Which of the following is an example of the Physical Layer?
A.) TCP
B.) ARP
C.) IP
D.) FDDI
E.) LLC
F.) Fast Ethernet
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D F
FDDI, Token Ring and Ethernet are all physical layer framing
standards.
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / haja bahurudeen m
Answer : F
A - L4
B - L2
C - L3
D,E - L2
| Is This Answer Correct ? | 2 Yes | 1 No |
What are partial updates?
With distance vector routing protocols, it is never useful to send the same routing update packet back out the same interface that it was learned. This concept is called what? A.) Holddown timers B.) Poison Reverse C.) Count to infinity D.) Split Horizon E.) Link State
Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack
Hi Gyes There are any sites where we can practice online for ccna exams?Plz let me know because i get time to study in my working hours only
What will happen in OSPF, While a new highet priority DR joining in already running area.That area already having DR and BDR.
Which type of transmission bus topology support?
Which statement about half duplex Ethernet operations is true? A. With half duplex transmission frames feed into a single cable in one direction at a time. B. Half duplex transmission between stations is achieved by using point to point Ethernet and Fast Ethernet connections C. Half duplex transmission between stations is achieved by using point to munificent Ethernet and Fast Ethernet connections D. Half duplex Ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end of the connection
Identify the command to reload the router? A.) Router(config)# reload B.) Router# reset C.) Router# reload D.) Router> reload
Identify the keystroke used to terminate the setup mode? A.) Ctrl-K B.) Crtl-C C.) Ctrl-Z D.) Crtl-End
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP
You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 Answers Intel, Quark, Wipro,