Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the 2 functions of the Data Link Mac layer?

A.) Handles access to shared media

B.) Manages protocol access to the physical network medium

C.) Provides SAPs for higher level protocols

D.) Allows multiple devices to uniquely identify one another
on the data

link layer



What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Ma..

Answer / guest

Answer: A B D

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

How can you measure out exactly 4 litres of water from a tap using a 3 litre and a 5 litre bucket?

7 Answers  


Using the access-list command, 'access-list 1 deny 2.2.2.2', what else must be done to stop host 2.2.2.2 from sending any traffic out of physical interface E0, while still allowing other traffic? A.) In global mode, Add a line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.) On interface E0, Add a line - 'access-group 1 in' C.) In global mode, Add a line - 'access-list 1 permit all' D.) On interface E0, Add a line - 'access-list 1 in' E.) On interface E0, Add a line - 'access-list 1 out' F.) On interface E0, Add a line - 'ip access-group 1'

1 Answers  


CO is an acronym for which of the following? A.) Central Office B.) Capital Office C.) Central Operator D.) Company Office

1 Answers  


what is meant by domain ? what is mean by DNS?

22 Answers   Big Cinemas, TCS,


Which type for communication switch do?

0 Answers  


What s the formula for metric of ospf?

0 Answers  


Can you explain VPN tunneled packet in detail?

0 Answers   CCIE,


Which of the following are examples of the Network Layer? A.) Token Ring B.) LLC C.) SQL D.) IP E.) TCP F.) IPX

3 Answers  


Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 Answers  


Which of the following is a routing protocols? TCP RIP SMTP UDP

7 Answers  


When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 Answers   Wipro,


Which classes are assignable?

0 Answers  


Categories