Which of the following are examples of the Session Layer?
A.) IP
B.) Netbios Names
C.) NFS
D.) Token Ring
E.) SQL
F.) TCP
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B C E
Session layer examples include Netbios Names, SQL, NFS, X
Windows, and RPC.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / m haja bahurudeen
Ans : B,C,E
A - Network layer
D - Datalink
F - Transport
| Is This Answer Correct ? | 3 Yes | 0 No |
Novell NetWare has an Ethernet frame type called Ethernet_SNAP. What is the matching Cisco command line keyword for this encapsulation method? A.) arpa B.) sap C.) snap D.) gns E.) dix F.) novell-ether
3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses
the situation iz like ths -at a specific time in our company the internet connectivity goes off...v hav two networks in our company...but out of it only one link goes down for 5-10 sec...a fastethernet port becomes down for few sec and automatically becomes Up... Is this occures becoz of Power?? If yes thn y the 2nd network is not affected??
Suppose a Switch interface went in error-dis mode what you will do for Troubleshooting List all Possibilities
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
What is encapsulation and de-encapsulation?
What is the size of an ip address?
What are the different ways authentication mechanism in VPN?
Choose the following that are benefits to segmenting with router: A.) Flow Control B.) Manageability C.) Multiple Active Paths D.) Explicit packet lifetime control
You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
Can you explain tunneling?