When a host transmits data across a network to another host, which process does the data go through?()A.standardizationB.conversionC.encapsulationD.synchronization

题目
When a host transmits data across a network to another host, which process does the data go through?()

A.standardization

B.conversion

C.encapsulation

D.synchronization


相似考题
更多“When a host transmits data across a network to another host, which process does the data go through?() ”相关问题
  • 第1题:

    Businesses have also been engaging in a type of electronic commerce, ______ occurs when one business transmits computer-readable data in a standard format to another business.

    A.EFT
    B.EDI
    C.ERP
    D.CRM

    答案:B
    解析:

  • 第2题:

    IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

    A.pubic]
    B.private]
    C.personal
    D.proper

    答案:B
    解析:

  • 第3题:

    Which OSI layer header contains the address of a destination host that is another network?()

    • A、application
    • B、presentation
    • C、session
    • D、transport
    • E、network
    • F、data link
    • G、physical

    正确答案:E

  • 第4题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    • A、Transport layer divides a data stream into segments & adds reliability & flow control information
    • B、Data link layer adds physical source & destination address & an FCS to the segment
    • C、Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
    • D、Packets are created when the network layers adds layers 3 address & control information to a segment
    • E、The presentation layer translated bits into bits into voltages for transmission across the physical link

    正确答案:A,D

  • 第5题:

    A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()

    • A、Host based intrusion detection software
    • B、Software firewall
    • C、NTFS
    • D、ACL

    正确答案:B

  • 第6题:

    Why is QoS important in a converged network?()

    • A、Because data does not need to arrive intact, so data transfer rates can be variable
    • B、Because lost voice-data packets must be retransmitted
    • C、Because voice data packets should arrive quickly and sequentially, and with no lost data
    • D、Because voice data packets must follow a single dedicated path through the network

    正确答案:C

  • 第7题:

    When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()

    • A、RARP request
    • B、Show Network Address request
    • C、Proxy ARP request
    • D、ARP request
    • E、Show Hardware Address request

    正确答案:D

  • 第8题:

    You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()

    • A、Two network cards that support network adapter teaming
    • B、A network card that supports Virtual Machine Chimney
    • C、An additional Hyper-V host and Network Load Balancing (NLB)
    • D、An additional Hyper-V host and Failover Clustering

    正确答案:B

  • 第9题:

    单选题
    Which OSI layer header contains the address of a destination host that is another network?()
    A

    application

    B

    presentation

    C

    session

    D

    transport

    E

    network

    F

    data link

    G

    physical


    正确答案: F
    解析: 暂无解析

  • 第10题:

    单选题
    A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()
    A

    Drop the data.

    B

    Send the data frames to the default gateway.

    C

    Create an ARP request to get a MAC address for the receiving host.

    D

    Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()
    A

    RARP request

    B

    Show Network Address request

    C

    Proxy ARP request

    D

    ARP request

    E

    Show Hardware Address request


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which of the following are attributes of a hardware-based RAID controller?()
    A

    Backs up data

    B

    Less expensive than software RAID

    C

    Vendor neutral implementation

    D

    Accessible through a BIOS interface

    E

    More host CPU usage than software RAID

    F

    Accessible through a system utility after the OS has been loaded

    G

    May retain data in the event of a power outage


    正确答案: F,D
    解析: 暂无解析

  • 第13题:

    Anytime a host or a router has an IP datagram to send to another host or router, it has the( )address of the receiver. This address is obtained from the DNS if the sender is the host or it is found in a routing table if the sender is a router. But the IP data gram must be( ) in a frame to be able to pass through the physical network. This means that the sender needs the ( )address of the receiver. The host or the router sends an ARP query packet. The packet includes the physical and IP addresses of the sender and the IP address of the receiver. Because the sender does not know the physical address of the receiver, the query is( ) over the network.Every host or router on the network receives and processes the ARP query packet, but only the intended recipient recognizes its IP address and sends back an ARP response packet.The response packet contains the recipient's IP and physical addresses. The packet is(请作答此空) directly to the inquirer by using the physical address received in the query packet.

    A. multicast
    B. unicast
    C. broadcast
    D. multiple unicast

    答案:B
    解析:
    任何时候主机或路由器要发送 IP 数据报发送给另一主机或路由器时,都需要知道接收方的逻辑地址。发送主机从 DNS 获得该地址,发送路由器则在路由表中找到该地址。但 IP 数据报必须封装在帧中才能通过物理网络。这意味着发送者需要知道接收者的物理地址。主机或路由器需发送 ARP 查询报文,该报文分组包含发送者的物理地址和 IP 地址及接收者的 IP 地址。这是因为送者不知道接收者的物理地址,所以需在全网广播报文。网络上的每个主机或路由器都能接收并处理该 ARP 查询报文,但只有预期的接收者识别其 IP 地址并响应该 ARP 报文。响应报文包含接收者的 IP 地址和物理地址。包含了接收者物理地址的响应报文分组通过单播的方式直接发送给发送者。

  • 第14题:

    At which OSI layer is a logical path created between two host systems()。

    • A、session
    • B、transport
    • C、network
    • D、data link
    • E、physical

    正确答案:C

  • 第15题:

    Which is the main difference between host-based and network-based intrusion prevention?()

    • A、Host-based IPS can work in promiscuous mode or inline mode.
    • B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
    • C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
    • D、Host-based IPS deployment requires less planning than network-based IPS.

    正确答案:B

  • 第16题:

    A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()

    • A、 network
    • B、 application
    • C、 session
    • D、 data link

    正确答案:D

  • 第17题:

    Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()

    • A、A session key value is exchanged across the network.
    • B、A session key never passes across the network.
    • C、A session key is used as the key for asymmetric data encryption.
    • D、A session key is used as the key for symmetric data encryption.

    正确答案:B

  • 第18题:

    When a host transmits data across a network to another host, which process does the data go through?()

    • A、standardization
    • B、conversion
    • C、encapsulation
    • D、synchronization

    正确答案:C

  • 第19题:

    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()

    • A、A DCE domain
    • B、A Kerberos domain
    • C、A PPP tunnel between the servers
    • D、An IPSEC tunnel between the servers

    正确答案:D

  • 第20题:

    多选题
    Which of the following correctly describe steps in the OSI data encapsulation process?()
    A

    Transport layer divides a data stream into segments & adds reliability & flow control information

    B

    Data link layer adds physical source & destination address & an FCS to the segment

    C

    Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information

    D

    Packets are created when the network layers adds layers 3 address & control information to a segment

    E

    The presentation layer translated bits into bits into voltages for transmission across the physical link


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    单选题
    A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()
    A

     network

    B

     application

    C

     session

    D

     data link


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following correctly describe steps in the OSI data encapsulation process?()
    A

    The transport layer divides a data stream into segments and may add reliability and flow control information.

    B

    The data link layer adds physical source and destination addresses and an FCS to the segment.

    C

    Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.

    D

    Packets are created when the network layer adds Layer 3 addresses and control information to a segment.

    E

    The presentation layer translates bits into voltages for transmission across the physical link.


    正确答案: E,B
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()
    A

    A session key value is exchanged across the network.

    B

    A session key never passes across the network.

    C

    A session key is used as the key for asymmetric data encryption.

    D

    A session key is used as the key for symmetric data encryption.


    正确答案: A
    解析: 暂无解析