Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the OSI layer associated with bits?

A.) Physical

B.) Network

C.) Binary

D.) Data link

Answers were Sorted based on User's Feedback



Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Dat..

Answer / guest

Answer: A

Is This Answer Correct ?    18 Yes 1 No

Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Dat..

Answer / m haja bahurudeen

Ans : A


L1 - Bit
L2 - frame
L3 - Packet
L4 - segment
L%,L6,L7 - Data

Is This Answer Correct ?    8 Yes 1 No

Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Dat..

Answer / gaurav modi

Ans : A

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

What does aaa stands for?

0 Answers  


What does the term Base refer to in 100BaseT A. cabling type B. singnal type C. 100 mode type D. spectrum used E. speed category

3 Answers  


Describe ICMP messages

4 Answers   HCL,


Identify the hardware component used to store buffers, tables, running-configuration etc? A.) NVRAM B.) ROM C.) RAM D.) Flash

4 Answers  


Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco

1 Answers  


what is the difference between eigrp and ospf

6 Answers   IBM, Wipro,


2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router

2 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server

2 Answers  


Can you explain the difference between trusted and untrusted networks?

2 Answers   CCIE, Wipro,


Which command displays all the commands in the history buffer? A. CTRL H B. show buffer C. show history D. show history buffer

2 Answers  


Which global configuration command will tell the router to load the IOS file 'IOS_filename' from the Network File server at 1.2.3.4 during the next boot? A.) boot system flash IOS_filename 1.2.3.4 B.) boot system tftp IOS_filename 1.2.3.4 C.) config-register 0x0 1.2.3.4 D.) boot system rom 1.2.3.4 E.) This can not be done, only the first file in flash can be used.

1 Answers  


Categories