Pt. 2
What method is used to manage contention-based access on a wireless network? CSMA/CD priority ordering CSMA/CA token passing
CSMA/CA
What are two benefits of using a layered network model? (Choose two.) It assists in protocol design. It speeds up packet delivery. It prevents designers from creating their own model. It prevents technology in one layer from affecting other layers. It ensures a device at one layer can function at the next higher layer.
It assists in protocol design. It prevents technology in one layer from affecting other layers.
What is a characteristic of the LLC sublayer? It provides the logical addressing required that identifies the device. It provides delimitation of data according to the physical signaling requirements of the medium. It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media. It defines software processes that provide services to the physical layer.
It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.
What protocol is responsible for controlling the size of segments and the rate at which segments are exchanged between a web client and a web server? TCP IP HTTP Ethernet
TCP
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely? FastEthernet0/1 VLAN 1 vty 0 console 0
VLAN 1
What are the three primary functions provided by Layer 2 data encapsulation? (Choose three.) error correction through a collision detection method session control using port numbers data link layer addressing placement and removal of frames from the media detection of errors through CRC calculations delimiting groups of bits into frames conversion of bits into data signals
data link layer addressing detection of errors through CRC calculations delimiting groups of bits into frames
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode? letmein secretin lineconin linevtyin
lineconin
Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.) data link network physical session transport
network transport
A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites? mesh partial mesh hub and spoke point-to-point
partial mesh
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized? presentation layer network layer physical layer data link layer
physical layer
Which name is assigned to the transport layer PDU? bits data frame packet segment
segment
What is an advantage to using a protocol that is defined by an open standard? A company can monopolize the market. The protocol can only be run on equipment from a specific vendor. An open standard protocol is not controlled or regulated by standards organizations. It encourages competition and promotes choices.
It encourages competition and promotes choices.
What are two characteristics of fiber-optic cable? (Choose two.) It is not affected by EMI or RFI. Each pair of cables is wrapped in metallic foil. It combines the technique of cancellation, shielding, and twisting to protect data. It typically contains 4 pairs of fiber-optic wires. It is more expensive than UTP cabling is.
It is not affected by EMI or RFI. It is more expensive than UTP cabling is.
What is a characteristic of UTP cabling? cancellation cladding immunity to electrical hazards woven copper braid or metallic foil
cancellation
A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.) the amount of traffic that is currently crossing the network the sophistication of the encapsulation method applied to the data the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing the bandwidth of the WAN connection to the Internet the reliability of the gigabit Ethernet infrastructure of the backbone
the amount of traffic that is currently crossing the network the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing
