Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


The Datalink layer works with which of the following:

A.) Packets

B.) Bits

C.) Globules

D.) Frames

E.) Segments

Answers were Sorted based on User's Feedback



The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules ..

Answer / guest

Answer: D

Is This Answer Correct ?    1 Yes 0 No

The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules ..

Answer / m haja bahurudeen

Ans : D

A - L3
B - L1
E - L4

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Why OSPF uses 2 Multicast IP

2 Answers  


friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall

3 Answers   IBM,


Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in

1 Answers  


Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP

4 Answers  


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

0 Answers  


Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 Answers  


Select the fields for the Cisco HDLC protocol: A. Flag, Address, Control B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag C. Flag, Address, Control, Data, FCS, Flag D. Flag, Address, Control, Proprietary, Data, FCS, Flag

2 Answers  


Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet

1 Answers  


Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899

1 Answers  


Identify the command to determine if an IP access-list is grouped on interface e0? A.) Router(config)# show ip interface e0 B.) Router> show ip interface e0 C.) Router# show interface e0 D.) Router# show ip interface e0

1 Answers  


What is Cisco register bits? How they help?

1 Answers   jetking,


Identify the command that configures the bandwidth to 56K? A.) Router(config-if)# bandwidth 56000 B.) Router(config-if)# bandwidth 56k C.) Router(config)# bandwidth 56 D.) Router(config-if)# bandwidth 56

1 Answers  


Categories