Which of the following is an example of the Session Layer?

A.) TCP

B.) SQL

C.) IP

D.) X-Windows

E.) Token Ring

F.) LLC

Answers were Sorted based on User's Feedback



Which of the following is an example of the Session Layer? A.) TCP B.) SQL C.) IP D.) X-..

Answer / guest

Answer: B D

Netbios Names, SQL, NFS, X-Windows are examples of the
Session layer.

Is This Answer Correct ?    1 Yes 0 No

Which of the following is an example of the Session Layer? A.) TCP B.) SQL C.) IP D.) X-..

Answer / m haja bahurudeen

Ans : B,D


TCP : L4
IP : L3
Token Ring & LLC : L2

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Name the 2 protocols are in wan technology?

0 Answers  


Which protocol comes under hybrid dynamic type?

0 Answers  


hi friend i am sending some interview question which is asked from me at volvo hope this will help you of all 1 what is mpls al question is posted by jitendera kumar sinha

0 Answers   ALU, TATA, Volvo, Wipro,


what is Bandwidth capping

0 Answers   Infosys,


Why we use debug command?

0 Answers  






When you cords an IP address on a place router which command stale the IP processing on the interface? A. ip enable B. network ip-address C. ip address ip-address subnet mask D. the exit command from the enabled configuration E. copy running-configuration to startup-configuration

3 Answers  


What does the "IPX maximum-paths 2" command accomplish? A. It enables load sharing on 2 paths if the paths are equal metric paths. B. It sets up routing to go to network 2. C. It is the default for Cisco IPX load sharing. D. It enables load sharing on 2 paths if the paths are unequal metric paths.

3 Answers  


What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging

1 Answers  


Which command-line keywords are valid for choosing Frame-Relay LMI types? A.) itu-t B.) dlci C.) ansi D.) rfc 1544 E.) cisco F.) q933a

1 Answers  


Can you explain different components in PKI?

0 Answers   CCIE,


Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address

1 Answers  


Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion

2 Answers  


Categories