_______ is the highest capacity wireline Internet access service.
Gigabit Ethernet |
||
Mobile Broadband |
||
T-3 |
||
DSL |
10 points
QUESTION 2
Tunnels are special bits at the beginning and end of each packet that encapsulate the message so that others cannot see what is being transmitted.
True
False
10 points
QUESTION 3
Service Level Agreements (SLAs) guarantee which of the following is true connections between offices on MPLS services: (There is more than one correct answer)
Class of Service options |
||
Service Uptime |
||
Low Latency for Voice and video |
||
Restoral time per failure |
10 points
QUESTION 4
The shape of a network is called its topology. This topology impacts:
How the network is physically deployed within the building. |
||
The cost, reliability and availability of the network. |
||
The top of the network. |
||
The cost, accessibility and reliability of the network. |
10 points
QUESTION 5
Class of Service (CoS) designations in MPLS are (There is more than one correct answer)
Used to label certain types of traffic. |
||
Used by MPLS to ensure that video and voice data transmissions are prioritized |
||
Used to differentiate between Metropolitan and Rural Service areas. |
||
Used to reward employees who go above and beyond in maintaining networks. |
10 points
QUESTION 6
________ is a signaling standard made up of a number of different protocols. It provides a uniform standard for connecting IP telephone systems and data networks.
Standard Initialization Protocol |
||
Session Initiation Protocol |
||
Sending Information Protocol |
||
Session Invitation Protocol |
10 points
QUESTION 7
Encryption is
Putting servers and routers in small closets to keep them safe. |
||
A type of Tunneling Protocol used to keep data safe. |
||
Not very reliable |
||
The use of a complex mathematical algorithm to reorder bits in order to keep information private. |
10 points
QUESTION 8
The following are common network topologies. There is more than one answer:
Mesh where every site is connected to every other site in the network. |
||
Core, Backhaul, Edge |
||
Point-to-Point, Multipoint, Square, Mesh |
||
Point-to-Point where two sites are connected together |
10 points
QUESTION 9
_________use address filtering and port restrictions to deny access to hackers and allow only designated users to access the network.
Edge Routers |
||
Door Locks |
||
VPNs |
||
Firewalls |
10 points
QUESTION 10
Packets are: (There is more than one correct answer)
How data is sent across the Internet. |
||
Only used in VoIP applications. |
||
Efficient for combining voice and data. |
||
Similar to envelopes in that they specify destination and sender. their are 2 question that have more then i answer its listed next the question |
1)Giga bit ethernet which is capacity of 1000 Mbps because T3 is 45 Mbps and Dsl is 100 To 300Mbps.
2) False ,tunnels are help at transmjssion from on network to another.
3) SLAs guarnted for class of service options and latency related issues.
4)option 4 cost,accesibility and reliability of network.
5)used to label certain type of traffics
6)session intiation protocol
7)The use of a complex mathematical algorithm to reorder bits in order to keep information private.
8)
Point-to-Point, Multipoint, Square, Mesh
Point-to-Point where two sites are connected together
9) fire walls
10)option 1 and option 4
Get Answers For Free
Most questions answered within 1 hours.