The two sublayers of the IEEE Data Link Layer are which of the
following?
A.) Link and Logical Control
B.) Data Link and LLC
C.) Logical Link Control and Media Access Control
D.) Data Link and MAC
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
Logical Link Control Sublayer - Acts as a managing buffer
between the
upper layers and the lower layers. Uses Source Service
Access Points
(SSAPs) and Destination Service Access Points (DSAPs) to
help the lower
layers talk to the Network Layer.
Media Access Control (MAC) -The MAC sublayer manages
protocol access to
the physical network medium. The IEEE MAC specification
defines MAC
addresses, which allow multiple devices to uniquely identify
one another
at the data link layer.
| Is This Answer Correct ? | 9 Yes | 0 No |
Answer / haja bahurudeen m
Answer : C
Two sublayer in Layer2
LLC & MAC
| Is This Answer Correct ? | 11 Yes | 2 No |
What is CIDR?
Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30
Which of the following are valid WAN terms? A.) DTE B.) DCE C.) Demarc D.) CPE
what is a routing ?what is the use of routing?
8 Answers Google, IBM, Pacific, Tata Technologies,
What are the types of resource sharing?
Which multicast ip eigrp protocol use?
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
What is the name of distance vector algorithm?
Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI