1 Which options are properties of contention-based media
access for a shared media? (Choose three.)
non-deterministic
less overhead
one station transmits at a time
collisions exist
devices must wait their turn
token passing
2. What is a primary purpose of encapsulating packets into
frames?
provide routes across the internetwork
format the data for presentation to the user
facilitate the entry and exit of data on media
identify the services to which transported data is
associated
3. What is true concerning physical and logical topologies?
The logical topology is always the same as the physical
topology.
Physical topologies are concerned with how a network
transfers frames.
Physical signal paths are defined by Data Link layer
protocols.
Logical topologies consist of virtual connections between
nodes.
4 What are three characteristics of valid Ethernet Layer 2
addresses? (Choose three.)
They are 48 binary bits in length.
They are considered physical addresses.
They are generally represented in hexadecimal format.
They consist of four eight-bit octets of binary numbers.
They are used to determine the data path through the
network.
They must be changed when an Ethernet device is added or
moved within the network.
5 What determines the method of media access control?
(Choose two.)
network layer addressing
media sharing
application processes
logical topology
intermediary device function.
6 What is the purpose of the preamble in an Ethernet frame?
is used as a pad for data
identifies the source address
identifies the destination address
marks the end of timing information
is used for timing synchronization with alternating
patterns of ones and zeros.
7 What statements are true regarding addresses found at each
layer of the OSI model? (Choose two.)
Layer 2 may identify devices by a physical address burned
into the network card
Layer 2 identifies the applications that are
communicating
Layer 3 represents a hierarchical addressing scheme
Layer 4 directs communication to the proper destination
network
Layer 4 addresses are used by intermediary devices to
forward data
8 Which statements describe the logical token-passing
topology? (Choose two.)
Network usage is on a first come, first serve basis.
Computers are allowed to transmit data only when they
possess a token.
Data from a host is received by all other hosts.
Electronic tokens are passed sequentially to each other.
Token passing networks have problems with high collision
rates.
9 Which sublayer of the data link layer prepares a signal to
be transmitted at the physical layer?
LLC
MAC
HDLC
NIC
10 What is true regarding media access control? (Choose
three.)
Ethernet utilizes CSMA/CD
defined as placement of data frames on the media
contention-based access is also known as deterministic
802.11 utilizes CSMA/CD
Data Link layer protocols define the rules for access to
different media
controlled access contains data collisions
11 What is a characteristic of a logical point-to-point
topology?
The nodes are physically connected.
The physical arrangement of the nodes is restricted.
The media access control protocol can be very simple.
The data link layer protocol used over the link requires a
large frame header.
12 What two facts are true when a device is moved from one
network or subnet to another? (Choose two.)
The Layer 2 address must be reassigned.
The default gateway address should not be changed.
The device will still operate at the same Layer 2
address.
Applications and services will need additional port numbers
assigned.
The Layer 3 address must be reassigned to allow
communications to the new network.
13 What is a function of the data link layer?
provides the formatting of data
provides end-to-end delivery of data between hosts
provides delivery of data between two applications
provides for the exchange data over a common local media
14 Which three factors should be considered when
implementing a Layer 2 protocol in a network? (Choose three.)
the Layer 3 protocol selected
the geographic scope of the network
the PDU defined by the transport layer
the physical layer implementation
the number of hosts to be interconnected.
15 What is the primary purpose of the trailer in a data link
layer frame?
define the logical topology
provide media access control
support frame error detection
carry routing information for the frame
16 A network administrator has been asked to provide a
graphic representation of exactly where the company network wiring and
equipment are located in the building. What is this type of drawing?
logical topology
physical topology
cable path
17 Refer to the exhibit. Which statement describes the media
access control methods that are used by the networks in the exhibit?
All three networks use CSMA/CA
None of the networks require media access control.
Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.
Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.
18 Which type of cable run is most often associated with
fiber-optic cable?
backbone cable
horizontal cable
patch cable
work area cable.
19 In most business LANs, which connector is used with
twisted-pair networking cable?
BNC
RJ-11
RJ-45
Type F
20 When is a straight-through cable used in a network?
when connecting a router through the console port
when connecting one switch to another switch
when connecting a host to a switch
when connecting a router to another router
21 With the use of unshielded twisted-pair copper wire in a
network, what causes crosstalk within the cable pairs?
the magnetic field around the adjacent pairs of wire
the use of braided wire to shield the adjacent wire pairs
the reflection of the electrical wave back from the far end
of the cable
the collision caused by two nodes trying to use the media
simultaneously.
22 Which OSI layer is responsible for binary transmission,
cable specification, and physical aspects of network communication?
Presentation
Transport
Data Link
Physical
23 An installed fiber run can be checked for faults,
integrity, and the performance of the media by using what device?
light injector
OTDR
TDR
multimeter.
24 XYZ Company is installing new cable runs on their data
network. What two types of cable would most commonly be used for new runs?
(Choose two.)
coax
Cat4 UTP
Cat5 UTP
Cat6 UTP
STP
25 What is a possible effect of improperly applying a
connector to a network cable?
Data will be forwarded to the wrong node.
Data transmitted through that cable may experience signal
loss.
An improper signaling method will be implemented for data
transmitted on that cable.
The encoding method for data sent on that cable will change
to compensate for the improper connection.
No comments:
Post a Comment