Which layer of the 7 layer model is responsible for representing
the application information between 2 different OS's? For
example,
converting ASCII to EBCIDIC.
A.) Transport
B.) Application
C.) Physical
D.) Session
E.) Presentation
F.) Network
Answers were Sorted based on User's Feedback
Answer / guest
Answer: E
The OSI Presentation layer formats the data, which includes
encryption
services.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / m haja bahurudeen
Ans : E) Presentation
This layer responsible for presenting the data to standard
format.
encoding - decoding
compress - decompress
encrypt - decrypt
| Is This Answer Correct ? | 1 Yes | 0 No |
Guys Please send me or suggest me any link for all interview question and answer on CCNA asked in TECH MAHINDRA. I have only 4-5 days for preparation. my mail id is nikhil9823@gmail.com
As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command? A. 6 B. 1 C. 2 D. 4
hi shain i have got some virus who make the .exe file that is duplicate of original file on my server 2007 windows can u suggest me any anti virus help help please help
What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.) Telnet D.) Ping E.) Trace
Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via UDP. Don't worry about the other access list lines.
what do you mean by port triggering?
IP RIP routing is conferred on a router but not all interfaces attach to RIP networks. What should you use to prevent all RIP routing updates from being sent through selecedc interfaces without using access lists? A. passive route B. default routes C. passive interface D. route update filtering
What is the administrative distance for RIP? A.) 100 B.) 90 C.) 120 D.) 110
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
What is Cisco's default encapsulation method on serial interfaces? A.) ANSI B.) Cisco C.) Q933a D.) HDLC
Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply