A. Each B channel can transmit up to 64 kbps
B. The ISDN B channel carries voice or data
C. The ISDN D channel transmits control information.
D. The D channel transmission rate varies depending on the service used.
E. HDLC or PPP can be used to encapsulate D channel information.
您可能感興趣的試卷
你可能感興趣的試題
A.TE1
B.NT-2
C.TA
D.TE2
E.NT-1
A.NCP
B.HDLC
C.LAPB
D.LAPD
A. To ma a known IP address to a MAC address
B. To map a known DLCI to a MAC address
C. To ma a known MAC address to an IP address
D. To ma a known DLCI address to a IP address
E. To ma a known IP address to a SPID address
F. To ma a known SPID address to a MAC address
A. T1
B. Frame Relay
C. DSL
D. PPP
E. ISDN
F. IPX
A. IP address
B. encapsulation PPP
C. no shutdown
D. PPP authentication CHAP
E. Speed
F. None of the above
最新試題
Which of the following if addresses can be assigned to host devices?()
What feature of a networks switch allows an administrative to create separate broadcast domains?()
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
Which of the following describe router functions?()
Which of the following options lists the steps in PPP session establishment in the correct order?()
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
Which of the following correctly describe steps in the OSI data encapsulation process?()
Which connections allow the use of full-duplex Ethernet?()
Which statement describes the rule of split horizon?()