Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


The Internet Control Message Protocol occurs at what layer
of the

seven

layer model?

A.) Physical

B.) Transport

C.) Session

D.) Datalink

E.) Presentation

F.) Network

Answers were Sorted based on User's Feedback



The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) P..

Answer / m haja bahurudeen

Ans : F


ICMP is designed for sending control and test messages
across IP networks

Is This Answer Correct ?    6 Yes 0 No

The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) P..

Answer / marshal ditto

network

Is This Answer Correct ?    3 Yes 0 No

The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) P..

Answer / guest

Answer: F

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP

3 Answers  


Can you explain how L2F data tunneling process works?

1 Answers   CCIE,


What is difference between fast ethernet and ethernet port?

13 Answers   Bank of Baroda, Bank Of India,


what is frame relay?

8 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


What is the cladding?

0 Answers  


Identify 2 characteristics of PPP? A.) Uses LLC to establish the link B.) Default serial encapsulation C.) Support multiple layer 3 protocols D.) Offers two types of authentication; PAP and CHAP

1 Answers  


What does the command “IP name-server 255.255.255.255&#8243; accomplish? a.It disables domain name lookup. b.It sets the domain name lookup to be a local broadcast. c.This is an illegal command. d.The command is now defunct and has been replaced by “IP server-name ip any”

5 Answers  


Which command listed below sets the banner message when someone connects to the router? A.) message # B.) banner # C.) login banner # D.) description # E.) login description # F.) banner motd #

2 Answers  


Define bandwidth?

0 Answers  


Explain some overview of EIGRP?

2 Answers  


Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252

1 Answers  


Categories