Which layer defines bit synchronization?

A.) Application

B.) Network

C.) Transport

D.) Physical

E.) Session

F.) Session

Answers were Sorted based on User's Feedback



Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) P..

Answer / guest

Answer: D

Is This Answer Correct ?    20 Yes 1 No

Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) P..

Answer / sohel shaikh

D) Physical layer defines bit synchronization.

Is This Answer Correct ?    13 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the subnetmask of / 27 in network based and host based?

0 Answers  


What are two purposes for segmenting a network with a bridge? (Choose two) A. to reduce collisions B. to increase collisions C. to add collision domains D. to reduce collision domains E. to have more broadcast domains

3 Answers   Ecobank, RNP,


Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time

2 Answers  


Identify the hardware component used to store buffers, tables, running-configuration etc? A.) NVRAM B.) ROM C.) RAM D.) Flash

4 Answers  


What is the function of the Application Layer in networking?

0 Answers  






Which OSI layer establishes, maintains and terminates sessions between hosts? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session

2 Answers  


Which range of possible numbers do standard ipx access lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099

1 Answers  


Identify 2 characteristics of PPP? A.) Uses LLC to establish the link B.) Default serial encapsulation C.) Support multiple layer 3 protocols D.) Offers two types of authentication; PAP and CHAP

3 Answers  


When using access lists, what does a Cisco router check first? A. To see if the packet is routable or bridgeable B. The destination address C. The source address D. The packet contents

1 Answers  


8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS

5 Answers  


When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.

1 Answers  


Which two steps are required to confound and apply standard access lists on an interface? (Choose two) A. define an access list number and its parameters B. enable an interface to become part of the access list group C. define the number of access lists to be supported on an interface D. copy the access list definition to each interface that will support it

2 Answers  


Categories