ with complete control over the binding between the names and IP addresses A. Table B. look up table C. name space D. name table
Last Answer : C. name space
Description : A channel strategy that limits availability of products to a few carefully selected outlets in a given market area is called ______________ 1. Selective channel 2. Intensive channel 3. Both 1 & 2 4. Neither 1 nor 2 5. None of these
Last Answer : Selective channel
Description : In ________,a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frameis sentagain. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)
Last Answer : CSMA/CD
Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above
Last Answer : token passing: token
Description : Inslotted ALOHA, the vulnerable time is ______ the frame transmissiontime. A) the sameas B) two times C) three times D) none of the above
Last Answer : the sameas
Description : A data terminal serves as an a. Effector b. sensor c. both a and b d. neither a nor b
Last Answer : both a and b
Description : In__________, eachstation is forced to send only at the beginning of the time slot. A) pure ALOHA B) slotted ALOHA C) both (a) and (b) D) neither (a) nor (b)
Last Answer : slotted ALOHA
Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)
Last Answer : both (a) and (b)
Description : In___________ thereis alwaysa transition at the middle of the bit, but thebit values are determined at the beginningof the bit. If the nextbit is 0, there is a transition; if the next bit is 1, there is none. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Last Answer : differential Manchester
Description : In_______encoding, the duration of the bit is divided into twohalves. Thevoltage remains at one level during thefirst half and moves to the other level in the second half. The transition at the middle of the bit ... Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Description : The idea of RZ andthe ideaof NRZ-I are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Description : The idea of RZ andthe ideaof NRZ-L are combined into the ________ scheme. A) Manchester B) differential Manchester C) both (a) and (b) D) neither (a) nor (b)
Last Answer : Manchester
Description : In______, the changeor lackof change in the level of the voltagedetermines the value of the bit. A) NRZ-I B) NRZ-L C) both (a)and (b) D) neither (a) nor (b)
Last Answer : NRZ-I
Description : In_____, the level of the voltagedetermines the valueof the bit. A) NRZ-I B) NRZ-L C) both (a) and (b) D) neither (a) nor (b)
Last Answer : NRZ-L
Description : _________ does not provide reliable end to end communication. a. TCP b. UDP c. Both TCP and UDP d. Neither TCP nor UDP
Last Answer : b. UDP
Description : A ……………………….. is built from the information exchanged by routing protocols. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b
Last Answer : B. dynamic routing table
Description : . A ………………………... is constructed manually by the system administrator using the route command. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b
Last Answer : A. static routing table