The two sublayers of the IEEE Data Link Layer are which of the
following?
A.) Link and Logical Control
B.) Data Link and LLC
C.) Logical Link Control and Media Access Control
D.) Data Link and MAC
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
Logical Link Control Sublayer - Acts as a managing buffer
between the
upper layers and the lower layers. Uses Source Service
Access Points
(SSAPs) and Destination Service Access Points (DSAPs) to
help the lower
layers talk to the Network Layer.
Media Access Control (MAC) -The MAC sublayer manages
protocol access to
the physical network medium. The IEEE MAC specification
defines MAC
addresses, which allow multiple devices to uniquely identify
one another
at the data link layer.
| Is This Answer Correct ? | 9 Yes | 0 No |
Answer / haja bahurudeen m
Answer : C
Two sublayer in Layer2
LLC & MAC
| Is This Answer Correct ? | 11 Yes | 2 No |
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A. trace B. ping C. telnet D. bootp
When a router knows the IP address, but does not know the MAC address of the device it wishes to contact, it uses the ARP (Address resolution protocol) to determine the MAC address. After it learns the MAC address, it stores this information in the ARP cache. What is the command to view the ARP cache? A.) sh mac B.) show cache C.) show arp D.) sh arp interfaces E.) show ip cache
CO is an acronym for which of the following? A.) Central Office B.) Capital Office C.) Central Operator D.) Company Office
What must you do to test connectivity on a dial on demand routing (DDR) link? A. increase the idle Import parameter B. send interesting traffic across the link C. reboot one of the integrated services digital network (ISDN) routers D. reset the DDR integrated services digital network (ISDN) router statistics to zero
What is the protocol number for UDP? A.) 6 B.) 17 C.) 25 D.) 21
Identify 3 characteristics of an IP address? A.) Contains a network portion and a host portion B.) 32 bits long C.) Unique to each network D.) Part of the default Cisco configuration E.) Referred to as the hardware address
What is osi?
Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root
What is the difference between csma/cd and csma/ca?
What is the virtual path?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
How convergence happen in ospf?