Which of the following is a layer 2 device?

A.) Switch

B.) Bridge

C.) Repeater

D.) Hub

Answers were Sorted based on User's Feedback



Which of the following is a layer 2 device? A.) Switch B.) Bridge C.) Repeater D.) Hub..

Answer / guest

Answer: A B

Is This Answer Correct ?    4 Yes 0 No

Which of the following is a layer 2 device? A.) Switch B.) Bridge C.) Repeater D.) Hub..

Answer / sudeep

A,B

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain

3 Answers  


Explain why UDP is lease favored when compared to TCP?

0 Answers  


What are the three sources of signal degradation on a data link?

0 Answers  


How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?

11 Answers   SITTC,


Explain how many tables are in ospf protocol?

0 Answers  






What is the purpose and default value of the CDP timer command? A.) 90 seconds; interval before an entry expires B.) 60 seconds; interval between updates C.) 60 seconds; interval before an entry expires D.) 90 seconds; interval between updates

1 Answers  


What is difference between igp and eigrp?

0 Answers  


Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward

1 Answers  


What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default

1 Answers  


Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon

1 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


what is routing and routed protocol ?

7 Answers  


Categories