Which of the following are Session Layer standards?
A.) ASCII and EBCDIC
B.) MPEG and MIDI
C.) NFS and SQL
D.) JPEG and PICT
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
Session layer protocols include NFS, SQL, RPC, Appletalk Session
Protocol (ASP), XWindows, and NetBEUI.
| Is This Answer Correct ? | 9 Yes | 2 No |
what is stp.
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
Which of the following is a layer 2 device? A.) Switch B.) Router C.) Repeater D.) Hub
Can you describe the Authentication Header (AH) Protocol?
how can we block remote desktop for some user from cisco router through aaccess-list
What are the different types of the password used in securing a cisco router?
Hey Folks how are you i guess some of guys are newly visitors of this site so let me introduce my self. I am jitendera kumar sinha working for cisco system (india)( Network engineer L2) and i was also a regular Visitors of this site and i have provided lots of answer and i do not know how many are correct :-) By the way i am here again to learn some thing and share my knowledge which is beyond CCNA Scope and and it is some where related to ccnp ( switching )and ccnp Security as i am pursuing ccnp security so i am going to start the topics from switching and will share my knowledge and try to brush-up my knowledge.... so let me know any topic in switching where you are facing difficulty and i will try to solve it so please post one topic and i will reply weekly as i am getting time on Sunday only
Tell me when we use extended access-list?
Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses RARP requests D. It uses a router lookup table
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking? if only negotiation is the factor it can be done with one mode as well ie dynamic desirable . but why we need dynamic auto. coz it dsnt negotiates ..at all please post answer asap thanks :