Which of the following technique is used for encapsulation?
Options
A. a technique used in best-effort delivery systems to avoid endlessly looping packets.
B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
D. All of the above
E. None of the above
Correct Answer
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
More questions
1. The loss in signal power as light travels down the fiber is called
6. Assume, you are the administrator of the TUNA domain. You need to allow Lisa from the BASS domain to administrate the TUNA domain while you are on vacation. A one-way trust relationship has been set up so that TUNA trusts BASS. Which group assignments would accomplish your needs?
Options
A. Create a global group in the TUNA domain called Tuna-Admins that contains the BASSWLisa user account. Add the Tuna-Admins group to the local Administrators group in TUNA
B. Create a local group in TUNA called Tuna-Admins that contains the BASSWLisa user account. Add the Tuna-Admins group to the global Domain Admins group in TUNA
C. Create a global group in BASS called Gbl-Admins that contains the Lisa user account. Add the BASS\Gbl-Admins group to the local Administrators group in TUNA
D. Create a local group in BASS called Loc-Admins that contains the Lisa user account. Create a global group in TUNA called Tuna-Admins that contains the BASSWLoc-Admins group. Add the Tuna-Admins group to the local Administrators group in TUNA
Correct Answer: Create a global group in BASS called Gbl-Admins that contains the Lisa user account. Add the BASS\Gbl-Admins group to the local Administrators group in TUNA
7. Strong AI is
Options
A. the embodiment of human intellectual capabilities within a computer.
B. a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans.
C. the study of mental faculties through the use of mental models implemented on a computer.