A. X25
B. Frame Relay
C. ATM
D. ISDN
E. ATX
F. None of the above
您可能感興趣的試卷
你可能感興趣的試題
A. TK1(config-if)# encapsulation hdlc ansi
B. TK1(config-if)# encapsulation ppp
C. TK1(config-if)# encapsulation LAPD
D. TK1(config-if)# encapsulation frame-relay ietf
E. TK1(config)#encapsulation ppp
A. HDLC
B. NCP
C. PAP
D. LAPD
E. LAPB
F. None of the above
A. Encapsulates several different types of routing protocols.
B. Supports only IP.
C. Can be used over analog circuits.
D. Is proprietary to Cisco
E. Supports error correction.
A. Ethernet
B. PPP
C. Token Ring
D. HDLC
E. Frame Relay
F. POTS
A. ISDN
B. Frame Relay
C. ATM
D. FDDI
A. The destination is a host on another subnet, so the router will not forward the packet.
B. The destination is a host on the same subnet, so the router will forward the packet.
C. The destination is a broadcast address, so the router will not forward the packet.
D. The destination is a network address, so the router will forward the packet.
A. It ensures that data is retransmitted if an acknowledgment is not received.
B. It reassembles segments in the correct order on the destination device.
C. It provides a mechanism for the receiver to control the transmission speed.
D. It regulates the size of each datagram segment.
E. All of the above are functions of flow control
A. This command sets a gateway of last resort for the TK1 router.
B. The number 100 indicates the number of hops to the destination network.
C. The interface with IP address 192.168.8.2 is on the TK1 router.
D. The command creates a static route for all IP traffic with the source address 192.168.24.64.
E. Packets destined for host 192.168.24.124 will be sent to 192.168.8.2.
F. None of the above
A. Data, Frame, Packet, Segment, Bit
B. Data, Frame, Segment, Packet, Bit
C. Data, Packet, Frame, Segment, Bit
D. Data, Packet, Segment, Frame, Bit
E. Data, Segment, Frame, Packet, Bit
F. Data, Segment, Packet, Frame, Bit
A. Framing
B. De-encapsulation
C. Encapsulation
D. De-framing
E. None of the above
最新試題
Which characteristics are representative of a link-state routing protocol?()
A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()
Which of the following host addresses are member of networks that can be routed across the public Internet? ()
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
Which of the following correctly describe steps in the OSI data encapsulation process?()
A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which connections allow the use of full-duplex Ethernet?()