What are the 2 functions of the Data Link Mac layer?
A.) Handles access to shared media
B.) Manages protocol access to the physical network medium
C.) Provides SAPs for higher level protocols
D.) Allows multiple devices to uniquely identify one another
on the data
link layer
Answer / guest
Answer: B D
Media Access Control (MAC) -The MAC sublayer manages
protocol access to
the physical network medium. The IEEE MAC specification
defines MAC
addresses, which allow multiple devices to uniquely identify
one another
at the data link layer.
| Is This Answer Correct ? | 2 Yes | 0 No |
Choose the following that are benefits to segmenting with router: A.) Flow Control B.) Manageability C.) Multiple Active Paths D.) Explicit packet lifetime control
Identify the default encapsulation on serial interfaces? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP
Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport
Explain the difference between tftp and ftp application layer protocols?
what is difference between hub and router.....
Which of the following is a routing protocols? TCP RIP SMTP UDP
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, that network is advertised with an infinite metric
if i am using active directory,i have router also.then how i configure router,means which address will be default gatway in active directory & roter how to give ip address details in router.
What are 10base5 ethernet lans?
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport
You create the following standard access-list access-list 1 deny 1.1.1.1 access-list 1 deny 2.2.2.2 int e0 ip access-group 1 in Which of the following statements are true, with regard to traffic flowing into E0? A.) This will stop IP packets with a source address of 1.1.1.1 only. B.) This will stop all IP packets. C.) This is an invalid configuration. D.) This will stop no IP packets. E.) This will stop IP packets with a source address of 2.2.2.2 only. F.) This will stop IP packets with a source address of 1.1.1.1 and 2.2.2.2.
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy