Networking Exam #2, Chapters 4-7

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

___________________ is used to detect errors in a frame. It uses a cyclic redundancy check (CRC). The sending device includes the results of a CRC in the FCS field of the frame.

(FCS) Frame check sequence

What is max length of a UTP cable?

100 meters

The Data link layer is responsible for ________________

Controlling the transfer of frames across the media

The Data link layer consists of the following two sublayers:

Logical Link Control (LLC) Media Access Control (MAC)

What is the main cause of problems with UTP cables?

Magnetic Interference & Crosstalk

- Frames are stored in queues that are linked to specific incoming - and outgoing ports. - A frame is transmitted to the outgoing port only when all the frames ahead in the queue have been successfully transmitted. - It is possible for a single frame to delay the transmission of all the frames in memory because of a busy destination port. - This delay occurs even if the other frames could be transmitted to open destination ports.

Port-based memory

-Deposits all frames into a common memory buffer shared by all switch ports and the amount of buffer memory required by a port is dynamically allocated. -The frames in the buffer are dynamically linked to the destination port enabling a packet to be received on one port and then transmitted on another port, without moving it to a different queue.

Shared memory

What is the binary representation for the decimal number 173? a. 10101101 b. 10110101 c. 10100101 d. 10100111

a. 10101101

What is the binary representation of 0xCA? a. 11001010 b. 11011010 c. 11010101 d. 10111010

a. 11001010

What is the decimal equivalent of 0xC9? a. 201 b. 185 c. 200 d. 199

a. 201

How many bits are in an IPv4 address? a. 32 b. 64 c. 256 d. 128

a. 32

What is the decimal equivalent of the hex number 0x3F? a. 63 b. 87 c. 77 d. 93

a. 63

Which standards organization oversees development of wireless LAN standards? a. IEEE b. TIA c. ISO d. IANA

a. IEEE

Which statement correctly describes frame encoding? a. It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits. b. It transmits data signals along with a clock signal which occurs at evenly spaced time durations. c. It uses the characteristic of one wave to modify another wave. d. It generates the electrical, optical, or wireless signals that represent the binary numbers of the frame.

a. It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.

What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address? a. It will discard the frame. b. It will strip off the data-link frame to check the destination IP address. c. It will remove the frame from the media. d. It will forward the frame to the next host.

a. It will discard the frame.

Which statement is true about MAC addresses? a. The first three bytes are used by the vendor assigned OUI. b. The ISO is responsible for MAC addresses regulations. c. A NIC only needs a MAC address if connected to a WAN. d. MAC addresses are implemented by software.

a. The first three bytes are used by the vendor assigned OUI.

Which type of UTP cable is used to connect a PC to a switch port? a. straight-through b. console c. crossover d. rollover

a. straight-through

Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table? a. switch b. router c. hub d. modem

a. switch

Which characteristic describes crosstalk? a. the distortion of the transmitted messages from signals carried in adjacent wires b. the loss of wireless signal over excessive distance from the access point c. the distortion of the network signal from fluorescent lighting d. the weakening of the network signal over long cable lengths

a. the distortion of the transmitted messages from signals carried in adjacent wires

What is the binary equivalent of the decimal number 232? a. 11110010 b. 11101000 c. 10011000 d. 11000110

b. 11101000

How many binary bits exist within an IPv6 address? a. 32 b. 128 c. 48 d. 256 e. 64

b. 128

What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose two.) a. 128 bytes b. 1518 bytes c. 1024 bytes d. 56 bytes e. 64 bytes

b. 1518 bytes e. 64 bytes

What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011? a. 198.51.100.201 b. 203.0.113.211 c. 192.0.2.199 d. 209.165.201.223

b. 203.0.113.211

Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format? a. 236.17.12.6 b. 236.17.12.10 c. 234.17.10.9 d. 234.16.12.10

b. 236.17.12.10

What method is used to manage contention-based access on a wireless network? a. CSMA/CD b. CSMA/CA c. token passing d. priority ordering

b. CSMA/CA

Which statement describes the half-duplex mode of data transmission? a. Data that is transmitted over the network can only flow in one direction. b. Data that is transmitted over the network flows in one direction at a time. c. Data that is transmitted over the network flows in both directions at the same time. d. Data that is transmitted over the network flows in one direction to many different destinations simultaneously.

b. Data that is transmitted over the network flows in one direction at a time.

Which is a valid hexadecimal number? a. G b. F c. H d. J

b. F

Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) a. Electronic Industries Alliance (EIA) b. International Telecommunication Union (ITU) c. Institute of Electrical and Electronics Engineers (IEEE) d. Internet Assigned Numbers Authority (IANA) e. Internet Society (ISOC)

b. International Telecommunication Union (ITU) c. Institute of Electrical and Electronics Engineers (IEEE)

What are two services performed by the data link layer of the OSI model? (Choose two.) a. It determines the path to forward packets. b. It accepts Layer 3 packets and encapsulates them into frames. c. It fragments data packets into the MTU size. d. It monitors the Layer 2 communication by building a MAC address table. e. It provides media access control and performs error detection.

b. It accepts Layer 3 packets and encapsulates them into frames. e. It provides media access control and performs error detection.

Which two functions or operations are performed by the MAC sublayer? (Choose two.) a. It adds control information to network protocol layer data. b. It adds a header and trailer to form an OSI Layer 2 PDU. c. It performs the function of NIC driver software. d. It is responsible for Media Access Control. e. It handles communication between upper and lower layers.

b. It adds a header and trailer to form an OSI Layer 2 PDU. d. It is responsible for Media Access Control.

What is one advantage of using fiber optic cabling rather than copper cabling? a. It is easier to terminate and install than copper cabling. b. It is able to carry signals much farther than copper cabling. c. It is able to be installed around sharp bends. d. It is usually cheaper than copper cabling.

b. It is able to carry signals much farther than copper cabling.

Which two characteristics describe Ethernet technology? (Choose two.) a. It uses a ring topology. b. It is supported by IEEE 802.3 standards. c. It typically uses an average of 16 Mbps for data transfer rates. d. It uses unique MAC addresses to ensure that data is sent to the appropriate destination. e. It is supported by IEEE 802.5 standards.

b. It is supported by IEEE 802.3 standards. d. It uses unique MAC addresses to ensure that data is sent to the appropriate destination.

What are the two sublayers of the OSI model data link layer? (Choose two.) a. network access b. MAC c. LLC d. physical e. transport f. internet

b. MAC c. LLC

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? a. physical b. data link c. application d. transport

b. data link

What type of cable is used to connect a workstation serial port to a Cisco router console port? a. straight-through b. rollover c. coaxial d. crossover

b. rollover

Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame? a. router b. switch c. repeater d. hub

b. switch

Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? a. the use of Gigabit Ethernet speeds b. the use of full-duplex capable Layer 2 switches c. the virtually unlimited availability of IPv6 addresses d. the use of CSMA/CA e. the development of half-duplex switch operation

b. the use of full-duplex capable Layer 2 switches

Which is a function of the Logical Link Control (LLC) sublayer? a. to define the media access processes that are performed by the hardware b. to identify which network layer protocol is being used c. to accept segments and package them into data units that are called packets d. to provide data link layer addressing

b. to identify which network layer protocol is being used

What is the purpose of the OSI physical layer? a. exchanging frames between nodes over physical network media b. transmitting bits across the local media c. performing error detection on received frames d. controlling access to media

b. transmitting bits across the local media

What is the dotted decimal representation of the IPv4 address which is represented as the binary string 00001010.01100100.00010101.00000001? a. 10.10.20.1 b. 100.10.11.1 c. 10.100.21.1 d. 100.21.10.1

c. 10.100.21.1

What is the decimal equivalent of the binary number 10010101? a. 192 b. 157 c. 149 d. 168

c. 149

Which data link layer media access control method does Ethernet use with legacy Ethernet hubs? a. turn taking b. determinism c. CSMA/CD d. token passing

c. CSMA/CD

What is true concerning physical and logical topologies? a. The logical topology is always the same as the physical topology. b. Physical topologies are concerned with how a network transfers frames. c. Logical topologies refer to how a network transfers data between devices. d. Physical topologies display the IP addressing scheme of each network.

c. Logical topologies refer to how a network transfers data between devices.

What attribute of a NIC would place it at the data link layer of the OSI model? a. IP address b. TCP/IP protocol stack c. MAC address d. attached Ethernet cable e. RJ-45 port

c. MAC address

What type of address is 01-00-5E-0A-00-02? a. an address that reaches every host in the network b. an address that reaches every host inside a local subnet c. an address that reaches a specific group of hosts d. an address that reaches one specific host

c. an address that reaches a specific group of hosts

What is a characteristic of UTP cabling? a. woven copper braid or metallic foil b. cladding c. cancellation d. immunity to electrical hazards

c. cancellation

A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? a. data link layer b. network layer c. physical layer d. presentation layer

c. physical layer

What is the definition of bandwidth? a. the speed of bits across the media over a given period of time b. the measure of usable data transferred over a given period of time c. the amount of data that can flow from one place to another in a given amount of time d. the speed at which bits travel on the network

c. the amount of data that can flow from one place to another in a given amount of time

Which procedure is used to reduce the effect of crosstalk in copper cables? a. wrapping the bundle of wires with metallic shielding b. avoiding sharp bends during installation c. twisting opposing circuit wire pairs together d. designing a cable infrastructure to avoid crosstalk interference e. requiring proper grounding connections

c. twisting opposing circuit wire pairs together

CRC stands for __________.

cyclic redundancy check

What is the special value assigned to the first 24 bits of a multicast MAC address transporting an IPv4 packet? a. 01-5E-00 b. FF-FF-FF c. FF-00-5E d. 01-00-5E

d. 01-00-5E

Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.) a. IPv6 addresses are 64 bits in length. b. IPv6 addresses are 32 bits in length. c. IPv4 addresses are 128 bits in length. d. IPv6 addresses are represented by hexadecimal numbers. e. IPv4 addresses are 32 bits in length. f. IPv4 addresses are represented by hexadecimal numbers.

d. IPv6 addresses are represented by hexadecimal numbers. e. IPv4 addresses are 32 bits in length.

Which function or operation is performed by the LLC sublayer? a. It is responsible for media access control. b. It adds a header and trailer to a packet to form an OSI Layer 2 PDU. c. It performs data encapsulation. d. It communicates with upper protocol layers.

d. It communicates with upper protocol layers.

What identifier is used at the data link layer to uniquely identify an Ethernet device? a. TCP port number b. sequence number c. UDP port number d. MAC address e. IP address

d. MAC address

A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? a. The end-user device needs mobility when connecting to the network. b. The end-user device area has a high concentration of RFI. c. The end-user device only has an Ethernet NIC. d. The end-user device requires a dedicated connection because of performance requirements.

d. The end-user device requires a dedicated connection because of performance requirements.

What happens to runt frames received by a Cisco Ethernet switch? a. The frame is returned to the originating network device. b. The frame is broadcast to all other devices on the same network. c. he frame is sent to the default gateway. d. The frame is dropped.

d. The frame is dropped.

Why are two strands of fiber used for a single fiber optic connection? a. They prevent crosstalk from causing interference on the connection. b. They increase the speed at which the data can travel. c. The two strands allow the data to travel for longer distances without degrading. d. They allow for full-duplex connectivity.

d. They allow for full-duplex connectivity.

What statement describes a characteristic of MAC addresses? a. They are only routable within the private network. b. They are added as part of a Layer 3 PDU. c. They have a 32-bit binary value. d. They must be globally unique.

d. They must be globally unique.

What is auto-MDIX? a. a feature to automatically determine speed and duplex b. a type of Cisco switch c. an Ethernet connector type d. a feature that detects Ethernet cable typ​e

d. a feature that detects Ethernet cable typ​e

Which IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14? a. binary b. ASCII c. hexadecimal d. dotted decimal

d. dotted decimal

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network? a. hierarchical b. ring c. star d. mesh e. bus

d. mesh

What type of physical topology can be created by connecting all Ethernet cables to a central device? a. bus b. mesh c. ring d. star

d. star

A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion? a. the microwave oven b. the number of wireless devices that are used in the wireless LAN c. the elevated location where the wireless LAN was installed d. the large number of trees that surround the office

d. the large number of trees that surround the office

What is indicated by the term throughput? a. the guaranteed data transfer rate offered by an ISP b. the measure of the usable data transferred across the media c. the capacity of a particular medium to carry data d. the measure of the bits transferred across the media over a given period of time e. the time it takes for a message to get from sender to receiver

d. the measure of the bits transferred across the media over a given period of time

What addressing information is recorded by a switch to build its MAC address table? a. the destination Layer 3 address of incoming packets b. the destination Layer 2 address of outgoing frames c. the source Layer 3 address of outgoing packets d. the source Layer 2 address of incoming frames

d. the source Layer 2 address of incoming frames

The _______________ prepares network data for the physical network

data link layer

FCS stands for __________.

frame check sequence

Wireless is susceptible to interference and can be disrupted by such common devices as _________________.

household cordless phones, some types of fluorescent lights, microwave ovens, and other wireless communications.

This is a WAN version of the star topology in which a central site interconnects branch sites through the use of point-to-point links. Branch sites cannot exchange data with other branch sites without going through the central site.

hub and spoke

This topology provides high availability but requires that every end system is interconnected to every other system. Therefore, the administrative and physical costs can be significant. Each link is essentially a point-to-point link to the other node.

mesh

This is the simplest and most common WAN topology. It consists of a permanent link between two endpoints.

point-to-point

Error detection - Includes a _____________ used to detect transmission errors

trailer


Kaugnay na mga set ng pag-aaral

OTA Chapter 14: Intervention: Planning, Clinical Reasoning, Implementation, and Review (Early)

View Set

The Immortal Life of Henrietta Lacks Ch 23-27

View Set

Warren Biology 104 Chapter 32 Test

View Set

Healthcare Accounting Final Review

View Set

PSYC 2150 Midterm #1 (Willingham)

View Set