Identify the order of the 5 step encapsulation?
1. Create the segment
2. Convert the frame to bits
3. Create the packet
4. Create the frame
5. User creates the data
A.) 1,2,4,2,5
B.) 2,1,3,4,5
C.) 5,1,3,4,2
D.) 5,3,4,1,2
Answer / guest
Answer: C
Cisco 5 step encapsulation.
1) User creates Data
2) Data is converted into a segment at layer 4
3) The segment is converted to packet at layer 3
4) The packet it converted into a frame at layer 2
5) The frame is converted into bits at layer 1
Is This Answer Correct ? | 2 Yes | 0 No |
How many broadcast domains are in switch?
What is LSA? How many types of LSA used by OSPF version 2??
Which ISDN protocol prefix specifies switching and signaling? A.) I B.) E C.) Q D.) S
What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic D.) Distance Vector
what is ACLs? what is the reasons to create ACLs?
How loops are introduced in switching? Whats the solution for that.
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
What is the size of ipv6?
Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home D. a standard 28.8 analog dialup connection to the user at home
Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP
Explain protocol?
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network