Identify the 3 major functions at layer 3 of the OSI model?
A.) Forwarding process
B.) Logical addressing
C.) End-to-end connections
D.) Path selection
E.) MAC address examination
F.) Network monitoring
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A B D
Layer 3 determines the path, forwards the packet and
implements software
or logical addressing.
| Is This Answer Correct ? | 2 Yes | 0 No |
Explain what are the ranges of private ips?
Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE
Which command should you use to confound a router so that it can become a TFTP server host for a router system image that is run in a Flash? A. copy flash tftp B. config tftp server C. write, network -router name- D. tftp-server system -file name- E. setup server tftp -system name-
what is leased line and if any issue occur what will u do thai is trouble shootin occurs let leased line is down
1 Answers Aptron, Cisco, HCL, Volvo,
What is the command to copy the IOS image to a TFTP server? A.) copy flash tftp B.) copy running-config tftp C.) copy ios tftp D.) copy startup-config tftp
Explain the difference between switch & hub?
what is the default ad value of the interface directly coneted to router. as for exmaple ad value of ospf is 90 then from ehternet the network is conected whta is difault value of that directly conected interface. what is the defalt ad value of bgp whta is access llist and how many type of access list what is vlan what is vpn how e congigure the router what is mpls these are the question skrd to me at tcs i have replyed all ecxept the first one
What type of Ethernet operation allows only one entity to transmit at a time? For example, if someone else is transmitting, they must wait. A.) Full-Duplex B.) Dual-Duplex C.) Half-Duplex D.) Latex E.) Quarter-Duplex F.) Suplex
Name which protocols are link states?
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
Can you explain IKE (Internet Key Exchange)?
In Novell's use of RIP, there are two metrics used to make routing decisions. Select the two metrics. A. Ticks. B. Hops C. Loops D. Counts