Which layer is responsible for identifying and establishing the
availability of the intended communication partner?
A.) Application
B.) Presentation
C.) Transport
D.) Session
E.) Network
Answer / guest
Answer: A
The Application layer performs the following: Synchronizing
sending and
receiving applications. Program-to program communication.
Identify and
establish the availability of the intended communication
partner, and
determine if sufficient resources exist for the
communication. Popular
application protocols include WWW, SMTP, EDI, FTP, Telnet,
and SNMP
| Is This Answer Correct ? | 0 Yes | 0 No |
What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN
What is difference between routing and routed protocols?
Differnce between the communication and transmission?
What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL
Which three types of connectors are commonly associated with Cisco's V.35 serial cables? (Choose three.) 0 RJ 11 1 DB 60 2 Winchester 15 pin 3 DB 9 4 smart serial 5 RJ 45
In which access- list type you can't do editing?
Which LAN switching method is used in CISCO Catalyst 5000?
After how long eigrp protocol advertise its routing table?
srry for inconvnce ..here is complete qs...ignore the previous 1 3 router configured with RIP & Ripv2 rotuer 1- connected with router 2 having sr ip 10.0.1.2 routing : ripv2 E0:192.168.1.10 router 2: connected with router 1 and router 3 having sr 0 ip 10.0.1.3 & sr 1 ip 11.0.1.2 routing :rip & ripv2 E0=192.168.10.2 router 3: connected with router 2 having sr ip 11.0.1.3 routing: rip E0=172.16.10.2 is there communication possible?
What's the default CDP holdtime in seconds for Cisco routers? A.) 30 seconds B.) 180 seconds C.) 90 seconds D.) 60 seconds
You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 D. 255.255.255.248, B,128.16.32.12, 128.16.32.15
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic