1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
horsena [70]
3 years ago
11

Two routers, R1 and R2, connect using an Ethernet over MPLS service The service provides point-to-point service between these tw

o routers only, as Layer 2 Ethernet service. Which of the following are most likely to be true about this WAN? (choose two)a) R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2.b) R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence.c) R1 will forward data link frames to R2 using an HDLC header/trailer.d) R1 will forward data link frames to R2 using an Ethernet header/trailer.
Computers and Technology
1 answer:
liberstina [14]3 years ago
5 0

Answer: b) R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence.

.d) R1 will forward data link frames to R2 using an Ethernet header/trailer.

Explanation:

Here we have to understand what is MLPS. MLPS is a protocol which identifies the shortest route for the transfer of messages between routers instead of the longest route.

Here we are given a WAN which is a wide area network. Using layer 2 Ethernet service the frames are transmitted across the routers within the WAN.

Option A is incorrect as as connecting the other end of the cable to the R2 would reduce the functionality of the WAN.  Option C is incorrect as HDLC header trailer has no effect.

Option B and D are correct as Ethernet header/ trailer has the same size every frame and to maintain the functionality of the WAN one end must be connected to point of presence(PoP).  

You might be interested in
Pls help I will give points
Brrunno [24]

Answer:

Desktop

Explanation:

3 0
3 years ago
________ returns the last character in a StringBuilder variable named strBuf? Select one: A. strBuf.charAt(strBuf.length() - 1)
Lunna [17]

Answer:

A

Explanation:

strBuf.charAt(strBuf.length() - 1)

4 0
3 years ago
The association between a UCS and a CS can be extended to include more stimuli (more stimuli related to the CS can elicit the CR
almond37 [142]

Answer:

The answer is Stimulus generalization

Explanation:

Stimulus generalization is an example of classical condition. Classical conditioning takes a stimulus that does not cause a particular response (neutral stimulus) and then pairs it repeatedly with an unconditioned stimulus that will cause an unconditioned response. In the case of Stimulus generalization, I will give an example of a subject presenting food to a dog once they ring a bell. Lets say that you have taught a dog to salivate every time it hears a bell ring. If you took another bell that has a similar sound and rang it, the dog would still salivate and come pick its food. This is a perfect example of Stimulus generalization. The dog has responded to a new stimulus as if it was the initial conditioned stimulus.

5 0
3 years ago
______ is the software that blocks a user from being able to access your computer.
antiseptic1488 [7]
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.
8 0
3 years ago
In an ha configuration, which two failure detection methods rely on icmp ping? (choose two.)
Hunter-Best [27]
I believe that the multiple questions attached to this question is 

a) Hello
b) Link groups
c) Path groups
d) Heartbeats

The Answer is B and C
The physical interfaces that are supposed to be monitored are connected into a link group and a firewall failure can be triggered when one or all physical interfaces in the group failPath Monitoring helps monitor the full path to mission critical IP addresses. By default, any one of the IP addresses becoming unreachable will end up causing the firewall to change the HA to tentative state
7 0
3 years ago
Other questions:
  • Which of the following is not a network connection LAN WAN SAN MAN
    6·1 answer
  • 6.67
    5·1 answer
  • Your motherboard supports dual channeling and you currently have two slots used in channel a on the board; each module holds 1 g
    15·1 answer
  • The first screen you see when you open word2016 what is called?​
    5·2 answers
  • Cuales Son las características de la máquina analítica de Carlos Babbage ?
    11·1 answer
  • A computer is defined by 4 specific criteri. Select all 4.*
    7·1 answer
  • how to make assignment on power point plz cntct me and help me all about power point and my assignment is prime ministers of pak
    13·1 answer
  • When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet
    9·1 answer
  • 2. Select the things you can do when working with rows in columns in a spreadsheet:
    5·1 answer
  • How does computer number system play a Vital role in a computer calculation. ​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!