Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Question 1. Identify the merger of legacy-based TDM architecture with packet-switching

technology and call-control intelligence.

Telecommunication convergence

Analog convergence

Digital convergence

DSL and cable telecommunication convergence

Question 2.  Choose the mechanism(s) for sending RAS messages using RAS channel over UDP.

 

Retry counts

Timeout

Timeout and retry counts

Timeout, TTL, and retry counts

Question 3.  Construct a 1.536 Mbps T1 link. 

24 Channels

32 Channels

Fractional Channels

CAS

Question 4.  Identify how IP telephones access their media controllers. 

IP telephones access their media controllers through a hub.

IP telephones access their media controllers through a bridge.

IP telephones access their media controllers through a switched bridge.

IP telephones access their media controllers through a switched IP connection.

Question 5.  An MCU may control three different conference types; please identify them.

Centralized, decentralized, mobile

Mobile, centralized, decentralized

Centralized, mobile, decentralized

Centralized, decentralized, mixed

Question 6.  Identify the cause of packet delay. 

It is not the time it takes a packet to traverse the network.

It is the time it takes a packet to traverse a router.

It is the time it takes a packet to traverse the network.

It is the time it takes a packet to traverse a switch.

Question 7.  Which of the following characteristics are not common to circuit-switched networks? Store and forward transmission

Dedicated bandwidth

Potentially wasted bandwidth

Each packet follows the same route

Question 8.  Explain why G.711 is used in LANs. 

There is quite a bit of bandwidth in a LAN and it is not expensive.

There is not much bandwidth in a LAN and it is not expensive.

There is quite a bit of bandwidth in a LAN and it is expensive.

There is not much bandwidth in a LAN and it is expensive.

Question 9.  Select the codec that is most appropriate for limited bandwidth WANs. 

G.711

G.741

G.729

G.735

Question 10.  Describe the three main ways of powering an IP telephone. 

Local power, powered AC patch panels, inline power

Local AC power, powered patch panels, inline power

Local power, powered patch panels, online power

Local power, powered patch panels, inline power

1.  Select the IEEE standard that defines the application of power to IP telephones through the UTP

wiring. 

802.3af

802.11

802.13

802.4ab

Question 2.  Identify the IEEE specifications that will support QoS on WLAN. 

IEEE802.11e

IEEE802.11a

IEEE802.11b

IEEE802.11g

Question 3.  Identify a very weak encryption system that is sometimes used in wireless networks.

 

WAP

TKIP

WEP

AES

Question 4.  Identify the document that specifies the requirements for mobile node to use two IP addresses. 

RFC 2001

RFC 2003

RFC 2002

RFC 2004

Question 5.  What protocol is commonly used to allow integration between the softphone and the corporate directory? 

LDPD

LPAD

LAPD

LDAP

Question 6.  What do we call frames that are implemented with 802.1p? 

Switched frames

Tagged frames

LAN frames

Untagged frames

Question 7.  What is the maximum delay that is considered acceptable for voice traffic?

250 ms

300 ms

100 ms

150 ms

Question 8.  Identify the function of an SIP User Agent. 

An SIP User Agent places calls using IP address or e-mail-like addressing.

An SIP User Agent places calls using E.164 or IP address.

An SIP User Agent places calls using neither E.164 nor e-mail-like addressing.

An SIP User Agent places calls using E.164 or e-mail-like style.

Question 9.  SNMP uses the ______ protocol to the Transport Layer. 

TCP

UDP

MIB

RTP

Question 10.  TKIP provides a ______solution to the problems found in WEP. 

worse

add-on

interim

permanent

Question 1.  Explain five different common applications for unified messaging. 

Question 2.  Describe the purpose of a Multipoint Conferencing Unit (MCU). 

Question 3.  Describe jitter in a network. 

Question 4.  Explain the function of communications protocols. 

Question 5.  Explain the DiffServ objective.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91373981
  • Price:- $60

Guranteed 36 Hours Delivery, In Price:- $60

Have any Question?


Related Questions in Computer Network & Security

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Lab activity investigate system backup and restore

Lab Activity: Investigate System Backup and Restore Tools Purpose: Assess and Document Tools to Backup and Restore the System Hard Drive for a Windows 8.1 Workstation. - Assess and document the use of a system backup too ...

There are standards in network communication through which

There are standards in network communication through which data is transferred from one system to another. Discuss why these standards are important. Do you think it would be easier to purchase different equipment and so ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

1srin response to nmap -n -sn localhost what kind of

1. SR In response to "nmap -n -sn localhost": What kind of information did the nmap scan results show you, specifically? 2. FIB What does the "-sn" option do in nmap? ping scan -disable port scan 3. SR How does the "-sn" ...

Sip encodingwhy does the session initiation protocol sip

SIP, ENCODING Why does the session initiation protocol SIP allow the sender and receiver to choose two different multimedia encoding schemes? Describe a scenario where it makes sense to use different protocols for sender ...

Objectivespart 1 researching network attacks- research

Objectives Part 1: Researching Network Attacks - Research network attacks that have occurred. - Select a network attack and develop a report for presentation to the class. Part 2: Researching Network Security Audit Tools ...

Question a small company is assigned the class c network

Question : A small company is assigned the class C network 205.67.35.0. You need to divide this network to provide subnets for three departments using fixed-length subnetting. The departments are approximately the same s ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As