Multiple Choice
Which of the following is not a vulnerability of the data-link layer?
A) mac address spoofing
B) vlan circumvention
C) switches may be forced for flooding traffic to all vlan ports
D) overloading of transport-layer mechanisms
Correct Answer:

Verified
Correct Answer:
Verified
Q4: The network layer responds to request from
Q5: Which one of the following is not
Q6: What are the common protocols associated with
Q7: Network layer protocol exits in <br>A)host<br>B)switches<br>C)packets<br>D)bridges
Q8: DDP stands for <br>A)datagram delivery protocol<br>B)device delivery
Q10: What are called routers?<br>A)the devices that operates
Q11: Which of the following is not physical
Q12: Data in network layer is transferred in
Q13: Does network layer in TCP/IP and OSI
Q14: Which of the following is not a