Which of the following are examples of the Datalink Layer?

A.) LLC

B.) SQL

C.) TCP

D.) Token Ring

E.) IP

Answers were Sorted based on User's Feedback



Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) T..

Answer / guest

Answer: A D

Is This Answer Correct ?    10 Yes 5 No

Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) T..

Answer / m haja bahurudeen

Ans : A,D


L2 - PPP, Frame relay, LLC, Token ring


B -L5
C -L4
E -L3

Is This Answer Correct ?    4 Yes 2 No

Post New Answer

More CCNA Interview Questions

What is the difference between csma/cd?

0 Answers  


Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector

2 Answers  


Define network?

0 Answers  


LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server

2 Answers  


Which cable do you use to connect a PC directly to the fast ethernet interface on a router. For example if you wanted to do an IOS upgrade from your laptop?

5 Answers  






take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible

6 Answers   AT&T,


What is ‘round-trip time’?

0 Answers  


Who controls mac address uniqueness and how?

0 Answers  


HI ALL , wanted to know if the rstp protocol.. rapid spanning tree protocol .. is imp to study with ccna's point of view or study of STP will be enough.. in some books rstp is nt given like todd lamle however in icnd2 its explained in detail.. please suggest asap .. thanks ..

2 Answers  


Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


What is ospf? Describe it.

0 Answers  


Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255

3 Answers  


Categories