Which device works at the Network Layer of the OSI model?
Router
Switch
Bridge
Hub
Answers were Sorted based on User's Feedback
Answer / gopal krushna sahoo
Router works at the network layer of the OSI model.
Is This Answer Correct ? | 17 Yes | 0 No |
Answer / vijay
Router device work at d network layer of d OSI model
Is This Answer Correct ? | 8 Yes | 1 No |
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
What is the default size of a standard ping on a Cisco router? * A: 100 bytes * B: 32 bytes * C: 10 bytes * D: 16 bytes
How many types of nat?
What is etherchannel?
In which ios version 182 people can access router through telenet?
can we configure multiple as on single router using eigrp
What command can be used to test IPX connectivity? A.) Ping 2e.000.0045.8923 B.) Ping 192.168.100.1 C.) Ping ipx 2e.0000.0045.8923 D.) Ipx ping 2e.0000.0045.8923
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps
there is three mode of vtp let there are three switch s1 in server mode s2 in transparent mede and s3 in clint mode then will that tranparnt mode going to effect the network if yes then how and if no then what it will do
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?