Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

A. Tagging
B. Encapsulation
C. Tunneling
D. De-encapsulation


Answer: D. De-encapsulation

Computer Science & Information Technology

You might also like to view...

In a Calc sheet, rows are numbered sequentially

Indicate whether the statement is true or false

Computer Science & Information Technology

For record retention, the three types of records are public, private, and __________

a. Covered b. Statutory c. Electronic d. None of the above

Computer Science & Information Technology

Because the bastion host stands as a sole defender on the network perimeter, it is commonly referred to as the ____________________ host.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following types of access points are equipped with both wired and wireless hardware so that the wireless client associations can be terminated onto a wired connection locally at the AP?

A) Cloud AP B) Autonomous AP C) Contained AP D) Split-MAC AP

Computer Science & Information Technology