Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


The Internet Protocol (IP) occurs at what layer of the seven
layer

model?

A.) Physical

B.) Presentation

C.) Network

D.) Datalink

E.) Session

F.) Transport

Answers were Sorted based on User's Feedback



The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.)..

Answer / guest

Answer: C

Is This Answer Correct ?    3 Yes 0 No

The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.)..

Answer / m haja bahurudeen

Ans : C) Network


Example :


Routed protocol
Roting protocol

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

Classful routing protocols do not include subnet masks in their routing updates. Which of the following routing protocols are considered classful? A.) EIGRP B.) OSPF C.) TCP D.) IGRP E.) RIP F.) IP

2 Answers  


what is the diffrence betwwen telnet and ssh.this question is asked by nikhil and i am plasing the answer here insteed of his personal mail.

4 Answers  


What is a function of a reliable transport layer connection? A. route selection B. acknowledgements C. session checkpoints D. system authentication

2 Answers  


Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25

1 Answers  


Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols

1 Answers  


Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config)# router igrp 100 B.) Router> router igrp 100 C.) Router# router igrp 100 D.) Router(config)# router igrp

3 Answers   CMS,


Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17

2 Answers  


Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.

2 Answers  


Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP

1 Answers  


What does vlan provide?

0 Answers  


1900 Value in which type of access list?

0 Answers  


Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack

2 Answers  


Categories