What is the first step in data encapsulation?
A.) User information is converted into data.
B.) Frames are put into bits.
C.) Data is converted into segments.
D.) Segments are converted into datagrams and packets.
E.) Packets are put into logical frame.
Answer / guest
Answer: A
The Five steps to data encapsulation (IN ORDER):
1) User information is converted into data.
2) Data is converted into segments.
3) Segments are converted into datagrams and packets.
4) Packets are put into logical frame.
5) Frames are put into bits.
Is This Answer Correct ? | 6 Yes | 2 No |
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport
Identify 3 LAN technologies? A.) FDDI B.) HDLC C.) HSSI D.) X.25 E.) 802.3 F.) 802.5
Identify the purpose of ARP? A.) Avoiding routing loops B.) Determining a workstation's IP address C.) Sending a directed broadcast D.) Determining a workstation's MAC address
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
GUYS i was refraining the OLD post and i got a good Question and wana make sure that you guys Just did not vist it for answers if you are not Aware google it understand it and then answered it the question is -: Significance of IP helper-address Command on SW? Is it necessary to put this command? you donot wana to give answer please donot visit this question and increase the vistor name if you are thinking that answer is wrong mark it wrong and explain why you are marking it wrong
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
What is subnetting and why it is use?
You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 D. 255.255.255.248, B,128.16.32.12, 128.16.32.15
Explain the draw back of ospf protocol?
When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?
I have layer 3 Cisco 3560(Multilayer) switch right.How we can configure sub interface & Inter VLAN(we have vlan 2,3 & 10 ),Each VLan talk with each other?