niusouti.com

A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated?()A. Data, Frame, Packet, Segment, BitB. Data, Frame, Segment, Packet, BitC. Data,

题目
A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated?()

A. Data, Frame, Packet, Segment, Bit

B. Data, Frame, Segment, Packet, Bit

C. Data, Packet, Frame, Segment, Bit

D. Data, Packet, Segment, Frame, Bit

E. Data, Segment, Frame, Packet, Bit

F. Data, Segment, Packet, Frame, Bit


相似考题
更多“A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated?() ”相关问题
  • 第1题:

    A router that takes the workstations internal IP address and changes it to another IP address whenit sends the data outside of the network is an example of which of the following?()

    A.NAT

    B.IDS

    C.NMAP

    D.DMZ


    参考答案:A

  • 第2题:

    Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()

    A. It ensures that data is retransmitted if an acknowledgment is not received.

    B. It reassembles segments in the correct order on the destination device.

    C. It provides a mechanism for the receiver to control the transmission speed.

    D. It regulates the size of each datagram segment.

    E. All of the above are functions of flow control


    参考答案:C

  • 第3题:

    You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()

    • A、data marked with DSCP AF21,VOIP marked with DSCP EF
    • B、data marked with DSCP AF51,VOIP marked with DSCP EF
    • C、data marked with the DE-bit,VOIP marked with the CLP-bit
    • D、data marked with DSCP EF,VOIP marked with DSCP AF31
    • E、data marked with IP precedence 5 VOIP marked with DSCP EF

    正确答案:A

  • 第4题:

    Which two statements correctly describe the relation between a data file and the logical databasestructures()

    • A、An extent cannot spread across data files.
    • B、A segment cannot spread across data files.
    • C、A data file can belong to only one tablespace.
    • D、A data file can have only one segment created in it.
    • E、A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

    正确答案:A,C

  • 第5题:

    A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated?()

    • A、Data, Frame, Packet, Segment, Bit
    • B、Data, Frame, Segment, Packet, Bit
    • C、Data, Packet, Frame, Segment, Bit
    • D、Data, Packet, Segment, Frame, Bit
    • E、Data, Segment, Frame, Packet, Bit
    • F、Data, Segment, Packet, Frame, Bit

    正确答案:F

  • 第6题:

    Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()

    • A、It ensures that data is retransmitted if an acknowledgment is not received.
    • B、It reassembles segments in the correct order on the destination device.
    • C、It provides a mechanism for the receiver to control the transmission speed.
    • D、It regulates the size of each datagram segment.
    • E、All of the above are functions of flow control

    正确答案:C

  • 第7题:

    You are developing a client that sends several types of SOAP messages to a Windows Communication Foundation (WCF) service method named PostData. PostData is currently defined as follows:[OperationContract]void PostData(Order data);You need to modify PostData so that it can receive any SOAP message. Which code segment should you use?()

    • A、[OperationContract(IsOneWay=true, Action="*", ReplyAction="*")] void PostData(Order data);
    • B、[OperationContract(IsOneWay=true, Action="*", ReplyAction = "*")] void PostData(BodyWriter data);
    • C、[OperationContract] void PostData(BodyWriter data);
    • D、[OperationContract] void PostData(Message data);

    正确答案:D

  • 第8题:

    单选题
    In order to determine how efficiently an application is reading and writing data, which of the following utilities will report read and write sizes on disk I/O requests?()
    A

     tprof

    B

     iostat

    C

     svmon

    D

     filemon


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    A router that takes the workstations internal IP address and changes it to another IP address whenit sends the data outside of the network is an example of which of the following?()
    A

    NAT

    B

    IDS

    C

    NMAP

    D

    DMZ


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    Which of the following correctly describe steps in the OSI data encapsulation process?()
    A

    The transport layer divides a data stream into segments and may add reliability and flow control information.

    B

    The data link layer adds physical source and destination addresses and an FCS to the segment.

    C

    Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

    D

    Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

    E

    The presentation layer translates bits into voltages for transmission across the physical link.


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    单选题
    A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated?()
    A

    Data, Frame, Packet, Segment, Bit

    B

    Data, Frame, Segment, Packet, Bit

    C

    Data, Packet, Frame, Segment, Bit

    D

    Data, Packet, Segment, Frame, Bit

    E

    Data, Segment, Frame, Packet, Bit

    F

    Data, Segment, Packet, Frame, Bit


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
    A

    It ensures that data is retransmitted if an acknowledgment is not received.

    B

    It reassembles segments in the correct order on the destination device.

    C

    It provides a mechanism for the receiver to control the transmission speed.

    D

    It regulates the size of each datagram segment.

    E

    All of the above are functions of flow control


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    A. Transport layer divides a data stream into segments & adds reliability & flow control information

    B. Data link layer adds physical source & destination address & an FCS to the segment

    C. Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information

    D. Packets are created when the network layers adds layers 3 address & control information to a segment

    E. The presentation layer translated bits into bits into voltages for transmission across the physical link


    参考答案:A, D

  • 第14题:

    A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()

    A. Drop the data.

    B. Send the data frames to the default gateway.

    C. Create an ARP request to get a MAC address for the receiving host.

    D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.


    参考答案:C

  • 第15题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    • A、Transport layer divides a data stream into segments & adds reliability & flow control information
    • B、Data link layer adds physical source & destination address & an FCS to the segment
    • C、Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
    • D、Packets are created when the network layers adds layers 3 address & control information to a segment
    • E、The presentation layer translated bits into bits into voltages for transmission across the physical link

    正确答案:A,D

  • 第16题:

    Which description about asymmetric encryption algorithms is correct?()

    • A、They use the same key for encryption and decryption of data.
    • B、They use different keys for decryption but the same key for encryption of data.
    • C、They use different keys for encryption and decryption of data.
    • D、They use the same key for decryption but different keys for encryption of data.

    正确答案:C

  • 第17题:

    The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()

    • A、 Control traffic between an access point and a controller is encrypted within LWAPP.
    • B、 Data traffic between an access point and a controller is encrypted within LWAPP.
    • C、 Layer 3 mode packets are transmitted in TCP frames.
    • D、 Data traffic between an access point and a controller is encapsulated within LWAPP.
    • E、 VLAN tagging and QoS markings are applied at the access point.

    正确答案:A,D

  • 第18题:

    In order to determine how efficiently an application is reading and writing data, which of the following utilities will report read and write sizes on disk I/O requests?()

    • A、 tprof
    • B、 iostat
    • C、 svmon
    • D、 filemon

    正确答案:D

  • 第19题:

    多选题
    Which of the following correctly describe steps in the OSI data encapsulation process?()
    A

    Transport layer divides a data stream into segments & adds reliability & flow control information

    B

    Data link layer adds physical source & destination address & an FCS to the segment

    C

    Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information

    D

    Packets are created when the network layers adds layers 3 address & control information to a segment

    E

    The presentation layer translated bits into bits into voltages for transmission across the physical link


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    单选题
    A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()
    A

    Drop the data.

    B

    Send the data frames to the default gateway.

    C

    Create an ARP request to get a MAC address for the receiving host.

    D

    Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements correctly describe the relation between a data file and the logical databasestructures()
    A

    An extent cannot spread across data files.

    B

    A segment cannot spread across data files.

    C

    A data file can belong to only one tablespace.

    D

    A data file can have only one segment created in it.

    E

    A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.


    正确答案: D,E
    解析: 暂无解析

  • 第22题:

    单选题
    You issued the following command:   ALTER TABLE SCOTT.EMP SHRINK SPACE;   The SCOTT.EMP table is stored in the DATA1 tablespace that has the following properties:   DATA1 is a read/write tablespace.   DATA1 is not autoextensible to an unlimited size.  DATA1 is online.   Segment space management for the DATA1 tablespace is manual.   You issued the ALTER TABLE SCOTT.EMP SHRINK SPACE; command that generates the following error:   ORA-10635: Invalid segment or tablespace type    What could be the reason for the failure of the command?()
    A

     The tablespace, DATA1, is not read-only.

    B

     The tablespace, DATA1, is not autoextensible.

    C

     The tablespace, DATA1, is not offline.

    D

     The segment space management for the tablespace, DATA1, is manual.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which description about asymmetric encryption algorithms is correct?()
    A

    They use the same key for encryption and decryption of data.

    B

    They use different keys for decryption but the same key for encryption of data.

    C

    They use different keys for encryption and decryption of data.

    D

    They use the same key for decryption but different keys for encryption of data.


    正确答案: B
    解析: 暂无解析