Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


True or False: Each OSI layer thinks it is communicating directly with the same layer in another computer. Even though the data is going through several layers.



True or False: Each OSI layer thinks it is communicating directly with the same layer in another com..

Answer / indu

True

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More Networking Administration Interview Questions

You have the following Network ID: 192.115.103.64/27. What is the IP range for your network?

5 Answers  


What routing problems have you troubleshot?

1 Answers  


Which port is reserved for FTP ?

1 Answers  


What does a "preamble" consist of ? a. all 0s b. all 1s c. a 1 in the beginning and rest 0s d. alternating 0s and 1s

1 Answers  


What is network architecture?

0 Answers  


How do two computers communicate with each other when they are connected through L2 or L3 switch?

0 Answers   HCL,


What functions does the session layer perform ? a. flow control b. find te best route c. frame building d. communication control such as simlex/half-duples/full-duples and connectionless/connection oriented

1 Answers  


Which layer does: flow control, windowing, error recovery ? a. data-link b. network c. transport d. session

1 Answers  


Define proxy servers?

0 Answers  


In PPP, which protocol is used to establish and configure a connection ? a. CHAP b. PAP c. LCP d. TCP

1 Answers  


How long is MAC address (bytes) ? How may bytes identifies the vendor? a. 8,2 b. 6,3 c. 8,4 d. 6,2

1 Answers  


The rules used to define the objects that can be accessed via a network management protocol is called ?

1 Answers  


Categories
  • Networking Protocols Interview Questions Networking Protocols (671)
  • Networking Administration Interview Questions Networking Administration (1008)
  • Networking Security Interview Questions Networking Security (196)
  • Networking General Interview Questions Networking General (266)
  • Networking AllOther Interview Questions Networking AllOther (430)