Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


At which layer of the OSI model does the ping command operate?

A. session

B. network

C. transport

D. maintenance

Answers were Sorted based on User's Feedback



At which layer of the OSI model does the ping command operate? A. session B. network C. tra..

Answer / syed mehdi raza

transport

Is This Answer Correct ?    0 Yes 3 No

At which layer of the OSI model does the ping command operate? A. session B. network C. tra..

Answer / guest

C. transport

Is This Answer Correct ?    15 Yes 21 No

Post New Answer

More CCNA Interview Questions

How does a web page works though each layers ?

5 Answers   HCL, PBPL,


Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199

1 Answers  


Can you define in short what VPN is?

5 Answers   CCIE,


You create the following standard access-list access-list 1 deny 1.1.1.1 access-list 1 deny 2.2.2.2 int e0 ip access-group 1 in Which of the following statements are true, with regard to traffic flowing into E0? A.) This will stop IP packets with a source address of 1.1.1.1 only. B.) This will stop all IP packets. C.) This is an invalid configuration. D.) This will stop no IP packets. E.) This will stop IP packets with a source address of 2.2.2.2 only. F.) This will stop IP packets with a source address of 1.1.1.1 and 2.2.2.2.

1 Answers  


Name the command we give on privilege mode for coming back to user execution mode?

0 Answers  


How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?

11 Answers   SITTC,


Explain the difference between collision domain and broadcast domain.

0 Answers  


What is the Function of Layer3 Switch?

1 Answers  


what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?

1 Answers  


The Cisco IOS is stored in: A.) ROM B.) CD C.) Flash D.) NVRAM

5 Answers  


what is ACLs? what is the reasons to create ACLs?

1 Answers  


Which of the following are valid Cisco encapsulation type names? A.) arpa = IPX Ethernet B.) novell-ether = IPX Ethernet_802.3 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring D.) novell-fddi = IPX Fddi_Raw E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring F.) hdlc = HDLC on serial interfaces

1 Answers  


Categories