What are the 2 functions of the Data Link Mac layer?
A.) Handles access to shared media
B.) Manages protocol access to the physical network medium
C.) Provides SAPs for higher level protocols
D.) Allows multiple devices to uniquely identify one another
on the data
link layer
Answer / guest
Answer: B D
Media Access Control (MAC) -The MAC sublayer manages
protocol access to
the physical network medium. The IEEE MAC specification
defines MAC
addresses, which allow multiple devices to uniquely identify
one another
at the data link layer.
| Is This Answer Correct ? | 2 Yes | 0 No |
What is the difference between static ip addressing and dynamic ip addressing?
Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node ID? A.) net 4a host 0002.1111.a999 B.) net a999 node 0002.1111 C.) net 0002.1111.a999 node 4a D.) net 0002.1111 node a999
Explain dhcp scope?
In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII? A.) Presentation B.) Application C.) Transport D.) Session E.) Datalink F.) Network
What is 10baset ethernet lans?
Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking? if only negotiation is the factor it can be done with one mode as well ie dynamic desirable . but why we need dynamic auto. coz it dsnt negotiates ..at all please post answer asap thanks :
Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
What type of switching creates variable latency through the switch? A.) Cut-Through B.) Inverted C.) Layer 4 D.) Multiplexed E.) Store and Forward
Why Operating System Have only 65,535 port Numbers
What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3
Can yo define LNS