8. When is Frame Tagging used?
A. When you install repeaters in your network
B. When you install bridges in your network
C. When you install routers in your network
D. When you use Switches configured with multiple VLANS
Answers were Sorted based on User's Feedback
Answer / ram
answer is d
frame tagging methods are used in VLAN to commnunicate
between different VLANs
| Is This Answer Correct ? | 15 Yes | 4 No |
Answer / jitendera kuamr sinha
ans d
ram has write the wright answer but explanation is
wrong.frmae taging is not used for communication b/w
vlan.if frame tagging is used for intervaltion comunication
then what the need of router thats called intervlan
communications
ok
the wright expalnation is that when we trunk the two or
more then two switch then the comunication bewwwen same
vlan which are plased at diffrent vlan frme taging is used
this is the wright explanation of franetaging.
| Is This Answer Correct ? | 3 Yes | 2 No |
Answer / kapilasdhir
Yes Dear Jitendera Kumar Sinha is right
Answer: D
Frame tagging is used to uniquely identify a frame as it
traverses the switch fabric on a VLAN
| Is This Answer Correct ? | 3 Yes | 2 No |
Answer / jitendera kumar sinha
if i am wrong that frame tagging is v-lan identification
method then what is frame taging
if farme tagging is used for comunication in diffrent vlan
then plz tell me what is the need of implement router for
intervlan routing.some one marke my answer wrong i just
reqto him plz make the right naswer.
plz
with humble request
jitendera kuamr sinha
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / nilesh d
Answer Is D
Vlan Is Communicate with 2 or Any diffrent Vlan Through
Diffrent's Swithes
| Is This Answer Correct ? | 0 Yes | 1 No |
What is ISR or NonISR router? Difference between ISR or NonISR router?
What is the update period for rip?
raid can be used in? 1 NT 2 Netware 3 all of above mine answer -NT
Identify the command that configures serial0 for PPP encapsulation? A.) Router(config)# encapsulation ppp B.) Router(config-if)# encapsulation serial ppp C.) Router(config-if)# encapsulation ppp D.) Router# encapsulation ppp
Select the compression protocols for PPP? A. Stac B. Predictor C. Quality D. Magic Number
1) How a router established a neighbor relation ship in ospf
What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Which IP Address Class is INCORRECTLY paired with its range of network numbers? A. Class A addresses include 192.0.0.0 through 223.255.255.0 B. Class A addresses include 1.0.0.0 through 126.0.0.0 C. Class B addresses include 128.0.0.0 through 191.255.0.0 D. Class C addresses include 192.0.0.0 through 223.255.255.0 E. Class D addresses include 224.0.0.0 through 239.255.255.0
Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport
Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack
Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP
The ICMP (referred to in PFC 1700) is implemented by all TCP/IP hosts A. true B. false