How many DS0s are used in a T1?

A. 24
B. 30
C. 23
D. 31


Answer: A. 24

Computer Science & Information Technology

You might also like to view...

Which of the following tools should you use to scan Unix systems?

A) NetStat Live B) Active Ports C) SATAN D) Cerberus

Computer Science & Information Technology

Which of the following is true regarding localizing?

Computer Science & Information Technology

Mobile users are susceptible to hardware theft because the size and weight of their computers and devices make them easy to steal.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A user contacts a technician and states, "The network is down." After further investigation the user is unable to get to a file share on the LAN. Which of the following is the NEXT step the technician should take to help determine the root cause of the problem?

A. Have the user ping the default gateway. B. Unplug and then plug the network cable back in. C. Reboot the core router. D. Have the user run netstat

Computer Science & Information Technology