Put the following steps of encapsulation into the correct order:

1) The data is broken into segments to be organized

2) Frames are converted to 1s and 0s to be put on the wire

3) Packets are converted into frames

4) Information that users enter is converted into data

5) The segments are changed to packets to be routed

A.) 4, 1, 3, 2, 5

B.) 4, 5, 1, 3, 2

C.) 2, 3, 1, 4, 5

D.) 4, 1, 5, 3, 2

Answers were Sorted based on User's Feedback



Put the following steps of encapsulation into the correct order: 1) The data is broken into segme..

Answer / guest

Answer: D

Follow the steps through the Layers of the OSI model to get
the answer.

Watch the key words in each line to help you determine the
steps.

Is This Answer Correct ?    21 Yes 4 No

Put the following steps of encapsulation into the correct order: 1) The data is broken into segme..

Answer / md.azharuddin

D as per the OSI reference model D is the correct answer

Is This Answer Correct ?    10 Yes 2 No

Put the following steps of encapsulation into the correct order: 1) The data is broken into segme..

Answer / daniel

C

Is This Answer Correct ?    5 Yes 2 No

Post New Answer

More CCNA Interview Questions

Which ISDN specification series deals with Concepts and Terminology? A.) World Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series

1 Answers  


Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP

2 Answers  


Hi Jitendera, I need ur suggestion. I completed my CCNA certification & also hving some sort of real time experience. Now i m planning to do CCNP. Little bit confusion is that whether it wud be better for me to go for CCNP ya CCNA (Security). As off my goal is to reach CCIE (Security & Switching/Routing). So tell me some solution of my confusion yaar..!!! Thanx & Regards Shahin..

1 Answers  


Identify the 2 commands that save the running-config to a TFTP server? A.) write running tftp B.) copy running network C.) copy running tftp D.) write network

1 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  






Identify 2 features of PPP CHAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) Less secure then PAP D.) Local router 'challenges' the remote router

1 Answers  


Assuming no subnetting, which two pieces of information can be derived from the IP address 144.132.25.10? (Choose two) A. It is a Class C address B. It is a Class B address C. The network address is 144.0.0.0 D. The network address is 144.132.25.0 E. The host spoon of the address is 25.10

2 Answers  


in the ospf area network dr and bdr selection procedure occur let there are 4 router in that n/w r1 have the higher priority then r2 and r2 have higher priority then r3 and so on like that r1>r2>r3>r4 now as we know that selection of dr and bdr based upon the router priority so in this case r1 will be dr and r2 will be bdr now my question is that if i am going to implement 5th router which have greater priority then r1 then will it become dr atomically remember that i am not going change my 5 or 1st router property answer that one please

4 Answers  


Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring

2 Answers  


What is the protocol and what is the second part of the following network address? 172.16.0.254 mask - 255.255.0.0 A. IPX MAC address B. IP Class C directed broadcast C. Private IP address node number D. Public IP directed broadcast E. Private IP directed broadcast

1 Answers  


Which two types of route table entries are used by a Layer 3 router to determine the appropriate path to destination? (Choose two) A. static route entry B. default route entry C. Dynamic route entry D. temporary route entry E. permanent route entry

2 Answers  


In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?

0 Answers  


Categories