Which layer is responsible for negotiating data transfer syntax?
A.) Network
B.) Session
C.) Application
D.) Transport
E.) Presentation
Answer / guest
Answer: E
The Presentation layer performs the following: Manages data
representation conversions, or data transfer syntax. For
example, the
Presentation layer would be responsible for converting from
EDCDIC to
ASCII. Data compression, decompression, encryption, and
decryption are
presentation layer. Presentation layer standards include
MPEG, MIDI,
PICT, TIFF, JPEG, ASCII, and EBCDIC
Is This Answer Correct ? | 4 Yes | 0 No |
What is true about frame-relay DLCI? A.) DLCI represents a single physical circuit B.) DLCI is optional in all frame-relay networks C.) DLCI identifies a logical connection between DTE devices D.) DLCI is used to tag the beginning of a frame with VLAN information
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
What is the virtual path?
Utilizing RIP, what is the limit when it comes to the number of hops?
Which command will enable debugging for IPX RIP updates? A.) debug ipx B.) debug ipx rip C.) debug ipx rip activity D.) debug rip E.) debug ipx packets
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
IPX traffic using different encapsulation types can go over the same data link A. true B. false
Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node
As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events
take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible
What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default
Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.