What is the first step in data encapsulation?

A.) User information is converted into data.

B.) Frames are put into bits.

C.) Data is converted into segments.

D.) Segments are converted into datagrams and packets.

E.) Packets are put into logical frame.



What is the first step in data encapsulation? A.) User information is converted into data. B.)..

Answer / guest

Answer: A

The Five steps to data encapsulation (IN ORDER):

1) User information is converted into data.

2) Data is converted into segments.

3) Segments are converted into datagrams and packets.

4) Packets are put into logical frame.

5) Frames are put into bits.

Is This Answer Correct ?    6 Yes 2 No

Post New Answer

More CCNA Interview Questions

Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport

1 Answers  


Identify 3 LAN technologies? A.) FDDI B.) HDLC C.) HSSI D.) X.25 E.) 802.3 F.) 802.5

1 Answers  


Identify the purpose of ARP? A.) Avoiding routing loops B.) Determining a workstation's IP address C.) Sending a directed broadcast D.) Determining a workstation's MAC address

4 Answers  


When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes

1 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  






GUYS i was refraining the OLD post and i got a good Question and wana make sure that you guys Just did not vist it for answers if you are not Aware google it understand it and then answered it the question is -: Significance of IP helper-address Command on SW? Is it necessary to put this command? you donot wana to give answer please donot visit this question and increase the vistor name if you are thinking that answer is wrong mark it wrong and explain why you are marking it wrong

0 Answers  


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

0 Answers  


What is subnetting and why it is use?

0 Answers  


You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 D. 255.255.255.248, B,128.16.32.12, 128.16.32.15

1 Answers  


Explain the draw back of ospf protocol?

0 Answers  


When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?

0 Answers  


I have layer 3 Cisco 3560(Multilayer) switch right.How we can configure sub interface & Inter VLAN(we have vlan 2,3 & 10 ),Each VLan talk with each other?

4 Answers   IBM,


Categories