Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following are Session Layer standards?

A.) ASCII and EBCDIC

B.) MPEG and MIDI

C.) NFS and SQL

D.) JPEG and PICT

Answers were Sorted based on User's Feedback



Which of the following are Session Layer standards? A.) ASCII and EBCDIC B.) MPEG and MIDI ..

Answer / guest

Answer: C

Session layer protocols include NFS, SQL, RPC, Appletalk Session

Protocol (ASP), XWindows, and NetBEUI.

Is This Answer Correct ?    9 Yes 2 No

Which of the following are Session Layer standards? A.) ASCII and EBCDIC B.) MPEG and MIDI ..

Answer / haja bahurudeen m

Ans : C


NFS, SPL, X-Windows, NetBios

Is This Answer Correct ?    2 Yes 1 No

Post New Answer

More CCNA Interview Questions

what is stp.

4 Answers   IBM,


Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts

1 Answers  


What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II

1 Answers  


Which of the following is a layer 2 device? A.) Switch B.) Router C.) Repeater D.) Hub

4 Answers  


Can you describe the Authentication Header (AH) Protocol?

0 Answers   CCIE,


how can we block remote desktop for some user from cisco router through aaccess-list

5 Answers  


What are the different types of the password used in securing a cisco router?

0 Answers  


Hey Folks how are you i guess some of guys are newly visitors of this site so let me introduce my self. I am jitendera kumar sinha working for cisco system (india)( Network engineer L2) and i was also a regular Visitors of this site and i have provided lots of answer and i do not know how many are correct :-) By the way i am here again to learn some thing and share my knowledge which is beyond CCNA Scope and and it is some where related to ccnp ( switching )and ccnp Security as i am pursuing ccnp security so i am going to start the topics from switching and will share my knowledge and try to brush-up my knowledge.... so let me know any topic in switching where you are facing difficulty and i will try to solve it so please post one topic and i will reply weekly as i am getting time on Sunday only

1 Answers   Tech Mahindra,


Tell me when we use extended access-list?

0 Answers  


Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses RARP requests D. It uses a router lookup table

1 Answers  


Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z

2 Answers  


Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking? if only negotiation is the factor it can be done with one mode as well ie dynamic desirable . but why we need dynamic auto. coz it dsnt negotiates ..at all please post answer asap thanks :

2 Answers  


Categories