The functionalities of the presentation layer
include ____________
a. Data compression
b. Data encryption
c. Data description
d. All of the mentioned

1 Answer

Answer :

d. All of the mentioned

Related questions

Description : The functionalities of the presentation layer include ____________ a. Data compression b. Data encryption c. Data description d. All of the mentioned

Last Answer : d. All of the mentioned

Description : The functionalities of the presentation layer include ____________ a) Data compression b) Data encryption c) Data description d) All of the mentioned

Last Answer : d) All of the mentioned

Description : What occurs in the session layer? a.Data compression and encryption b.MAC address are handled c.binary to decimal conversion d.sessions are created

Last Answer : d.sessions are created

Description : Encryption and decryption are functions of which layer? a. transport b. session c. application d. presentation

Last Answer : d. presentation

Description : The _____ layer uses data compression to reduce the number of bits to be transmitted. a. presentation b. network c. data link d. application

Last Answer : a. presentation

Description : Draw the Internet architecture [TCP/IP architecture] and explain the functionalities of each layer in detail.

Last Answer : ∙ NET1, NET2, and so on. combination of hardware (e.g., a network adaptor) and software(e.g., a network device driver). Ethernet or Fiber Distributed Data Interface (FDDI) ... ), and SMTP (Simple Mail Transfer Protocol, or electronic mail), enable interoperation of popular applications.

Description : Draw the OSI Network architecture and explain the functionalities of each layer in detail.

Last Answer : Physical layer ∙ Data link layer ∙ Network layer ∙ Transport layer ∙ Session layer ∙ Presentation layer ∙ Application layer

Description : The layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : The..............layer change bits onto electromagnetic signals. A) Physical B) Transport C) Data Link D) Presentation

Last Answer : A) Physical

Description : The TCP/IP _______ layer is equivalent to the combined session, presentation, and application layers of the OSI model. a.data link b.network c.physical d.application

Last Answer : d.application

Description : In which layer of OSI session is first check and then data is transmitted a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : The _______ layer ensures interoperability between communicating devices through transformation of data into a mutually agreed upon format. a. network b. presentation c. transport d. data link

Last Answer : b. presentation

Description : Which of the following layers of the OSI reference model is concerned with the syntax of data exchanged between application entities? a. Presentation layer b. Application layer c. Transportation layer d. Session layer

Last Answer : a. Presentation layer

Description : The _____ layer lies between the session layer and he application layer. a. network b. transport c. data link d. presentation

Last Answer : d. presentation

Description : The session layer lies between the ______layer and the presentation layer. a. network b. transport c. data link d. application

Last Answer : b. transport

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : Choose the correct layer numbers and names of the OSI model below. a. Layer 3 - Network Layer, Layer 2 - Data Link Layer, Layer 1 - Physical Layer b. Layer 7 - Application Layer, Layer 6 - Presentation Layer c. Layer 5 - Session Layer, Layer 4 - Transport Layer d. All given options

Last Answer : d. All given options

Description : Which among the following layer' main function is data formats, data encryption/decryption, data compression/decompression etc: a) Session Layer b) Transport Layer c) Presentation Layer d) None of These

Last Answer : c) Presentation Layer

Description : The _______ is used to provide integrity check, authentication, and encryption to IP datagram’s. A. UDP B. Transport layer C. ESP D. SSL

Last Answer : C. ESP

Description : In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a.Application layer b.Transport layer c.Link layer d.Session layer

Last Answer : a.Application layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ a. network layer b. data link layer c. application layer d. physical layer

Last Answer : a. network layer

Description : .In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is ____________ a. Application layer b. Transport layer c. Link layer d. Session layer

Last Answer : a. Application layer

Description : Transport layer aggregates data from different applications into a single stream before passing it to ____________ A. network layer B. data link layer C. application layer D. physical layer

Last Answer : A. network layer

Description : TCP/IP layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) Application

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : Which layer provides the services to user? a.application layer b.session layer c.presentation layer d.physical layer

Last Answer : a.application layer

Description : The TCP/IP …………corresponds to the combined session, presentation, and application layers of the OSI model. a.session layer b.presentation layer c.application layer d.None of the above

Last Answer : c.application layer

Description : In which layer of OSI client send request to the server? a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : Which of the following layers is an addition to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer

Last Answer : d. Session and Presentation layer

Description : Which network component/s is/are involved in the Presentation layer of an OSI model? a. Gateway b. Multiplexer & Oscilloscope c. Amplifier & Hub d. All of the above

Last Answer : a. Gateway

Description : In OSI model, which of the following layer transforms information from machine format into that understandable by user a. application b. session c. presentation d. physical

Last Answer : c. presentation

Description : The ____ layer establishes, maintains, and synchronizes the interaction between communicating systems. a. network b. transport c. session d. presentation

Last Answer : c. session

Description : The ____ layer is the network dialog controller. a. network b. transport c. session d. presentation

Last Answer : c. session

Description : Which of the following layers is an addition to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer

Last Answer : d. Session and Presentation layer

Description : Which is the additional layer to OSI model when compared with TCP IP model? a. Application layer b. Presentation layer c. Session layer d. Session and Presentation layer

Last Answer : d. Session and Presentation layer

Description : TCP/IP layer is equivalent to combined Session, Presentation and a. Transport layer b. Network layer c. Application layer d. Physical layer

Last Answer : c. Application layer

Description : Data encryption techniquesare particularly useful for A. reducingstorage space requirements B. improving data integrity C. protecting data indata communication systems D. All of theabove E. None of the above

Last Answer : protecting data indata communication systems

Description : Modulation is theprocessof A. converting analogsignals todigital signals B. converting digital signals toanalog signals C. Multiplexing various signals intohigh speed line signals D. performing data encryption

Last Answer : converting digital signals toanalog signals

Description : The altering of data so that it is not usable unless the changes are undone is i) Ergonomics ii) Compression iii) Biometrics iv) Encryption

Last Answer : iv) Encryption

Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only

Last Answer : Compression and Deduplication

Description : Which of the following techniques can be used for optimizing backed up data space? a) Encryption and Deduplication b) Compression and Deduplication c) Authentication and Deduplication d) Deduplication only

Last Answer : Compression and Deduplication

Description : Transport layer protocols deals with ____________ A. application to application communication B. process to process communication C. node to node communication D. man to man communication

Last Answer : B. process to process communication

Description : Application layer is implemented in ____________ a) End system b) NIC c) Ethernet d) Packet transport

Last Answer : a) End system

Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned

Last Answer : Data Privacy

Description : Which of the following are a common means for losing encrypted data? a) lose the keys b) lose the encryption standard c) lose the account d) all of the mentioned

Last Answer : lose the keys

Description : NAT limits the use of ………………….. and ……………… A. encryption, authentication. B. encryption, decryption C. encapsulation, translation D. authentication, verification

Last Answer : A. encryption, authentication.

Description : Transmission media are usually categorized as . a. Guided or Unguided b. Determinate or Indeterminate c. Fixed or Unfixed d. Encryption or Decryption

Last Answer : a. Guided or Unguided

Description : What are the advantages & disadvantages of public key encryption?

Last Answer : Advantages: a) Remove the restriction of a shared secret key between two entities. Here each entity can create a pair of keys, keep the private one, and publicly distribute the other one. b) The no ... using the long keys takes a lot of time. So it is not recommended for large amounts of text.

Description : Demodulation is aprocessof A. converting analog to digital signals B. converting digital to analogsignals C. multiplexing various signals intoone high speed line signals D. performing data description

Last Answer : converting analog to digital signals