Which of the following are Session Layer standards?
A.) ASCII and EBCDIC
B.) MPEG and MIDI
C.) RPC and SQL
D.) JPEG and PICT
Answers were Sorted based on User's Feedback
Which command allows a user to see previous commands? A.) show command B.) CTRL-P C.) show history D.) CTRL-U E.) Up Arrow F.) SHIFT-CTRL-6
Which ISDN specification series deals with Concepts and Terminology? A.) C- Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
How would you set the clock rate to 64K, on interface serial 0, from the interface configuration mode? A.) clock rate 64000 B.) bandwidth 64 C.) clock 64 D.) rate 64 E.) clock rate 64k F.) clock rate 64
Identify the 2 characteristics that TCP and UDP share in common? A.) Both use port numbers to identify upper level applications B.) Operate at the Network layer C.) Both are Transport protocols D.) Both are reliable communications
Why ip address called logical address?
Which address or number is used to pass the data to the correct application? MAC Number IP address Port Number Segment Number
Which commands will restart the router? A.) router#system exit B.) router >reload C.) router#shutdown D.) router#reload E.) router#(config)reload F.) router#system restart
As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Why OSI layers having 7 layers instead of one layer.
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list