Nokia NRS1 Practice Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

Given a network address of 192.168.100.0/24, what is the maximum number of subnets you can create if each subnet must support at least seven hosts? A. 16 B. 32 C. 4 D. 8

A. 16

Which of the following values for the Ethertype/length fields indicates an 802.3 frame (numbers are in decimal)? A. 64 B. 1540 C. 2048 D. 9000

A. 64

Which of the following is not a log stream type? A. Audit B. Change C. Main D. Security

A. Audit

What is the purpose of the ATM Adaptation Layer? A. It determines the amount of data in the cell. B. It maps data from upper-layer service classes to ATM cells. C. It adapts Ethernet frames to ATM cells. D. It wraps a header around the ATM cell.

B. It maps data from upper-layer service classes to ATM cells.

Which of the following is true about Layer 3 addressing? A. It is embedded in the device's firmware. B. It provides for a logical hierarchy. C. It allows for duplicate addresses on the Internet. D. Addresses are not required to be registered if they are used on the Internet.

B. It provides for a logical hierarchy.

Which of the following statements is false regarding the Alcatel-Lucent 7450 ESS series? A. It supports multiple chassis types. B. It supports OSFP, IS-IS, RIP, and BGP. C. It is used primarily for Ethernet aggregation. D. It can be managed via a console port or a dedicated Ethernet port on the SF/CPM.

B. It supports OSFP, IS-IS, RIP, and BGP.

Which of the following OSI layers is not paired with the correct implementation? A. Layer 7-Email B. Layer 3-TCP C. Layer 4-UDP D. Layer 2-PPP

B. Layer 3-TCP

When an Ethernet station wants to transmit information, the process it follows is ______. A. Just start transmitting. B. Listen for other stations transmitting; if none, then begin transmitting. C. Transmit whenever it receives the token. D. Issue a transmit request, and transmit when given authorization to do so.

B. Listen for other stations transmitting; if none, then begin transmitting.

Which of the following services would likely be offered by a content provider but not a service provider? A. Standard dial-up service B. Live video streaming from sports events C. Email service D. Basic Web Services

B. Live video streaming from sports events

The concept of allowing a single route entry to represent many network addresses is known as ______. A. CIDR B. Route aggregation C. VLSM D. classless addressing

B. Route aggregation

Which of the following is not a function of PPP? A. Provide support for multiple upper-layer protocols. B. Support the connection of multiple devices on a single link. C. Support authentication. D. Support data integrity via a CRC on frame contents.

B. Support the connection of multiple devices on a single link.

Which of the following technologies ensures that a unicast packet is visible only to the device with the specific destination address? A. Ethernet B. Switched Ethernet C. Satellite D. Wireless LAN

B. Switched Ethernet

Originally, the IP protocol functions were performed by A. Ethernet B. TCP C. NCP D. ALOHANET

B. TCP

Which of the following is not displayed with the use of the show filter command? A. The filter's default action B. The interfaces where the filter is applied C. The number of ingress and egress matches D. The entries in the filter

B. The interfaces where the filter is applied

Which of the following values is not stored in the bof.cfg? A. The location of the primary boot image B. The list of IOM cards in the chassis C. The persist value D. The location of the primary config file

B. The list of IOM cards in the chassis

Which of the following is true regarding ICMP destination unreachable messages? A. They are sent after failure to receive an Ethernet ACK. B. They are created by routers that cannot deliver an IP packet to its destination. C. They rely on the use of ICMP echo replies. D. They are originated by hosts that are about to reboot.

B. They are created by routers that cannot deliver an IP packet to its destination.

The method that LAGs use to provide load balancing is best described as: A. Aggregates all source/destination conversations into a single conversation equally across all links B. Uses the same physical link for each source/destination conversation C. Statistically balances conversations based on the source MAC address D. Distributes egress frames equally across all links in the bundle

B. Uses the same physical link for each source/destination conversation

Which of the following is the correct representation of mask 255.192.0.0? A. /8 B. /11 C. /10 D. /16

C. /10

Which of the following Ethernet standards is not matched correctly? A. 10 Mb Ethernet—Fiber or copper cable B. 100 Mb Ethernet—Fiber or copper cable C. 1 Gig Ethernet—Fiber cable only D. All of the above are correct.

C. 1 Gig Ethernet—Fiber cable only

What is the correct "all hosts" broadcast address for subnet 10.15.0.0/17? A. 10.15.255.255 B. 10.15.0.255 C. 10.15.127.255 D. 10.15.128.255

C. 10.15.127.255

Given network 175.100.0.0/16, if you create four subnets, how many addresses are available on each subnet? A. 16,384 B. 4,096 C. 16,382 D. 4,094

C. 16,382

Which of the following is not a private address? A. 172.18.20.4 B. 10.0.1.1 C. 200.1.1.254 D. 192.168.0.1

C. 200.1.1.254

An Ethernet MAC address consists of ______. A. A 4-byte number in four parts B. A 4-byte number in two parts C. A 6-byte number in two parts D. A 6-byte number in four parts

C. A 6-byte number in two parts

Which of the following IP filter entries would match packets from Network 11.1.1.0/24 to Host 5.1.1.1? A. match src-ip 11.1.1.0/24 B. match dst-ip 5.1.1.1/32 C. A and B together D. None of the above

C. A and B together

Which of the following is false about the DHCP process? A. The client broadcasts a discover message looking for DHCP servers. B. All DHCP servers will broadcast an offer message. C. A client will send a unicast accept message to the first DHCP server it receives a response from. D. All of the above statements are true.

C. A client will send a unicast accept message to the first DHCP server it receives a response from.

The advantage of using multicast packets instead of broadcast packets is ______. A. Broadcasts are received by every host. B. Multicast is newer technology. C. Broadcasts are processed by every host. D. Multicast provides multiple addresses for flexibility.

C. Broadcasts are processed by every host.

Which of the following is not a data link layer (OSI Layer 2) protocol? A. Ethernet B. ATM C. Cell-Relay D. PPP

C. Cell-Relay

Given the address 10.1.1.0/24, the most correct description of 10.1.1.0 is ______. A. host 0 on the 10.1.1.0 subnet B. network 10.1.1.0 C. illegal because 10.0.0.0 is a Class A D. subnet 10.1.1.0

D. subnet 10.1.1.0

The primary organization behind the development of the original Internet was A. IBM B. Digital Equipment Corporation (DEC) C. Stanford University D. the U.S. Department of Defense

D. the U.S Department of Defense

A PPP frame has several fields that are not used, like addressing. Why do these fields exist in the frame? A. They are reserved for future use. B. They are legacy fields from older versions of PPP headers. C. PPP is based on the HDLC frame format. D. PPP can be adapted for use on multi-point networks and might need the fields.

C. PPP is based on the HDLC frame format.

During the boot process, an Alcatel-Lucent 7750 SR/7450 ESS checks to see if persistence is enabled. What is the purpose of persistence? A. To ensure that the system saves routing table information when it reboots B. To ensure that changes to the bof.cfg are saved C. To ensure synchronization with the 5620 SAM D. To ensure that config changes are stored in the config.cfg

C. To ensure synchronization with the 5620 SAM

The technology that allows multiple customers with the same VLANs to use the same provider backbone for their Ethernet traffic is known as ______. A. VLAN trunking B. VLAN tunneling C. VLAN stacking D. IEEE 802.1p

C. VLAN stacking

Which of the following is false regarding the logging mechanisms in the Alcatel- Lucent 7750 SR/7450 ESS? A. Log IDs 99 and 100 are reserved for system usage. B. You must configure at least one input stream for a log ID. C. You must configure a filter for each log ID. D. You must configure the destination for the events from the log ID.

C. You must configure a filter for each log ID.

What file contains the system bootstrap image? A. boot.cfg B. image.ldr C. boot.ldr D. bof.cfg

C. boot.ldr

Which of the following is not allowed? A. subnet 10.0.0.0/16 B. subnet 10.255.0.0/16 C. subnet 10.10.10.0/16 D. host 10.10.10.0/32

C. subnet 10.10.10.0/16

Given network 176.200.0.0/16 and a subnet that supports 4,387 hosts, what is the most likely mask for the subnet? A. /20 B. /17 C. /21 D. /19

D. /19

Which of the following is a valid host IP address? A. 192.168.300.4 B. 255.70.1.1 C. 224.0.0.1 D. 10.254.1.1

D. 10.254.1.1

If your network address is 10.1.0.0/16 and you have subnetworks that all support at least 300 hosts, how many subnets do you have? A. 255 B. 64 C. 100 D. 128

D. 128

What are the two main types of Ethernet frames? A. Thinnet and Thicknet B. 10baseT and 100baseT C. DIX Ethernet and Ethernet II D. 802.3 and Ethernet II

D. 802.3 and Ethernet II

The advantage of using VLANs is ______. A. They can increase the security of your network. B. They can interconnect multiple broadcast domains. C. They can limit the amount of broadcast traffic between groups of devices. D. A and C but not B

D. A and C but not B

A company that has locations throughout the country can obtain service at each locations from a Tier 1, Tier 2, or Tier 3 provider. What is one reason a company might choose to connect all locations to a Tier 1 provider despite the higher costs involved? A. Sites at different tiers cannot communicate B. Tier 3 providers don't use TCP/IP C. Only Tier 1 providers provide content D. A single provider could offer SLAs to each location

D. A single provider could offer SLAs to each location

Which of the following ATM AAL types is associated with an incorrect description? A. AAL3/4—Connection-oriented service B. AAL5—Connectionless service C. AAL2—Variable bit rate traffic D. AAL1—High bit rate traffic

D. AAL1—High bit rate traffic

When a frame with an unknown destination MAC address enters a switch, the switch will forward it out which ports? A. None B. All C. All unicast ports D. All except the port that received the frame

D. All except the port that received the frame

Which of the following is not usually involved in the ARP process when a host needs to send an IP packet to another host not on its own IP subnet? A. The host needs to determine based on its mask that the destination host is not on its local subnet. B. The host will issue an ARP request for the MAC address of its default gateway if it is not in its ARP cache. C. The default gateway will determine if it needs to issue an ARP request for the destination host. D. The default gateway will issue an ARP request for the MAC address of the originating host.

D. The default gateway will issue an ARP request for the MAC address of the originating host.

What happens when two or more Ethernet stations attempt to transmit at the same time? A. This is impossible on half-duplex. B. The signal results in a collision, the stations stop, and the stations all wait the same amount of time to retransmit. C. The signal results in a collision, and the stations retransmit based on a configured priority. D. The signal results in a collision, and the stations stop and retransmit after waiting a random amount of time.

D. The signal results in a collision, and the stations stop and retransmit after waiting a random amount of time.

Which of the following statements about transport layer protocols is false? A. Most Internet applications use a transport layer protocol. B. Transport layer protocols can provide both reliable and unreliable services. C. Transport layer protocols provide end-to-end services for applications. D. Transport layer protocols require additional software be added to your operating system.

D. Transport layer protocols require additional software be added to your operating system.

Which of the following descriptions is correct? A. bof.cfg—7750/7450 configuration file B. cpm.tim—IOM image file C. config.cfg—Back-up configuration file D. boot.ldr—Bootstrap image file

D. boot.ldr—Bootstrap image file

Which of the following is not a characteristic of the UDP protocol? A. Reliable data transfer B. Connectionless operation C. No flow control D. Appropriate for real-time traffic

A. Reliable data transfer

The mechanism that STP uses to prevent loops in an Ethernet switched network is ______. A. STP elects a root and selectively blocks higher cost paths to the root from each bridge. B. STP blocks ports on all bridges that are not the root bridge. C. STP proactively changes all paths to the root bridge so that they are equal cost. D. STP uses BPDUs to set up a virtual path between each source and destination pair.

A. STP elects a root and selectively blocks higher cost paths to the root from each bridge.

The ping application relies on two common ICMP message types. Which answer is not one of these types? A. The echo receive ICMP type. B. The echo request ICMP type. C. The echo reply ICMP type. D. None of the above are ICMP message types used by ping.

A. The echo receive ICMP type.

Given network 135.100.0.0/16, you need nine subnets, and of these nine, one subnet needs to be split into 13 additional subnets. Choose the most likely masks you would create for this. A. /20 for the first eight subnets, /23 for the remaining 13 B. /20 for the first eight subnets, /24 for the remaining 13 C. /24 for all subnets D. /19 for the first eight subnets, /24 for the remaining 13

B. /20 for the first eight subnets, /24 for the remaining 13

An IP address has a first octet represented in binary as 11000001; the equivalent in decimal is ______. A. 190 B. 193 C. 192 D. 11,000,001

B. 193

A network with a /30 mask allows you to have how many usable host addresses? A. 4 B. 2 C. 6 D. 0

B. 2

How many subnets can be created from network 10.0.0.0/8 if each subnet must support at least 31 hosts? A. 2^16 B. 2^18 C. 2^19 D. 2^24

B. 2^18

The original network that ultimately became the Internet was called A. NSFNET B. ARPANET C. DoDnet D. DARPA

B. ARPANET

ATM uses 53-byte cells, which is quite a bit smaller than the maximum Ethernet frame. What is the purpose of having such a small cell size? A. To support latency-sensitive applications like voice traffic B. To provide less overhead on ATM switches C. To support the use of multiple classes of service D. To provide the ability to do switching in hardware

A. To support latency-sensitive applications like voice traffic

Which of the following correctly lists the order in which files are read by the Alcatel-Lucent 7750 SR/7450 ESS upon bootup? A. boot.ldr, bof.cfg, system image, config.cfg B. system image, boot.ldr, config.cfg, bof.cfg C. boot.ldr, system image, bof.cfg, config.cfg D. boot.ldr, bof.cfg, config.cfg, system image

A. boot.ldr, bof.cfg, system image, config.cfg

Which of the following was not a primary design concern during the development of the original Internet? A. Reliability B. Bandwidth C. Interoperability D. Support for diverse network media

B. Bandwidth

ISPs connect to each other at well-defined network locations to exchange information. These connections points are known as A. ISPs B. IXPs C. BGPs D. POPs

B. IXPs

Which of the following statements regarding NAT is false? A. NAT is used for many-to-one translations. B. NAT is intended to alleviate the need for every home user device to have a public IP address. C. NAT typically makes use of private IP addressing. D. A NAT router maintains a translation database to perform the address conversions.

A. NAT is used for many-to-one translations.

Which of the following is not a characteristic of the TCP protocol? A. Reliable data transfer B. Connectionless operation C. Flow control supported D. Full-duplex operation

B. Connectionless operation

The process by which a home user's router requests and receives a public IP address from its service provider is known as ______. A. ARP B. DHCP C. ICMP D. OSPF

B. DHCP

The original Thicknet standard had a maximum cable length as well as a minimum distance for stations to tap into the cable. Based on the description of CSMA/CD, what is the most likely reason for these distance requirements? A. A signal might be too weak to travel farther than the maximum distance. B. Every station on the wire had to be able to "detect" a collision in order to function properly. C. Too many taps in the cable would weaken the wire. D. Thicknet cable came in fixed lengths.

B. Every station on the wire had to be able to "detect" a collision in order to function properly.

When an HTTP packet needs to be forwarded over the Internet, which of the following accurately describes the order of the headers as they would be placed in front of each other in the packet (assume the originating device is on an Ethernet network)? A. HTTP, IP, TCP, Ethernet B. HTTP, TCP, IP, Ethernet C. HTTP, UDP, IP, Ethernet D. HTTP, IP, Ethernet

B. HTTP, TCP, IP, Ethernet

Which of the following statements is false? A. R outers provide broadcast domain separation. B. Hubs provide collision domain separation. C. VLANs provide broadcast domain separation. D. Switches provide collision domain separation.

B. Hubs provide collision domain separation.

Which of the following is not a reason that subnetting is superior to class-based addressing? A. It reduces the Internet routing table size. B. You can identify the host portion of the address without the need for a mask. C. It creates greater internal address flexibility. D. It allows for more efficient use of address space.

B. You can identify the host portion of the address without the need for a mask.

What command would you use to display the configuration of your Alcatel-Lucent 7750 SR/7450 ESS? A. show config B. admin display-config C. display config D. show admin config

B. admin display-config

The SF/CPM card has its own Ethernet interface for out-of-band management. This interface has its own IP address and default route. Where is this information stored? A. boot.ldf B. bof.cfg C. config.cfg D. cpm.tim

B. bof.cfg

Which of the following is not a valid IP filter command? A. ip-filter 10 create B. default-action discard C. entry 1 create D. match dst-ip 10.5.1.0/24

B. default-action discard

You are creating a filter to permit packets to destination IP address 192.168.1.1/32. You want all other packets to be dropped. Which of the following commands is not required to support this policy? A. ip-filter 1 create B. default-action drop C. entry 1 create D. match dst-ip 192.168.1.1/32

B. default-action drop

Which of the following commands is not correctly described? A. shutdown—This command is used to disable an interface or protocol. B. exit all—Logs out of the Alcatel-Lucent 7750 SR/7450 ESS device. C. ?—Lists all commands in the current context. D. [TAB]—This command is used for assistance with command completion.

B. exit all—Logs out of the Alcatel-Lucent 7750 SR/7450 ESS device.

What command would you use to enable an interface the first time you initialized an Alcatel-Lucent 7750 SR/7450 ESS? A. enable B. no shutdown C. interface enable D. interface on

B. no shutdown

Which of the following accurately describes the TCP protocol? A. Connectionless with no guarantee of delivery B. Connectionless with guarantee of delivery C. Connection-oriented with guarantee of delivery D. None of the above

C. Connection-oriented with guarantee of delivery

Which of the following is not a reason networks built on Ethernet alone cannot scale to a global? A. Excessive broadcasts would make the network unusable. B. Ethernet lacks hierarchical addressing. C. Ethernet switches cannot build forwarding tables. D. Ethernet cables can only be of a limited length.

C. Ethernet switches cannot build forwarding tables.

Which of the following is the correct provisioning order you should follow when configuring an Alcatel-Lucent 7750 SR/7450 ESS for the first time? A. IOM, port, MDA B. Port, MDA, IOM C. IOM, MDA, port D. MDA, port, IOM

C. IOM, MDA, port

Which of the following is false regarding IP filters? A. IP filters are not required on a router interface. B. IP filters can filter on both IP addresses and upper-layer protocol port numbers. C. IP filters will automatically permit IP packets by default unless otherwise configured. D. Only one ingress and one egress filter can be applied per interface.

C. IP filters will automatically permit IP packets by default unless otherwise configured.

Which of the following highlights the differences between a traditional home user network and the modern home user network? A. Traditional home networks did not use routers. B. Modern home networks can use wireless access points. C. Modern home networks make use of a variety of new services such as Video on Demand and IP telephony. D. Traditional home networks did not rely on the IP protocol.

C. Modern home networks make use of a variety of new services such as Video on Demand and IP telephony.

Which of the following is not a transport layer protocol? A. TP4 B. TCP C. RTP D. UDP

C. RTP

What is the primary reason that Ethernet switched networks require STP? A. STP provides for link backup between switches. B. A loop-free topology is more efficient. C. Redundant paths can lead to broadcast storms and FDB instability. D. STP updates the OSPF routing protocol cost upon link failure.

C. Redundant paths can lead to broadcast storms and FDB instability.

What would a router processing an HTTP packet from an ethernet switch do with the Layer 2 header of the incoming packet? A. Remove the source Layer 2 address, add its own, and forward the packet B. Remove the Layer 2 addresses and replace them with new addresses C. Remove the entire Layer 2 header and create a new one based on the next hop interface. D. Leave the original Layer 2 header but forward the packet based on the destination address.

C. Remove the entire Layer 2 header and create a new one based on the next hop interface.

Part of the growth of the ARPANET was driven by the ability of anyone to create and disseminate information about potential protocols and applications in a particular kind of document. These documents are known as A. Requests for Information B. Protocol Revisions C. Requests for Comments D. Requests for Configurations

C. Requests for Comments

Which of the following is not a product in the Alcatel-Lucent 7750 SR/7450 ESS family? A. SR-12 B. ESS-7 C. SR-6 D. ESS-1

C. SR-6

Which of the following is a function not performed by a router when forwarding an IP packet? A. Verify the IP header checksum. B. Decrement the TTL and ensure that it is not zero. C. Send a "received" message to the originating router. D. Remove the existing L2 header and create a new L2 header before forwarding the IP packet to its next destination.

C. Send a "received" message to the originating router.

What determines how the root bridge is elected? A. The bridge priority B. The MAC address of the lowest switch port C. The bridge priority unless there is a tie, and then the lowest MAC address D. The BID unless there are multiple bridge priorities that are equal

C. The bridge priority unless there is a tie, and then the lowest MAC address

Which of the following is not true about Link Aggregation Groups? A. They protect against single or multiple link failures. B. They can contain up to eight physical links. C. They can protect against a switch failure by calculating multiple paths to the root. D. They can be configured to enter a down state if a certain number of links in the bundle fail.

C. They can protect against a switch failure by calculating multiple paths to the root.

Which of the following is false regarding VLANs? A. They provide for broadcast domain separation. B. A single VLAN can exist on multiple switches. C. They require a separate physical connection per VLAN for interswitch links. D. They use a 12-bit VLAN ID to identify each VLAN.

C. They require a separate physical connection per VLAN for interswitch links.

Which of the following was not a reason TCP was a superior transport protocol to NCP? A. Support for global addressing B. Support for end-to-end checksums C. Support for applications such as email D. Support for fragmentation and reassembly

Support for applications such as email

Which of the following descriptions of hardware for the Alcatel-Lucent 7750 SR/7450 ESS is correct? A. IOMs plug into MDAs. B. MDAs plug into SFPs. C. SF/CPMs plug into IOMs. D. IOMs plug into the chassis.

D. IOMs plug into the chassis.

A router processing an HTTP packet from an ethernet switch would need to examine and/or manipulate the headers for A. Ethernet only B. IP only C. TCP and IP only D. IP and Ethernet only

D. IP and Ethernet only

Most of the OSI-created protocols are no longer in use, although a few still provide some critically important functions. Which of the following describes and OSI protocol that is still in use? A. OSPF B. LDP C. TP0 D. IS-IS

D. IS-IS

Which of the following is not true of the STP protocol? A. It calculates a root bridge. B. It uses a cost value on each port to determine the path to the root bridge. C. It ensures a loop-free topology. D. It provides load-sharing capability.

D. It provides load-sharing capability.

Which STP port state is characterized by the port accepting and recording MAC address information, but not forwarding any frames out the port? A. Blocking B. Forwarding C. Listening D. Learning

D. Learning

The address 224.100.1.1 under traditional classful addressing would be ______. A. Class A B. Class B C. Class C D. None of the above

D. None of the above

Which of the following is not a match criteria that can be used with IP filters? A. Source or destination IP address B. Source or destination port number C. ICMP message type D. Originating host name

D. Originating host name

Which of the following TCP flags is not matched with the correct definition? A. SYN—Indicates the start of a TCP connection. B. ACK—Acknowledges that a TCP segment has been received. C. FIN—Indicates the closing of a TCP session. D. RST—Re-sets the sequence numbers for a TCP session.

D. RST—Re-sets the sequence numbers for a TCP session.

The primary difference in the way Ethernet hubs and Ethernet switches handle traffic is ______. A. Hubs forward broadcast traffic out every port, switches do not. B. Switches eliminate the need for thicknet cabling. C. Switches support multiple physical connections to hosts. D. Switches forward unicast traffic only to a specific destination port.

D. Switches forward unicast traffic only to a specific destination port.

Given the following code: Config> lag 1 Config>lag# description "LAG from PE1 to PE2" Config>lag# port 1/1/1 1/1/2 1/1/3 1/1/4 1/1/5 1/1/6 Config>lag# port-threshold 2 action down Config>lag# dynamic-cost Config>lag# no shutdown Which answer correctly describes what happens when Ports 1/1/5 and 1/1/6 fail? A. Nothing because the port threshold of 2 active links has not been reached B. The LAG begins using equal costing across all links because of the dynamic cost parameter. C. The LAG updates its BPDUs and recalculates STP. D. The LAG changes its OSPF cost for the bundle but takes no other action.

D. The LAG changes its OSPF cost for the bundle but takes no other action.

What distinguishes an alternate port from a back-up port in STP? A. The alternate port has a higher path to the root. B. The back-up port has a lower priority. C. The back-up port is used only when the alternate port fails. D. The back-up port is on the same switch as the designated switch.

D. The back-up port is on the same switch as the designated switch.

Which of the following is not true about an IP packet? A. The TTL field ensures that IP packets have a limited lifetime. B. The maximum size is 65,535 octets. C. The total length field includes the IP header. D. The current version is IPv5.

D. The current version is IPv5.

In a typical home network, when a PC needs to send an IP packet to a destination on the Internet, it first sends the packet to ______. A. The designated router B. The cable modem C. The router indicated in its BGP table D. The default gateway

D. The default gateway


Conjuntos de estudio relacionados

Ch. 10 - Complications of pregnancy.

View Set

1. Acid-Base Balance: introduction

View Set

MRS. GRIFFITH'S - #2 ECONOMY -TRADE BARRIERS: Tariff, Quota, and Embargo

View Set

XCEL Chapter 11 - Laws and Rules (new)

View Set