1
How is a MAC address represented?
four groups of eight binary digits separated by a decimal point
four Base10 digits separated by a decimal point
six hexadecimal digits
*** twelve hexadecimal digits
twenty-four Base10 digits
2
Which of the following are specified by IEEE standards as sublayers of the OSI data link layer? (Choose two.)
*** Logical Link Control
Logical Layer Control
*** Media Access Control
Logical Link Communication
Media Access Communication
Physical Access Communication
3
Which of the following are features of a Token Ring network? (Choose two.)
*** collisionless environment
non-deterministic
*** deterministic
uses CSMA/CD
prone to collisions
4
Which ports on a hub forward traffic?
only to the port where the destination host resides
to the ports in all other collision domains
*** all ports except the originating port
all ports
5
Which characteristics of Ethernet contribute to its widespread use? (Choose three.)
*** ease of maintenance
collision free technology
*** scalability
*** low cost of installation
compatibility with 802.5 standard
collision avoidance capabilities
6
Ethernet standard specifications limit network service interruption. Select the items that describe the standards. (Choose three.)
minimum segment length
*** maximum segment length
minimum number of stations per segment
*** maximum number of stations per segment
minimum number of repeaters between segments
*** maximum number of repeaters between segments
7
What is the name of the Layer 2 Protocol Data Unit(PDU)?
packet
*** frame
bit
data
segment
8
What is the length of a MAC address?
8 bits
8 bytes
24 bits
24 bytes
*** 48 bits
48 bytes
9
Which of the following are the functions of CSMA/CD? (Choose three.)
*** transmitting and receiving data packets
releasing a token when the network is clear
*** detecting errors within data packets or on the network
passing a token to each station on the network
*** decoding data packets and checking them for valid addresses before passing them to the upper layers of the OSI model
10
In which two layers of the OSI model does Ethernet function? (Choose two.)
application
session
transport
network
*** data link
*** physical
11
Which statements below are true about Ethernet? (Choose three.)
addresses the needs of Layer 2 and Layer 3 of the OSI model
first released as a Xerox proprietary standard
*** essentially the same as 802.3 standards
*** bandwidth can be increased without changing the underlying technology
essentially the same as 802.2 standards
X original idea developed at the University of Hawaii
12
Which options below are field names of a generic frame? (Choose three.)
IP header
voltage reference
*** data
description
*** length
*** frame check sequence
13
What does the word "Base" indicate in 10Base2?
The number standard used.
*** Baseband signaling is used.
Only a portion of the transmission medium is used.
Broadband signaling is used.
14
What happens on an Ethernet network after a collision occurs? (Choose three.)
*** A backoff algorithm is invoked and transmission is stopped.
Devices involved in the collision have a random period of time for priority retransmission of the damaged packet.
The devices involved in the collision release a token indicating the time each station may begin retransmitting.
*** The devices involved in the collision do not have priority to transmit data.
*** The devices with data to transmit return to a listen-before-transmit mode.
Transmit work will restart with the reissuance of all data.
15
After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?
the device involved in the collision with the lowest MAC address
the device involved in the collision with the lowest IP address
*** any device in the collision domain whose backoff timer expires first
those that began transmitting at the same time
16
Where does the MAC address originate?
DHCP server database
configured by the administrator
*** burned into ROM on the NIC card
network configuration on the computer
included in the creation of the processor chip
17
Which features describe the concept of Carrier Sense Multiple Access with Collision Detection? (Choose two.)
collisionless environment
*** non-deterministic
deterministic
*** uses first-come, first-served approach
uses a token to transmit data
18
Which of the following is included in the frame address field? (Choose two.)
source IP address
destination IP address
destination subnet mask
*** source MAC address
*** destination MAC address
Kaynak: Cisco Curr v3.1
belgesi-1235
ÖZELLİKLER: Boyut: 28x8x6 cm Ağırlık: 850gr Ekran: Yok Devre sayısı: 30 Konuşma süresi: 35 dakika…
There are two kinds of questions: yes or no questions and wh- questions. You ask…
A positive sentence tells you that something is so. A sentence that tells you something…
Use the base form of a verb to give commands or make direct requests. This…
A sentence is a group of words that expresses a complete thought. A sentence must…
An interjection is a word that expresses a sudden, strong feeling such as surprise, pain,…