What is the most common layer 2 device?
A. Hub
B. Bridge
C. Switch
D. Router

Answers were Sorted based on User's Feedback



What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / shushanta

B.BRIDGE
C.SWITCH

Is This Answer Correct ?    3 Yes 0 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / ajit

switch

Is This Answer Correct ?    2 Yes 0 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / shivaji kamandar

Switch because switch is layer 2 device.

Is This Answer Correct ?    2 Yes 0 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / switch

SWITCH

Is This Answer Correct ?    1 Yes 0 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / guest

d&b

Is This Answer Correct ?    1 Yes 1 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / ajay

bridge

Is This Answer Correct ?    0 Yes 0 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / amir golgozar

A,B,C

Is This Answer Correct ?    2 Yes 4 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / guest

physical

Is This Answer Correct ?    0 Yes 3 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / mani_it_04

d.router

Is This Answer Correct ?    2 Yes 12 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / dharmendra kumar soni

A hub is example of layer 2 device

Is This Answer Correct ?    5 Yes 23 No

Post New Answer

More CCNA Interview Questions

In how many ways you can access the router?

0 Answers  


Windowing is a type of : A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control

1 Answers  


Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode

1 Answers  


What is CRC and which layer it use?

4 Answers   CMS,


What is ISR or NonISR router? Difference between ISR or NonISR router?

3 Answers   HCL,






What is refresher?

0 Answers  


Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC

2 Answers  


Which two statements about the store and forward switching method are true? (Choose two) A. Latency remains constant regardless of frame size. B. Latency through the switch varies with frame length. C. The switch receives the complete frame before forwarding it. D. The switch checks the destination address as soon as it receives the header and begins forwarding the fram immediately.

1 Answers   CD,


if 10 pc's connected from internet, in 8 pc's internet is correctly run but in other 2 pc's they can not access internet,what's the problem?

9 Answers   Fibcom, TATA,


there is three mode of vtp let there are three switch s1 in server mode s2 in transparent mede and s3 in clint mode then will that tranparnt mode going to effect the network if yes then how and if no then what it will do

2 Answers   IBM,


Explain isakmp ?

0 Answers   CCIE,


A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.

1 Answers  


Categories