lvi
Assessment Test
44.
C. The carrier transitions could be caused by the ring speed mismatch.
See Chapter 5 for more information.
45.
C. Connectionless protocols do not use any type of control. B is a type
of control. Physical connectivity does not determine the protocol
properties. For further information about connectionless protocols,
see Chapter 2.
46.
A. Several different analyses may be executed once the frames or pack-
ets have been captured to a buffer. A protocol distribution can be per-
formed, but it is a report or a specific type of analysis. An analyzer
cannot monitor your network efficiently. It can be used to get an idea
of real-time activity, but that is not its primary function. For addi-
tional information on protocol analyzers, see Chapter 3.
47.
B, C, D. These services all provide solutions to known problems. See
Chapter 12 for more information.
48.
A, C, D. These are all valid components of the Catalyst 5000 series
switches. You should be familiar with the role of each. See Chapter 11
for more information.
49.
A, C. In order to use the <network.node> address, you must specify
the IPX Ping. See Chapter 9 for more information about IPX trouble-
shooting.
50.
C. Blocking is a step or state in the spanning tree protocol that pre-
vents loops. See Chapter 11 for more information.
51.
B. Since data (payload) is going to be from point to point, the PPP link
must be set up between the local and remote TE on the B channel. See
Chapter 8 for more information.
52.
B, C, G. NetWare covers the top five layers of the OSI model and is
not isolated to Layer 3. The remaining protocols are all Layer 2. See
Chapter 2 for further information.
53.
C. Loopback tests can test for link integrity without any additional
protocols such as PPP, IP, or others. See Chapter 7 for more details.
Copyright ©2000 SYBEX , Inc., Alameda, CA
www.sybex.com