The Datalink layer works with which of the following:
A.) Packets
B.) Bits
C.) Globules
D.) Frames
E.) Segments
Answers were Sorted based on User's Feedback
What are the two primary operating modes for frame switching? A. Full Duplex B. Half-Duplex C. CSMA/CD D. Cut-through E. Fragmentation F. Store and Forward G. User mode H. Privileged mode
Which of the following is an example of the Session Layer? A.) TCP B.) SQL C.) IP D.) X-Windows E.) Token Ring F.) LLC
What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234.FEGA D. 00.00.12.34.FE.AA
What is the difference between TCP and UDP? A.) TCP is connection-oriented; UDP uses acknowledgements only B.) TCP is connection-oriented; UDP is connectionless C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing D.) TCP and UDP both have sequencing, but UDP is connectionless
Define the igp (interior gateway protocol)?
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
Identify the mode reflected by the following prompt 'Router'? A.) Setup B.) RXBoot C.) Boot mode D.) Privileged exec mode
Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables
Identify the hardware component used to store buffers, tables, running-configuration etc? A.) NVRAM B.) ROM C.) RAM D.) Flash
Can you explain the difference between trusted and untrusted networks?
What is the formula for metric of ospf?