When a host transmits data across a network to another host, which process does the data go through?() A.standardizationB.conversionC.encapsulationD.synchronization

When a host transmits data across a network to another host, which process does the data go through?()

A.standardization

B.conversion

C.encapsulation

D.synchronization


相关考题:

Which OSI layer header contains the address of a destination host that is on another network?A. ApplicationB. PresentationC. SessionD. TransportE. NetworkF. Data linkG. Physical

Which of the following correctly describe steps in the OSI data encapsulation process?() A. Transport layer divides a data stream into segments adds reliability flow control informationB. Data link layer adds physical source destination address an FCS to the segmentC. Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD. Packets are created when the network layers adds layers 3 address control information to a segmentE. The presentation layer translated bits into bits into voltages for transmission across the physical link

A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?() A. Drop the data.B. Send the data frames to the default gateway.C. Create an ARP request to get a MAC address for the receiving host.D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?() A. RARP requestB. Show Network Address requestC. Proxy ARP requestD. ARP requestE. Show Hardware Address request

Businesses have also been engaging in a type of electronic commerce, ______ occurs when one business transmits computer-readable data in a standard format to another business.A.EFTB.EDIC.ERPD.CRM

Anytime a host or a router has an IP datagram to send to another host or router, it has the( )address of the receiver. This address is obtained from the DNS if the sender is the host or it is found in a routing table if the sender is a router. But the IP data gram must be( ) in a frame to be able to pass through the physical network. This means that the sender needs the ( )address of the receiver. The host or the router sends an ARP query packet. The packet includes the physical and IP addresses of the sender and the IP address of the receiver. Because the sender does not know the physical address of the receiver, the query is( ) over the network.Every host or router on the network receives and processes the ARP query packet, but only the intended recipient recognizes its IP address and sends back an ARP response packet.The response packet contains the recipient's IP and physical addresses. The packet is(请作答此空) directly to the inquirer by using the physical address received in the query packet. A. multicastB. unicastC. broadcastD. multiple unicast

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]B.private]C.personalD.proper

At which OSI layer is a logical path created between two host systems()。A、sessionB、transportC、networkD、data linkE、physical

Which OSI layer header contains the address of a destination host that is another network?()A、applicationB、presentationC、sessionD、transportE、networkF、data linkG、physical

Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.

Which of the following correctly describe steps in the OSI data encapsulation process?()A、Transport layer divides a data stream into segments adds reliability flow control informationB、Data link layer adds physical source destination address an FCS to the segmentC、Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD、Packets are created when the network layers adds layers 3 address control information to a segmentE、The presentation layer translated bits into bits into voltages for transmission across the physical link

A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A、 networkB、 applicationC、 sessionD、 data link

A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()A、Host based intrusion detection softwareB、Software firewallC、NTFSD、ACL

Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A、A session key value is exchanged across the network.B、A session key never passes across the network.C、A session key is used as the key for asymmetric data encryption.D、A session key is used as the key for symmetric data encryption.

Why is QoS important in a converged network?()A、Because data does not need to arrive intact, so data transfer rates can be variableB、Because lost voice-data packets must be retransmittedC、Because voice data packets should arrive quickly and sequentially, and with no lost dataD、Because voice data packets must follow a single dedicated path through the network

When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization

When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()A、RARP requestB、Show Network Address requestC、Proxy ARP requestD、ARP requestE、Show Hardware Address request

A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A、A DCE domainB、A Kerberos domainC、A PPP tunnel between the serversD、An IPSEC tunnel between the servers

You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()A、Two network cards that support network adapter teamingB、A network card that supports Virtual Machine ChimneyC、An additional Hyper-V host and Network Load Balancing (NLB)D、An additional Hyper-V host and Failover Clustering

多选题Which of the following correctly describe steps in the OSI data encapsulation process?()ATransport layer divides a data stream into segments adds reliability flow control informationBData link layer adds physical source destination address an FCS to the segmentCPackets are created when the network layer encapsulate a frame with source destination host address protocol related control informationDPackets are created when the network layers adds layers 3 address control information to a segmentEThe presentation layer translated bits into bits into voltages for transmission across the physical link

单选题Which OSI layer header contains the address of a destination host that is another network?()AapplicationBpresentationCsessionDtransportEnetworkFdata linkGphysical

单选题A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A networkB applicationC sessionD data link

单选题A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()ADrop the data.BSend the data frames to the default gateway.CCreate an ARP request to get a MAC address for the receiving host.DSend a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

多选题Which of the following correctly describe steps in the OSI data encapsulation process?()AThe transport layer divides a data stream into segments and may add reliability and flow control information.BThe data link layer adds physical source and destination addresses and an FCS to the segment.CPackets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.DPackets are created when the network layer adds Layer 3 addresses and control information to a segment.EThe presentation layer translates bits into voltages for transmission across the physical link.

单选题When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()ARARP requestBShow Network Address requestCProxy ARP requestDARP requestEShow Hardware Address request

单选题Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()AA session key value is exchanged across the network.BA session key never passes across the network.CA session key is used as the key for asymmetric data encryption.DA session key is used as the key for symmetric data encryption.

多选题Which of the following are attributes of a hardware-based RAID controller?()ABacks up dataBLess expensive than software RAIDCVendor neutral implementationDAccessible through a BIOS interfaceEMore host CPU usage than software RAIDFAccessible through a system utility after the OS has been loadedGMay retain data in the event of a power outage