Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which layer hides details of network dependent information from

the higher

layers by providing transparent data transfer?

A.) Transport

B.) Physical

C.) Data Link

D.) Session

E.) Application

F.) Network

Answers were Sorted based on User's Feedback



Which layer hides details of network dependent information from the higher layers by providing..

Answer / vikram pratap singh

A-:Transport

Is This Answer Correct ?    0 Yes 0 No

Which layer hides details of network dependent information from the higher layers by providing..

Answer / ravi

Transport layer

Is This Answer Correct ?    0 Yes 0 No

Which layer hides details of network dependent information from the higher layers by providing..

Answer / guest

Answer:

Is This Answer Correct ?    0 Yes 1 No

Which layer hides details of network dependent information from the higher layers by providing..

Answer / idiot

network or data link

Is This Answer Correct ?    0 Yes 1 No

Which layer hides details of network dependent information from the higher layers by providing..

Answer / ash

application

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CCNA Interview Questions

Explain what is the size of hello packets in eigrep protocol?

0 Answers  


In which ios version 182 people can access router through telenet?

0 Answers  


Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?

0 Answers  


Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers   HCL,


what is vlan and how will you configure vlan on 3650 switch and how many valn can you create on that switch

3 Answers   Aptron, Volvo,


Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0

2 Answers  


Which command will enable CHAP authentication on a serial interface that is using PPP? A.) encapsulation chap B.) ppp chap C.) ppp enable chap D.) ppp encapsulation chap E.) ppp authentication chap F.) ppp chap enable

2 Answers  


Which dynamic type draw back is, if single link down, it removes its routing table?

0 Answers  


Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z

1 Answers  


. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in

1 Answers  


Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full

2 Answers  


What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.

2 Answers  


Categories