Identify the order of the 5 step encapsulation?
1. Create the segment
2. Convert the frame to bits
3. Create the packet
4. Create the frame
5. User creates the data
A.) 1,2,4,2,5
B.) 2,1,3,4,5
C.) 5,1,3,4,2
D.) 5,3,4,1,2
Answer / guest
Answer: C
Cisco 5 step encapsulation.
1) User creates Data
2) Data is converted into a segment at layer 4
3) The segment is converted to packet at layer 3
4) The packet it converted into a frame at layer 2
5) The frame is converted into bits at layer 1
Is This Answer Correct ? | 2 Yes | 0 No |
HI ALL , wanted to know if the rstp protocol.. rapid spanning tree protocol .. is imp to study with ccna's point of view or study of STP will be enough.. in some books rstp is nt given like todd lamle however in icnd2 its explained in detail.. please suggest asap .. thanks ..
What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3
what are the port numbers for DNS,FTP,TELNET,SMTP,NNTP
5 Answers Airtel, Walton Group,
How to see the running-config & startup-config infor from global configuration mode. As we know, from priviledge mode we cn see it by executing command. i.e. Router#show running-config and Router#show startup-config Now wat is the coommands use in global configuration mode o see those info. Router(Config)# ??????
WHY DO WE USE the command interface Vlan 1 ip adress x.x.x.x sub mask what does it do .. what does it create.. i know when we create it we can remotely telnet inti a router=switch. but what is the diff bwt vlan and intface vlan. ... vlan 1 bieng a native vlan remains there eve if i dont gv switch an ip address .. lease suggest.
Which layer is responsible for putting 1s and 0s into a logical group? A.) Session B.) Application C.) Transport D.) Data Link E.) Physical F.) Network
Which commands will restart the router? A.) router#system exit B.) router >reload C.) router#shutdown D.) router#reload E.) router#(config)reload F.) router#system restart
What does protocol mean?
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Which layer allows multiple Ethernet devices to uniquely identify one another on the Datalink layer? A.) Transport B.) Session C.) Network D.) Datalink - MAC Sublayer E.) Datalink - LLC Sublayer