What are the 2 functions of the Data Link Mac layer?
A.) Handles access to shared media
B.) Manages protocol access to the physical network medium
C.) Provides SAPs for higher level protocols
D.) Allows multiple devices to uniquely identify one another
on the data
link layer
Answer / guest
Answer: B D
Media Access Control (MAC) -The MAC sublayer manages
protocol access to
the physical network medium. The IEEE MAC specification
defines MAC
addresses, which allow multiple devices to uniquely identify
one another
at the data link layer.
| Is This Answer Correct ? | 2 Yes | 0 No |
What are four benefits that can result from applying ISDN networking? (Choose four) A. Full time connectivity across the ISDN is spoofed by Cisco IOS routers using dial on demand routing (DDR) B. Small Once and Home Once sites can be economically supported with ISDN Basic Rate Interface (BRI) servkps C. ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone Network (PSTIC) backbone D. ISDN can be used as a backup service for a leased line connection between the remote and central chaps E. Modem racking and cabling can be eliminated by integration of digital modem cards on Cisco IOS Network Acess Servers (NAS)
let there are three switch and there are 3 ree valn craed on each switch that is vlan 2 on first switch valn 3 on 2nd switch and vlan 4 is cretaed on switch 3 i have implemnted intervlan routin through ciso switchses. the router is conected through its fa0/1 port by one switch and and the two switch are trunked with each other now question is that we want to comuniacte betwwen vlan but does alse want that only vlan 2 is allow to access internet (ISP)which is conected through s0 interface of router.and no any vlan can access that internet.what should be solution.
Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2
You have just issued the erase startup-config Command and reloaded your router. In which mode will your router be when you react? A. setup B. startup C. user EXEC D. userd privileged E. global configuration
There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? A. RARP B. ARP C. RIP D. IGRP
Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) RPC
What is the difference between the switch, hub, and router?
Which ISDN specification series deals with Concepts and Terminology? A.) C- Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series
Identify the 2 characteristics that TCP and UDP share in common? A.) Both use port numbers to identify upper level applications B.) Operate at the Network layer C.) Both are Transport protocols D.) Both are reliable communications
What is cisco?
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address