Which layer is responsible coordinating communications b/w segments ? a. physical b. data-link c. network d. session e. application
1 2341Can ATM allocate bandwidth on demand ? a. Yes b. NO c. Only if you are running LANE d. Only if you are running layer 3 switches
1 2536Which frame type use DSAPs and SSAPS to identify the upper layer protocols ? a. 802.1d b. 802.2 c. 802.3 d. 802.3u
1 2437Which of the follwoing are Layer2 protocols ? Choose all that apply. a. HDLC b. IP c. UDP d. SLIP e. PPP
1 2339which layer converts user input into data ? a. application b. presentation c. session d. transport
1 2717Which layer deals converts formats (unix-dos, EBCDIC-ASCII etc.) ? a. session b. presentation c. transport d. application
1 2186Which layer deals with i) file system transfer ii) ii) virtual terminals emulation iii) interprocess communication. a. Application b. Presentation c. Session d. Transport
1 3793Which layer establishes end-to-end connection ? a. network b. transport c. physical d. data-link
1 2735Which set has protocols of ONLY the Network layer ? a. IP, UDP, TCP, RARP, ICMP b. IP, UDP, ARP, RARP, ICMP c. SPX, UDP, GNS, ARP, APPLETALK d. IPX, FTP, ARP, RARP, ICMP
1 2500Port is where upper layer protocols access which layer ? a. data-link b. network c. transport d. session
1 2304
How can I tell if a port is blocked?
How do I unblock a port?
When troubleshooting computer network problems, what common hardware-related problems can occur?
What is meant my data qutoe error In ms office
what is colour port? what is the use with it?
What is firewalls?
How can you identify the ip class of given a ip address?
How does a network topology affect your decision in setting up a network?
Can we run STP and RSTP in a same box?
Can a switch be used to connect two LANs with different network IDs ?
What is the difference between static and dynamic ip addresses?
Explain what are all the technical steps involved when the data transmission from server via router?
What is PLAR?
Explain about the job of the network layer under the osi reference model?
What is the difference between cybersecurity and information security?