Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Friday, 17 January 2014
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model.
Query 1
according to you, Where does routing occur within the DoD TCP/IP model?
a. application
b. internet
c. network
d. transport
b. internet
c. network
d. transport
Solution: b
Clarification
let's have look at comparison of TCP/IP and OSI model. Notice that the Internet Layer of TCP/IP is equivalent to the Network Layer which is responsible for routing decision.
Difference |
Query 2
Refer to exhibit.
Router#show running-config Building configuration… Current configuration : 659 bytes ! version 12.4 no service timestamps log datetime msec no service timestamps debug datetime msec service password-encryption ! hostname Router ! enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0 ! interface FastEthernet0/0 ip address 192.168.1.1 255.255.255.0 ip access-group 101 in duplex auto speed auto ! access-1ist 101 deny tcp any any eq 22 access-1ist 101 permit ip any any ! line con 0 password 7 0822455D0A16 login line vty 0 4 login line vty 5 14 login ! end |
A network administrator cannot establish a Telnet session with the indicated router. What is the cause of this failure?
a. A Level 5 password is not set.
b. An ACL is blocking Telnet access.
c. The vty password is missing.
d. The console password is missing.
b. An ACL is blocking Telnet access.
c. The vty password is missing.
d. The console password is missing.
Solution: C
Query 3
according to you, Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two)
a. the amount of available ROM
b. the amount of available flash and RAM memory
c. the version of the bootstrap software present on the router
d. show version
e. show processes
f. show running-config
b. the amount of available flash and RAM memory
c. the version of the bootstrap software present on the router
d. show version
e. show processes
f. show running-config
Solution: B D
Clarification:
When upgrading new version of the IOS we copy the IOS to the Flash so that first we have to check if the Flash has enough memory. Running the new IOS may require more RAM than the older one so we should check the available RAM too. for this purpose we use “show version” command.
Query 4
Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the output as shown. At which OSI layer is the problem?
C:\> ping 10.10.10.1 Pinging 10.10.10.1 with 32 bytes of data: Request timed out. Request timed out. Request timed out. Request timed out. Ping statistics for 10.10.10.1: Packets: sent – 4, Received = 0, Lost – 4 (100% loss) |
a. data link layer
b. application layer
c. access layer
d. session layer
e. network layer
b. application layer
c. access layer
d. session layer
e. network layer
Solution: e
Clarification:
The Network layer is responsible for network addressing and routing through the internet work. So a ping fails, you may have an issue with the Network layer.
Query 5
according to you, At which layer of the OSI model does PPP perform?
a. Layer 2
b. Layer 3
c. Layer 4
d. Layer 5
b. Layer 3
c. Layer 4
d. Layer 5
Solution: a
Query 6
according to you, Which of the following correctly describe steps in the OSI data encapsulation process? (Choose any two options)
a. The transport layer divides a data stream into segments and may add reliability and flow control information.
b. The data link layer adds physical source and destination addresses and an FCS to the segment.
c. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
d. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
e. The presentation layer translates bits into voltages for transmission across the physical link.
b. The data link layer adds physical source and destination addresses and an FCS to the segment.
c. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
d. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
e. The presentation layer translates bits into voltages for transmission across the physical link.
Solution: a,d
Clarification:
The transport layer segments data into smaller pieces for transport. Each segment is assigned a sequence number, so that the receiving device can reassemble the data on arrival.
The transport layer also use flow control to maximize the transfer rate while minimizing the requirements to retransmit. For example, in TCP, basic flow control is implemented by acknowledgment by the receiver of the receipt of data; the sender waits for this acknowledgment before sending the next part.
why A is correct.
The data link layer adds physical source and destination addresses and an Frame Check Sequence (FCS) to the packet (on Layer 3), not segment (on Layer 4) -> B is not correct.
Packets are created when network layer encapsulates a segment (not frame) with source and destination host addresses and protocol-related control information. Notice that the network layer encapsulates messages received from higher layers by placing them into datagrams (also called packets) with a network layer header -> C is not correct.
The Network layer (Layer 3) has two key responsibilities. First, this layer controls the logical addressing of devices. Second, the network layer determines the best path to a particular destination network, and routes the data appropriately.
why D is correct.
The Physical layer (presentation layer) translates bits into voltages for transmission across the physical link -> E is not correct.
Query 7
According to you, A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the network administrator is using for this operation?
a. application
b. presentation
c. session
d. transport
e. internet
f. data link
b. presentation
c. session
d. transport
e. internet
f. data link
Solution: a
Clarification:
FTP belongs to Application layer and it is also the highest layer of the OSI model.
Query 8
according to you, At which layer of the OSI model is RSTP used to prevent loops?
a. data link
b. network
c. physical
d. transport
b. network
c. physical
d. transport
Solution: a
Query 9
according to you, Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?
a. transport
b. network
c. presentation
d. session
e. application
b. network
c. presentation
d. session
e. application
Solution: e
Query 10
according to you, A receiving host computes the checksum on a frame and determines that the frame is damaged. The frame is then discarded. At which OSI layer did this happen?
a. session
b. network
c. physical
d. data link
e. transport
b. network
c. physical
d. data link
e. transport
Solution: d
Clarification:
well, When using the term “frame” we can easily recognize it belongs to the Data Link layer. In this layer, an Frame Check Sequence (FCS) field is added to the frame to verify that the frame data is received correctly.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment