Which of the following are examples of the Session Layer?
A.) TCP
B.) LLC
C.) SQL
D.) NFS
E.) Token Ring
Answer / guest
Answer: C D
Session layer examples include Netbios Names, SQL, NFS, X
Windows, and RPC.
| Is This Answer Correct ? | 1 Yes | 0 No |
what is frame relay?
What is Route Poisoning?
What is public and private ip address., explain? and also explain the ip address range of both public and private? and where we use that public and private ip address?
In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII? A.) Presentation B.) Application C.) Transport D.) Session E.) Datalink F.) Network
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.
What are the protocols that are used by every layer of ip/tcp model?
Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home D. a standard 28.8 analog dialup connection to the user at home
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion
Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i m specially looking for u?????
What does the 'S' mean when looking at the routing table? A.) Statically connected B.) Directly connected C.) Dynamically attached D.) Shutdown route
Is hsrp is cisco proprietary or introduced by ieee?
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address