2
MIS 589 We ek 3 Quiz Solutions MIS 589 Networking Concepts and Applications Download 1. (TCO B Which of the following is true with respect to the data link layer? !. (TCO B o u are working to resol!e a pro"le# with co##unication to an office in your  "uilding$ %he Sr$ Network &ngineer asks you to go get a #ini'switch or repeater so that the source of the error can "e resol!ed$ What was the likely source of this error? 3. (TCO B %his error checking sche#e adds 8( )*( +,( or -+ "its to the #essage$ ". (TCO B %his type of trans#ission is typically used on a p oint'to'point full'duple. circuits$ 5. (TCO B o ur new position re/uires that you #aintain a %oken 0ing network that includes se!eral I1M #ainfra#es$ What type of access control would this network #ost likely use? #. (TCO B o u are working with a co'worker o !er the phone to con nect a router at your location in New o rk to their network in San 2rancisco$ After hours o f trou"leshooting the WAN  protocol configured on the routers you find that the root of the pro"le# is that he has a Cisco router and you ha!e a Nortel router$ Which WA N protocol are you #ost likely con figuring in this scenario? $. (TCO B 3333 is not a function of a data link protocol$ 8. (TCO B %he key to selecting the "est access control techni/ue is to 3333333$ 9. (TCO B In general( controlled approaches4 1%. (TCO B With contention4 Download

MIS 589 Week 3 Quiz Solutions

Embed Size (px)

Citation preview

Page 1: MIS 589 Week 3 Quiz Solutions

7/24/2019 MIS 589 Week 3 Quiz Solutions

http://slidepdf.com/reader/full/mis-589-week-3-quiz-solutions 1/1

MIS 589 Week 3 Quiz SolutionsMIS 589 Networking Concepts and Applications

Download

1. (TCO B Which of the following is true with respect to the data link layer?

!. (TCO B ou are working to resol!e a pro"le# with co##unication to an office in your

 "uilding$ %he Sr$ Network &ngineer asks you to go get a #ini'switch or repeater so that the

source of the error can "e resol!ed$ What was the likely source of this error?

3. (TCO B %his error checking sche#e adds 8( )*( +,( or -+ "its to the #essage$

". (TCO B %his type of trans#ission is typically used on a point'to'point full'duple. circuits$

5. (TCO B our new position re/uires that you #aintain a %oken 0ing network that includes

se!eral I1M #ainfra#es$ What type of access control would this network #ost likely use?#. (TCO B ou are working with a co'worker o!er the phone to connect a router at your

location in New ork to their network in San 2rancisco$ After hours of trou"leshooting the WAN

 protocol configured on the routers you find that the root of the pro"le# is that he has a Cisco

router and you ha!e a Nortel router$ Which WAN protocol are you #ost likely configuring in this

scenario?

$. (TCO B 3333 is not a function of a data link protocol$

8. (TCO B %he key to selecting the "est access control techni/ue is to 3333333$

9. (TCO B In general( controlled approaches4

1%. (TCO B With contention4

Download