Shared Flashcard Set

Details

Network+ prep test
Sample test for the Network+ exam
90
Computer Networking
Professional
06/24/2009

Additional Computer Networking Flashcards

 


 

Cards

Term

 Given the following output identify the utility used

name                                        type                  status

workstation1      <00>                 unique               registered

worstkation1      <20>                 unique               registered

 

mac  address  00-0C-F1-A3-6E-4B

 

A.ipconfig

B.netstat

C.ifconfig

D.nbtstat

 

 

Definition

 

 

 

 


D.nbtstat

 

Term

A client workstation can authenticate using username and password to which type of server?

 

A. DNS

B. DHCP

C. primary domain controller

D. WINS

Definition

 

 

 

 

C. primary domain controller

 

Term

 An ethernet Mac address consists off

 

 

A. 32-bit

B. 12 bits

C. 64 bit

D. 48 bits

 

Definition

 

 

 

 

D. 48 bits

Term

 Which of the following is the best function of an antivirus program

 

A. scans the computer using known virus file sizes

B. scans the computer using known virus signatures

C. scans the computer using known virus locations

D. scans the computer using known virus names

 

Definition

 

 

 

 

B. scans the computer using known virus signatures

 

Term

 A client is using a device that allows them to synchronize their wireless device to the computer. But the device must be within 3 feet (1m) inorder for the synchronization to complete, which of the following best describes the type of wireless being used?

 

A. infrared

B. Bluetooth

C. wireless

D. wired

 

 

Definition

 

 

 

 

A. infrared

Term

 A network administrator configures a token ring network or any physical star logical ring topology. Administrator connects the endnotes into a 100 base -- TX network hub. Users complain of not having network access. Which of the following devices should replace the hub.

 

A. router

B. MAU

C. bridge

D. 10BaseT hub

 

 

Definition

 

 

 

 

B. MAU

Term

 Which of the following OSI layers handles the routing of data across segments

 

A. session

B. datalink

C. transport

D. network

 

Definition

 

 

 

 

D. network

Term

 Which of the following IEEE standards has a maximum bandwidth of 54 Mbps operating at 5 GHz

 

A. 802.11

B. 802.11A.

C. 802.11B.

D. 802.11G.

 

 

Definition

 

 

 

 

B. 802.11A

Term

 Which of the following is the maximum length of a 10 base two cable?

 

A. 606 feet hundred (185 m)

B. 328 feet (100 m)

C. 225 feet (67m)

D. 500 feet hundred ( 52 m)

 

 

Definition

 

 

 

 

A. 606 feet hundred (185 m)

Term

 A network administrator wants to ensure that connections between two servers are split according to usage. Which of the following devices can be used to best accomplish this

 

A. bandwidth shaper

B. content switch

C. proxy server,

D. load balancer

 

 

Definition

 

 

 

 

D. load balancer

Term

 Configuring two network cards for failover in the event that one of the nics becomes deffective is know as.

 

A. full duplex mode

B. hardware teaming

C. data redundancy

D. constantly awake mode, -CAM

Definition

 

 

 

 

B. hardware teaming

Term

 A technician is informed that the mail server, 192.168.1.10 will be restarted in five minutes for maintenance Which of the following commands will best help the technician to determine. When the system comes back online in real time.

 

A. tracert -d 192.168.1.10

B. tracert 192.168.1.10

C. ping -T 192.168.1.10

D. ping -a 192.168.1.10

Definition

 

 

 

 

C. ping -T 192.168.1.10

Term

 Which type of connector would a cable have, if it were supplied with a splitter and a cable modem for Internet access

 

A. RJ-45

B. F - type

C. RJ 11

D. IEEE 1394

 

 

Definition

 

 

 

 

B. F - type

Term

 Which of the following would be the most secure method for granting access to a network device.

 

A. password on the VTY ports

B. username and password in an external encrypted database

C. one time password

D. local username and password

 

 

Definition

 

 

 

 

C. one time password

Term

 Which of the following cable standards has the highest effective range at a greater expense

 

A. 1000 base -- SX

B. 1000 base --LX

C. 1000 base -- CX

D. 1000 base -- T.

 

 

Definition

 

 

 

 

B. 1000 base --LX

Term

 Which of the following does an administrator need to be aware of when installing a wireless network in a building with multiple floors.

 

A. SS ID naming

B. encryption algorithm

C. channel overlap

D. frequency configuration

 

Definition

 

 

 

 

 

C. channel overlap

Term

 A user complains that they're unable to connect to a new server, but you can connect to all other servers on the network. The user can ping the static IP address of the server but can not connect by its NetBIOS name. Which of the following describes the situation

 

A. the client has an outdated LM host file

B. the server has an outdated LM host file

C. the client has an incorrect subnet mask

D. the server has an incorrect subnet mask

 

 

Definition

 

 

 

 

A. the client has an outdated LM host file

Term

 UNIX/linux system shares its file system with users from the remote location. Which of the following does it use to handle remote, local and remote printing services.

 

A. export, FS, command

B. the. NFS clients daemon,

C. LPR

D. LPD

 

 

Definition

 

 

 

 

 

D. LPD

Term

 A network administrator notices in the secure wireless office that many of the wireless client machines constantly loose network connectivity, the wired clients, never have downtime the administrator also notices that the wireless clients all lose network connectivity at the same time, but can all see each other. Which of the following should be done to solve this problem?

 

A., change the SS ID on all of the clients

B. check the WEP settings on the client

C. check the connection from the wap to the network

D. check the WAP settings to the wired clients

 

Definition

 

 

 

 

 

C. check the connection from the wap to the network

Term

 Which device is responsible for converting data to the proper network media.

 

A. Bluetooth

B. NIC

C. transceiver

D. switch

 

 

Definition

 

 

 

 

 

C. transceiver

Term

 As new workstations and servers have been added to a company's network. Network performance has decreased due to broadcast storms, which network device will help prevent broadcast storms?

 

A. repeater

B. firewall

C. switch

D. router

 

 

Definition

 

 

 

 

 

D. router

Term

 Modal distortion is a problem with which type of media?

 

A. fiber optic cable

B. coxial cable

C. UTP

D. STP

 

 

Definition

 

 

 

 

A. fiber optic cable

Term

 Which type of connector does a 10 base - F. network use?

 

A. MT -RJ

B. RJ-45

C. series -a

D. ST

Definition

 

 

 

 

 

D. ST

Term

 Which of the following would allow a network administrator to confirm maximum bandwidth being utilized

 

A. protocol analyzer

B. load testing

C. throughput tester

D. packets sniffer

 

 

Definition

 

 

 

 

C. throughput tester

Term

 Which of the following antenna types is omni directional

 

A. parabolic

B. Y. a G. I

C. vertical

D. dipole

 

Definition

 

 

 

 

C. vertical

Term

 Which of the following networks, has the least likelihood of collisions?

 

A. mesh

B. bus

C. ring

D. Star

 

 

Definition

 

 

 

 


A. mesh

Term

 Which of the following protocols allows e-mailed to be viewed while remaining on the e-mail server?

 

A. pop 3

B. IMAP4

C. SSL

D. SMTP

 

 

Definition

 

 

 

 

 

B. IMAP4

Term

 A remote office connected to a network has changed locations. The move required readdressing all network devices in the office. The remote server is working on the remote segment properly. However, corporate users cannot connect to the remote server by hostname, but can by IP address. Which utility should be used at the corporate side, to identify the cause of the problem?

 

A. NSlookup

B. tracert

C. net Stat

D. ARP

 

Definition

 

 

 

 

A. NSlookup

Term

 Which of the following protocols uses a flexible addressing system? That makes it easier to build large-scale heterogeneous networks?

 

A. TCP/IP

B. AppleTalk

C. NetBui

D. ICMP

 

 

 

Definition

 

 

 

 

A. TCP/IP

Term

 A user has set up filtering on an Internet router the local SMTP server has stopped sending or receiving messages from the Internet. Which of the following is the cause of the problem?

 

A. the DHCP server is down

B. the Internet router is blocking port 25

C. the Internet router is blocking port 110

D. proxy server is filtering mail requests

 

Definition

 

 

 

 

 

B. the Internet router is blocking port 25

Term

 Which of the following are the IEEE designations for the spanning tree protocol? Choose two

 

A 802.1X

B. 802.1 N

C. 802.1D

D. 802.1W

E 802.1P

 

 

Definition

 

 

 

 

                             C. 802.1D

                                 D. 802.1W

Term

 A client reports that the lights on the switch are blinking green and then Amber. Which of the following best explains the change in color of the LEDs?

 

A. the cable is loose

B. a crossover cable is plugged in

C. the port is unavailable

D. a collision is taking place

 

 

Definition

 

 

 

 

D. a collision is taking place

Term

 The user has connected a laptop to a small office home office router. The router connects to a cable modem the laptop is unabled to get an IP address. The user notices that the link status LED is not illuminated on the router or the laptop. Which of the following is the cause of the problem?

 

A. DHCP is not enabled on the router

B. there is a bad port on the cable modem

C. there is a wrong cable or cable type

D. a wrong IP address is configured on the router

 

 

Definition

 

 

 

 

C. there is a wrong cable or cable type

Term

 How can a system administrator verify that the backup is valid?

 

A. parallel backups

B. verify the archive bit

C. restore the backup

D. check the tape archive

 

 

Definition

 

 

 

 

C. restore the backup

Term

 Which of the following final actions are required after correcting a network problem? (pick 2)

 

A. test the result

B. print the DHCP log

C. notify the administrator

D. identify and record Mac address

E. Document solution and process

 

 

Definition

 

 

 

 

                                     A. test the result

                                     E. Document solution and process

Term

 Which of the following is the number of bits used for IP version 6

 

A. 64

B. 32

C. 128

D. 256

 

Definition

 

 

 

 

 

C. 128

Term

 In order to minimize the overhead involved with controlling a full packets. Which of the following protocols should be used?

 

A. UDP

B. IP

C. IPX

D. TCP

 

Definition

 

 

 

 

A. UDP

Term

 A user working on a Windows PC which is unable to access network resources on one of their UNIX servers. Which of the following is a reason for the issue?

 

A. AFS is not installed on the UNIX server

B. IIS is not installed on the UNIX server

C. Samba is not installed on the UNIX server

D. NDS is not installed on the server

 

 

Definition

 

 

 

 

C. Samba is not installed on the UNIX server

Term

 A user has a small network of four computers that they want to connect to a single cable modem, which of the following devices will allow the user to do this?

 

A. Four port switch

B. Four port wireless router

C. Four port WAP

D. Four port hub

 

 

Definition

 

 

 

 

B. Four port wireless router

Term

 An off-site user is attempting to print a report, the report appears to print fine on the spooler. But the job never reaches the printer locally. Which of the following is the most likely reason for this?

 

A. a local printer is not installed

B. the printer drivers need to be reinstalled

C. the job is printing at the default printer in the office

D. the connection speed is inadequate

 

Definition

 

 

 

 

A. a local printer is not installed

Term

 The remote user cannot access the secure Web server using the URL  HTTP://mine.minepage.info. The pages functional from other computers. The cause of the problem is user

 

A. does not have access to .info for domains

B. has not entered www.

C. has not entered https

D. has the wrong browser version

 

Definition

 

 

 

 

C. has not entered https

Term

 Users are complaining that they can access Internet web pages, but cannot access the internal company website. Which of the following is the most likely source of the problem?

 

A. the DNS address handed out by the DHCP server is not correct

B. the intranet DNS entry is not authoritative

C. the Intranet server is down

D. default gateway is incorrect

 

Definition

 

 

 

 

C. the Intranet server is down

Term

 By default, when configuring a firewall, which of the following ports should be open to send mail?

 

A. 25

B. 119

C. 443

D. 53

 

Definition

 

 

 

 

A. 25

Term

 Which of the following is used to simplify the process of setting up a network and the administration of the network?

 

A. DNS

B. conf

C. SNMP

D. wins

 

 

Definition

 

 

 

 

C. SNMP

Term

 Which of the following technologies allows for faster Internet browsing and also provides an extra level of filtering?

 

A. firewall

B. proxy server

C. Web server

D. router

 

 

Definition

 

 

 

 

B. proxy server

Term

 A workstation with a static IP address it can print and authenticate to a server. You cannot browse to www.CompTIA.org

Which of the following is the first item to troubleshoot?

 

A. check the physical connection

B. wins server settings

C. DNS server settings

D. user account on the server

 

Definition

 

 

 

 

C. DNS server settings

Term

 The IP v4 address 172.62.10.1belongs to which class.?

 

A. class a        

B. class b

C. class c

D. class d

 

Definition

 

 

 

 

B. class b

Term

 A network administrator adds a router to create a new subnet. Which of the following services requires configuration to accommodate net bios on the new network?

 

A. DHCP dynamic host configuration protocol

B. NNTP

C. WINS

D. NTP network Time protocol

 

Definition

 

 

 

 

C. WINS

Term

 Which of the following are classified as layer 2 devices?

 

A. hubs, switches and routers

B. switches bridges, hubs

C. switches, bridges and NICS

D. switches, bridges and routers

 

Definition

 

 

 

 

C. switches, bridges and NICS

Term

 A company wants to allow its merchants to access part of the company's network from their homes, which of the following best describes this type of network?

 

A. extra net

B. VLANs

C. Internet

D. intranet

 

 

Definition

 

 

 

 

A. extra net

Term

 The cat 6 cable running between switch A and switch B is currently 280 feet 85 m, the technician needs to move switch B. to a closet an additional hundred feet, 30 m away, which of the following will be needed in order for this connection to work?

 

A. WAP

B. repeater

C. nics

D. GBIC

 

 

Definition

 

 

 

 

 

B. repeater

Term

 Which command will produce the following output?

Interface: 192.168.50.43 --- 0x2

Internet Address         Physical Address        Type

192.168.50.1              00-18-f8-de-3c-fe          dynamic

 

 

 

a. IP config

b. If config

c. NSlookup

d. ARP

 

Definition

 

 

 

 

d. ARP

Term

 Which of the following devices found on the LAN can be used to intelligently forward packets based on destination network addresses?

 

A. bridge

B. router

C. switch

D. media converter

 

Definition

 

 

 

 

B. router

Term

 After creating a print queue object in the NetWare directory services tree. The system administrator creates the printer object. Users are unable to connect to the printer? Which of the following is a likely cause?

 

A. a profile object must be created for each user

B. container objects must be associated with printer objects

C. the printer queue must be associated with the printer object

D. the global bin script must be associated with the printer

 

 

Definition

 

 

 

 

B. container objects must be associated with printer objects

Term

 In a class C. subnet, a network ID may occupy a maximum of

 

A. 16 bits

B. 24 bits

C. 32 bits

D. 31 bits

 

 

Definition

 

 

 

 

B. 24 bits

Term

 Which of the following utilities will produce the results printed below.

 

Interface List

0x1 ------------------------------------------ MS TCP Loopback interface

0x2 ...00 0c f1 a3 6e 4b ...... Intel<R> PRO/100 VE Network Connection --Packet

=======================================================

=======================================================

Active Routes:

Network Destination        Netmask                  Gateway                  Interface             Metric

 0.0.0.0                           0.0.0.0.0                  192.168.50.1          192.168.50.43       20

127.0.0.0                       255.0.0.0                  127.0.0.1                127.0.0.1                 1

192.168.50.43               255.255.255.255      192.168.50.43        192.168.50.43       20

192.168.50.43               255.255.255.255      127.0.0.1                127.0.0.1               20

192.168.50.255      255.255.255.255 192.168.50.43   192.168 50.43 20

224.0.0.0              240.0.0.0            192.168.50.43   192.168.50.43  20

255.255.255.255   255.255.255.255 192.168.50.43  192.168.50.43      1

Defult Gateway:       192.168.50.1

====================================================

Persistent Routes:

None

C:\Documents and Settings\Administrator>

 

   A. tracert

B. ping

C. ARP

    D. netStat

 

 

Definition

 

 

 

 

D. netStat

Term

 Which of the following services uses port 123

 

A. FTP

B. Telnet

C. NTP

D. NNTP

 

Definition

 

 

 

 

C. NTP

Term

 When setting up interoperability between Macintosh systems and Windows systems, which of the following to call stacks could be used to transfer files? Pick 2

 

A. SNMP

B. AFP

C. NNTP

D. SMB

E. LDAP

 

Definition

 

 

 

 

B. AFP

 D. SMB

Term

 A company's network currently has three Microsoft Windows 2000 servers. A Novell NetWare 4.0 server is added, but none of the Microsoft Windows servers can access the Novell server. Which of the following must be done so that the Windows 2000 servers connect as a Novell NetWare server.

 

A. install netbui on the Windows 2000 servers

B. install NW link on the Windows 2000 servers

C. install netbui on the Novell NetWare 4.0 servers

D. install enemy on the NetWare 4.0 servers

 

Definition

 

 

 

 

B. install NW link on the Windows 2000 servers

Term

 Which of the following services are used on a Windows network operating system to manage a Web server

 

A. .net

B. XML

C. HTTP

D. IIS

 

Definition

 

 

 

 

D. IIS

Term

 Several win 98 clients are connected to a LAN. They can all ping each other. One of the computers cannot browse files or printer shares on the Windows-based network. Which command will be used in determining the problem?

 

A. tracert

B. nbtstat

C. netStat

D. ifconfig

 

Definition

 

 

 

 

B. nbtstat

Term

 Which OSI layer converts digital data to electronic signals to be put on a wire?

 

A. physical

B. Data Link

C. presentation

D. transport

 

Definition

 

 

 

 

B. Data Link

Term

 Which of the following best describes VLAN trunking?

 

A. VLAN applied to a router

B. VLAN applied to more than one switch

C. VLAN broadcasting domains

D. VLAN port isolation

 

Definition

 

 

 

 

A. VLAN applied to a router

Term

 Which protocol is the fastest file transfer protocol?

 

A. HTTP

B. FTP

C. TFTP

D. SFTP

 

Definition

 

 

 

 

C. TFTP

Term

 All of the following are valid WEP key lengths, except

 

A. 40 bits

B. 64-bit

C. 32 bit

D. 128 bit

 

Definition

 

 

 

 

C. 32 bit

Term

 Which protocol does a diskless workstation use to obtain a network address?

 

A. FTP

B. DNS

C. ARP

D. bootp

 

Definition

 

 

 

 

D. bootp

Term

 A technician is installing a basic router for a SoHo network.  After installing the router.  The PCs connected are not able to acquire an IP address.  Which of the following did the technician fail to configure correctly?

 

      A. NAT

      B. WINS

      C. DNS

      D. DHCP

Definition

 

 

 

 

D. DHCP

Term

 When attaching to a Windows network resource credentials are supplied through the use off

 

A. cookie

B. token

C. cache

D. keyfile

 

 

Definition

 

 

 

 

B. token

Term

 A company has a hybrid network composed of Mac and Windows servers accessed by Mac, Linux and Windows clients, a department would like to access the Macintosh printers using their Windows XP desktops. Which of the following should the administor do to allow the Windows XP clients to access the Macintosh printer?

 

A. install the NetBIOS protocol on the Mac server

B. the AppleTalk protocol must be installed on the Windows machine

C. install the TCP/IP on the Macintosh printer

D. install services for Macintosh gateway on Windows server

 

Definition

 

 

 

 

B. the AppleTalk protocol must be installed on the Windows machine

Term

 Which of the following protocols will allow a user to simulate being at their office computer from home?

 

A. slip

B. RDP

C. VPN

D. RAS

 

 

Definition

 

 

 

 

B. RDP

Term

 When would a technician use a Plenum rated cable?

 

A. where EMI may be an issue

B. when installing cable in ceilings

C. when installing cable in damp environments

D. when transmission speeds of more than 100 Mbps are required

 

Definition

 

 

 

 

B. when installing cable in ceilings

Term

 A company has just added a new conference room, an administrator has added six new data ports to this room. The administrator has verified that all the cabling is terminated and functioning correctly. Which of the following should the administor do next?

 

A. move some data across each port

B. check all of the cables with an OTDR

C. update the wiring diagrams

D. update the network baseline

 

 

Definition

 

 

 

 

C. update the wiring diagrams

Term

 A DHCP enabled computer on the network has been unplugged from the network for a week, in the meantime several other computers were added to the network. Upon plugging the computer back to the network the computer is unable to reach network resources. Which of the following is the most likely cause?

 

A. the DHCP pool limit has been reached

B. the DHCP scope needs to be redefined

C. the DHCP server needs to be restarted

D. the IP address lease has expired on the DHCP server

 

Definition

 

 

 

 

D. the IP address lease has expired on the DHCP server

Term

 Which of the following WAN connection types provide the most bandwidth?

 

A. X. 25

B. OC-- X.

C. T1

D. ISDN

 

Definition

 

 

 

 

B. OC-- X.

Term

 When one connection to a host fails in a full mesh network, which of the following is true?

 

A. all hosts can communicate

B. no hosts can communicate

C. half of the hosts will lose communication

D., only the two hosts between the failed connection will lose communication

 

 

Definition

 

 

 

 

A. all hosts can communicate

Term

 Which of the following cable types, allows for maximum cable run distance?

 

A. multi-mode fiber

B. cat 3

C. coaxial

D. single mode fiber

 

Definition

 

 

 

 

D. single mode fiber

Term

 Which of the following is the maximum cat3 length acceptable for a horizontal cross connect?

 

A. 125 m 410 feet

B. 256 m 840 feet

C. 100 m 328 feet

D. 328 m 1076 feet

 

Definition

 

 

 

 

C. 100 m 328 feet

Term

 A user can log onto all Internet sites properly except their bank site. The bank site page loads but will not function. The most likely cause of the problem

 

A. the DNS cannot result the bank domain name

B. you need to enable 128 encryption on their browser

C. they have chat disabled on the computer

D. netbeui does not work with financial institutions

 

Definition

 

 

 

 

B. you need to enable 128 encryption on their browser

Term

 All of the following IP addresses are routable except

 

A. 126.14.254.1.14

B. 192.10.20.1

C. 201.35.44.1

D. 172.16.16.1

 

Definition

 

 

 

 

D. 172.16.16.1

Term

 A user is unable to connect to a wireless network in a work meeting. All other users are able to connect. Which of the following is the cause?

 

A. the wireless card is having hardware failure

B. the wireless device is not broadcasting

C. the Mac address of the network are changed

D. there is some interference with the wireless signal

 

Definition

 

 

 

 

A. the wireless card is having hardware failure

Term

A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locally to other machines but cannot successfully reach the Internet. When the technician examines the IP address and the default gateway, they are both on the 192.168.1.0/24 network. Which of the following has occurred?

 

A. the computers Gateway is not routing to a public address

B. the computer is not using a private IP address

C. the computer is using an invalid ip address

D. the computer and the gateway are not on the same network

 

Definition

 

 

 

 

A. the computers Gateway is not routing to a public address

Term

 After installing a new switch and connecting redundant links to other switches. A LAN experiences, a broadcast storm causing severe throughput problem. Which of the following is a likely cause of the problem of the broadcast storm?

 

A. incorrect trunk encapsulation was applied

B. VLAN assignments on the new switch conflicted with existing VLAN assignments on the network

C. port aggregation was incorrectly configured

D. spanning tree protocol was not operational on the LAN

 

Definition

 

 

 

 

D. spanning tree protocol was not operational on the LAN

Term

 Which of the following protocols is used in a ping command?

 

A. TFTP.

B. SMTP

C. IGMP

D. ICMP

 

Definition

 

 

 

 

D. ICMP

Term

 Enabling Mac address filtering on a switch can be used to mitigate which of the following security threats?

 

A. worms

B. viruses

C. social engineering

D. rogue access points

 

Definition

 

 

 

 

D. rogue access points

Term

 Which of the following devices is used to connect a WAN to a LAN?

 

A. a basic router

B. a basic switch

C. a bridge

D. a repeater

 

Definition

 

 

 

 

A. a basic router

Term

 Which of the following connector types is used to terminate coaxial cable?

 

A. RJ-45

B. RJ 11

C. BNC.

D. BST

 

Definition

 

 

 

 

C. BNC.

Term

 Which of the following tools should be used to attach an RJ-45 connector to a cat five cable?

 

A. screwdriver

B. Punch down tool

C. crimping tool

D. SNIPS

 

Definition

 

 

 

 

C. crimping tool

Term

 A technician is asked to place a wireless Internet access in an open warehouse environment. After installing the equipment the technician noticed varied signal strength at different locations. Which of the following should the technician consider to improve the consistency of the signal strength?

 

A. change the antenna placement

B. broadcast the SSID

C. change encryption method

D. Enable traffic shaping

 

Definition

 

 

 

 

A. change the antenna placement

Term

 The administrator has just installed a VoIP system and noticed that during peak times that calls are being dropped. Which of the following would an administrator implement to alleviate the problem?

 

A. fault tolerance

B. QOS

C. SSL-VPN

D. load-balancing

 

Definition

 

 

 

 

B. QOS

Term

 Which of the following LAN technologies most commonly uses a point to multipoint connection?

 

A. OC 48

B. frame relay

C. ATM

D. E3

 

 

Definition

 

 

 

 

B. frame relay

Supporting users have an ad free experience!