21. Which two functions of the OSI model occur at layer two? (Choose two.)
**physical addressing
encoding
routing
cabling
**media access control
22. Due to a security violation, the router passwords must be changed.
What information can be learned from the following configuration entries?
(Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login
The entries specify three Telnet lines for remote access.
**The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is incomplete.
**Access will be permitted for Telnet using "c13c0" as the password.
23.
Refer to the exhibit. When computer A sends a frame to computer D, what
computers receive the frame?
**only computer D
only computer A and computer D
only computer B, computer C, and computer D
all computers
24.
Refer to the exhibit. What two facts can be determined about the exhibited
topology? (Choose two.)
**A single broadcast domain is present
Two logical address ranges are required.
Three broadcast domains are shown.
Four networks are needed.
**Five collision domains exist.
25. When must a router serial interface be configured with the clock rate
command?
when the interface is functioning as a DTE device
when the interface timers have been cleared
when the connected DTE device is shut down
**when the interface is functioning as a DCE device
26. Which three statements characterize the transport layer protocols?
(Choose three.)
**TCP and UDP port numbers are used by application layer protocols.
TCP uses port numbers to provide reliable transportation of IP packets.
UDP uses windowing and acknowledgments for reliable transfer of data.
**TCP uses windowing and sequencing to provide reliable transfer of data.
**TCP is a connection-