Which layer is responsible for negotiating data transfer syntax?

A.) Network

B.) Session

C.) Application

D.) Transport

E.) Presentation



Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C...

Answer / guest

Answer: E

The Presentation layer performs the following: Manages data

representation conversions, or data transfer syntax. For
example, the

Presentation layer would be responsible for converting from
EDCDIC to

ASCII. Data compression, decompression, encryption, and
decryption are

presentation layer. Presentation layer standards include
MPEG, MIDI,

PICT, TIFF, JPEG, ASCII, and EBCDIC

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is true about frame-relay DLCI? A.) DLCI represents a single physical circuit B.) DLCI is optional in all frame-relay networks C.) DLCI identifies a logical connection between DTE devices D.) DLCI is used to tag the beginning of a frame with VLAN information

1 Answers  


Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2

1 Answers  


What is the virtual path?

0 Answers  


Utilizing RIP, what is the limit when it comes to the number of hops?

0 Answers  


Which command will enable debugging for IPX RIP updates? A.) debug ipx B.) debug ipx rip C.) debug ipx rip activity D.) debug rip E.) debug ipx packets

2 Answers  






what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?

0 Answers  


IPX traffic using different encapsulation types can go over the same data link A. true B. false

1 Answers  


Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node

1 Answers  


As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events

1 Answers  


take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible

6 Answers   AT&T,


What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default

1 Answers  


Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.

2 Answers  


Categories