What is the most common layer 2 device?
A. Hub
B. Bridge
C. Switch
D. Router

Answers were Sorted based on User's Feedback



What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / sandeep

c

Is This Answer Correct ?    24 Yes 5 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / sundarrajan.s

C.Switch

Is This Answer Correct ?    21 Yes 2 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / tatyasaheb

B. Bridge
C. Switch

Is This Answer Correct ?    21 Yes 4 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / subas

SWITCH is the most common layer 2 devive

Is This Answer Correct ?    17 Yes 1 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / nishant mendhe

C b"cos switch is works @ layer 2 n hub is works @ layer 1

Is This Answer Correct ?    14 Yes 0 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / sankarkumar43

switch
bridge

Is This Answer Correct ?    15 Yes 1 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / mushtaq

C is the best answer

hub works on physical layer

switch works on datalink layer

switch is mutiport repeater

hence switch is best answer.

Is This Answer Correct ?    14 Yes 1 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / jibin joy

It is switch.

Is This Answer Correct ?    7 Yes 1 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / sanjeev kumar

C.switch bcz switch workson layer 2.

Is This Answer Correct ?    5 Yes 0 No

What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router..

Answer / guest

B & C both correct

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint

3 Answers  


The Cisco Catalyst 5000 switch supports full duplex. How would you enable it on the second port of the card in slot 1? A.) router(config-if)# duplex full B.) router(config)# duplex full C.) router(config-if)# set port duplex D.) router(config)#port duplex = full E.) router(config-if)# set port 1/2 full

1 Answers  


What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.

2 Answers  


What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.

1 Answers  


What is the attenuation?

0 Answers  






Why subnetting is used?

0 Answers  


HI I am Rajveersinh. I am Leaving in Ahmedabad-gujarat. I am Hardware & Networking Stundent In JETKING. my Intersted in CICKO Side. Please send ME totel detail in CICKO surtifiction my E-mail ID IS as_raj@ymail.com

6 Answers   HCL,


Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.

2 Answers  


What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic

1 Answers  


Suppose we have some switch in network and we are running RSTP how much convergence time will be there if one link down

0 Answers   Infosys,


Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john

1 Answers  


Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?

2 Answers  


Categories