What are the 2 functions of the Data Link Mac layer?
A.) Handles access to shared media
B.) Manages protocol access to the physical network medium
C.) Provides SAPs for higher level protocols
D.) Allows multiple devices to uniquely identify one another
on the data
link layer
Answer / guest
Answer: B D
These are the two primary functions of the MAC layer.
| Is This Answer Correct ? | 3 Yes | 0 No |
Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252
What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping
Select the compression protocols for PPP? A. Stac B. Predictor C. Quality D. Magic Number
There are 2 types of PPP authentication supported by the Cisco IOS. What are they? A.) PAP B.) PREDICTOR C.) MD5 D.) CHAP E.) STACKER F.) MSCHAP
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater
How are straight and crossable cables different from each other?
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Explain the benefits of vlan?
Which of the following is an example of the Datalink Layer? A.) LLC B.) TCP C.) SQL D.) IPX E.) Token Ring F.) MAC
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
What is a network subnet?