1 EPON MAC Protocol Communication established through a Virt

1.       EPON MAC Protocol Communication established through…………

a.

Virtual tunneling

b.

Non-virtual tunneling

c.

Both a and b

d.

None of the these


  

2.       Why should organizations want to manage logs?

a.

To be informed when something \"interesting\" happens involving a system, device, or application

b.

To be able to do something in response to a security event

c.

To keep a record of our responses to security events

d.

All of the above

  

3.       In an ADSL network, the splitter at the central office combines the plain old telephone service (POTS) voice signal and__________________________.

a.

the local loop signal

b.

the broadband signal

c.

the ATU-C signal

d.

none of the above

4.When the data arrives at the receiver exactly as sent, the following security requirement is achieved

a.

Confidentiality

b.

Integrity

c.

Authentication

d.

None of the above

5.A user communicating with a mobile station in a foreign network (outside its home network) should know

a.

Only Home of Address of the mobile station

b.

Only Care of Address of the mobile station

c.

Home of Address and Care of Address of the mobile station

d.

Care of Address of the mobile station and the address of the Foreign Agent

6.ATM technology is based on

a.

VP-VC

b.

Statistical Multiplexing

c.

Simultaneous real time & non-real time traffic

d.

All of the above

7.Wireless networks support:

a.

Only wired users

b.

Only mobile users

c.

Wired and mobile users and they can operate together

d.

Wired and mobile users but the y cannot operate together

8.Asymmetric bandwidth allocation for…

a.

2-way communication

b.

1-way communication

c.

both above

d.

none of the these

9.LANE stands for

a.

Local Access Network Emulation

b.

Logical Access Network Emulation

c.

Local Area Network Emulation

d.

Logical Area Network Emulation

10.Which basic tool is NOT included in MPLS OAM Management:

a.

LSP connectivity verification

b.

LSP ping

c.

LSP tracerout

d.

LSP netstat

11.Parameters of ADSL configuration management include:

a.

Noise margin

b.

Rate thresholds

c.

Vendor ID

d.

All of the above

12.What is the definition of MRTG?

a.

Tool for monitoring traffic load on network links

b.

Tool that reads the SNMP traffic counters on network routers

c.

Tool that provides a visual display of traffic load

d.

All of the above

13.Benefit(s) of using firewalls include:

a.

Reduces risks of access to hosts

b.

Controlled access

c.

Eliminates annoyance to the users

d.

All of the above

14.Public and Private UNI defines

a.

user interactions

b.

user interfaces

c.

user communications

d.

user correlations

15.MPLS Label is located between:

a.

layers 1 and 2 headers

b.

layers 2 and 3  headers

c.

layers 3 and 4  headers

d.

layers 4 and 5  header

a.

Virtual tunneling

b.

Non-virtual tunneling

c.

Both a and b

d.

None of the these

Solution

Happy New Year 2017.

(1) EPON is based on Ethernet standards.
And hence it uses Non - virtual tunelling.
Answer is (b).

(2) Logs are maintained by organizations for all of the options provided.
Answer is (d)

(3) Splitter combines Voice signal and Broadband signal.
Because the data and video signal from broadband network are converted
to an analog signal by ATU-C and multiplexed and demultiplexed.
This analog signal contains voice and broadband signal.
Answer is (b)

(4) Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle.
Data must not be changed in transit, and steps must be taken to ensure that data cannot be altered by unauthorized people.
Answer is (b)

1. EPON MAC Protocol Communication established through………… a. Virtual tunneling b. Non-virtual tunneling c. Both a and b d. None of the these 2. Why should orga
1. EPON MAC Protocol Communication established through………… a. Virtual tunneling b. Non-virtual tunneling c. Both a and b d. None of the these 2. Why should orga
1. EPON MAC Protocol Communication established through………… a. Virtual tunneling b. Non-virtual tunneling c. Both a and b d. None of the these 2. Why should orga
1. EPON MAC Protocol Communication established through………… a. Virtual tunneling b. Non-virtual tunneling c. Both a and b d. None of the these 2. Why should orga
1. EPON MAC Protocol Communication established through………… a. Virtual tunneling b. Non-virtual tunneling c. Both a and b d. None of the these 2. Why should orga

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site