Which layer is responsible for identifying and establishing the
availability of the intended communication partner?
A.) Application
B.) Presentation
C.) Transport
D.) Session
E.) Network
Answer / guest
Answer: A
The Application layer performs the following: Synchronizing
sending and
receiving applications. Program-to program communication.
Identify and
establish the availability of the intended communication
partner, and
determine if sufficient resources exist for the
communication. Popular
application protocols include WWW, SMTP, EDI, FTP, Telnet,
and SNMP
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the network subnet?
How would you configure one host name that points to two IP addresses? A. IP host jacob 1.0.0.5 2.0.0.8 B. IP jacob 1.0.0.5 2.0.0.8 C. IP host jacob 1.0.0.5 D. IP host duplicate "all"
The ICMP (referred to in RFC 1700) is implented by all TCP/IP hosts. A. true B. false
How to find Router Serial interface MAC address?
Select the fields for the Cisco HDLC protocol: A. Flag, Address, Control B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag C. Flag, Address, Control, Data, FCS, Flag D. Flag, Address, Control, Proprietary, Data, FCS, Flag
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
Differentiate between broadcast domain and collision domain
PLACE YOURS QUESTION HERE I ALSWYS BE HERE FROM 9 AM TO 6PM SO U CAN FIND YOUR ANSWER QUICKLY.IF I KNOW THEN ? JJIITTEENNDDEERRAA SSIINNHHAA
What is a disadvantage of using a connection oriented protocal such as TCP? A. Packet acknowledgement may add overhead B. packets are not tagged with sequence numbers C. Loss or duplication of data packets is more likely to occur D. The application layer must assume responsibility for correct searchers of the data packets
A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?
Can you explain the basic of encryption in VPN?
What does a metric of 16 hops represent when using RIP? A.) Number of hops to the destination B.) Destination unreachable C.) Number of routers D.) Bandwidth