Which of the following is an example of the Network Layer?

A.) LLC

B.) SQL

C.) Token Ring

D.) IPX

E.) SPX



Which of the following is an example of the Network Layer? A.) LLC B.) SQL C.) Token Ring ..

Answer / guest

Answer: D

Most protocol suites have different OSI layer protocols
within them. At

layer 3,

IP is for TCP/IP. TCP is layer 4.

IPX is for IPX/SPX. SPX is layer 4.

DDP is for Appletalk

Is This Answer Correct ?    3 Yes 2 No

Post New Answer

More CCNA Interview Questions

What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.

1 Answers  


Which command loads a new version of the Cisco IOS into a router? A. copy flash ftp B. copy ftp flash C. copy flash ftp D. copy tftp flash

2 Answers  


Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface

2 Answers   Wipro,


Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'

3 Answers  


Which of the following are Session Layer standards? A.) ASCII and EBCDIC B.) MPEG and MIDI C.) RPC and SQL D.) JPEG and PICT

3 Answers  






What is the checksum?

0 Answers  


What does the term "attenuation" mean in data communication? 1 loss of signal strength as distance increases 2 time for a signal to reach its destination 3 leakage of signals from one cable pair to another 4 strengthening of a signal by a networking device

3 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater

7 Answers   CISOC, Wipro,


What are the two components of an IPX address? A. network number IP address B. MAC address node number C. network number MAC address D. network number arched number

1 Answers  


Identify 2 reasons for disabling CDP? A.) If the router is not configured for RIP B.) Save bandwidth by eliminating overhead C.) If the router is configured for Appletalk D.) When connected to a non-Cisco router

1 Answers  


How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets

1 Answers  


Categories