What is the most common layer 2 device?
A. Hub
B. Bridge
C. Switch
D. Router
Answers were Sorted based on User's Feedback
Answer / nishant mendhe
C b"cos switch is works @ layer 2 n hub is works @ layer 1
Is This Answer Correct ? | 14 Yes | 0 No |
Answer / mushtaq
C is the best answer
hub works on physical layer
switch works on datalink layer
switch is mutiport repeater
hence switch is best answer.
Is This Answer Correct ? | 14 Yes | 1 No |
Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint
The Cisco Catalyst 5000 switch supports full duplex. How would you enable it on the second port of the card in slot 1? A.) router(config-if)# duplex full B.) router(config)# duplex full C.) router(config-if)# set port duplex D.) router(config)#port duplex = full E.) router(config-if)# set port 1/2 full
What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
What is the attenuation?
Why subnetting is used?
HI I am Rajveersinh. I am Leaving in Ahmedabad-gujarat. I am Hardware & Networking Stundent In JETKING. my Intersted in CICKO Side. Please send ME totel detail in CICKO surtifiction my E-mail ID IS as_raj@ymail.com
Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic
Suppose we have some switch in network and we are running RSTP how much convergence time will be there if one link down
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?