Which layer is responsible for coordinating communication
between
systems?
A.) Application
B.) Network
C.) Session
D.) Transport
E.) Physical
F.) Data Link
Answers were Sorted based on User's Feedback
IPX traffic using different encapsulation types can go over the same data link A. True B. False
Which commands would assign and enable IPX on an interface ? A.) enable netware B.) enable novell-ether C.) router#(config)ipx routing D.) You must first enable IPX globally and then assign the network number to the interface . E.) enable ipx F.) router#(config-if)ipx network 4a
What is the standard ISDN term for a native ISDN telephone? A.) ET B.) TE1 C.) TE2 D.) LE E.) TA
What is the difference between switch, routers, and hub?
What are the two types of transmission technology available in ccna?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolution C.) Mac to IP address resolution D.) IP to Mac address resolution
4 Answers Cordys, Punjabi University,
What is default size of hello packets in ospf?
Sequence and acknowledgement numbers are used for? A.) Layer transitioning B.) Flow control C.) Port number addressing D.) Reliability
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
Explain the difference between routable and non- routable protocols?
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.