Module 3: Ethernet

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Given the Mac Address 00-20-60-ce-2b:28, which part is the Organizationally Unique Identifier (OUI)? A. 2b:28 B. 00-20 C. ce-2b:28 D. 00-20-60

00-20-60

(Click the Exhibit Button below) An Ethernet Local Area Network (LAN) consists of the following components: Four 24-port hubs & Two 16-port switches How many broadcast domains are on this LAN? A. 1 B. 2 C. 5 D. 32

1

11. Which of the following Ethernet standards is not matched correctly? A. 10 Mb Ethernet—Fiber or copper cable B. 100 Mb Ethernet—Fiber or copper cable C. 1 Gig Ethernet—Fiber cable only D. All of the above are correct.

1 Gig Ethernet—Fiber cable only

A switch with the MAC FDB shown receives an Ethernet frame with source MAC address 00:00:8c:01:00:0a and destination MAC address 00:00:8c:01:00:0c. On which port is the frame forwarded? A. 1/1/1 B. 1/1/2 C. 1/1/3 D. 1/1/4

1/1/3

What distance is supported using CAT-5 cabling for 10/100/1000 TX? A. 100 m. B. 500 m. C. 1 Km. D. 10 Km.

100 m

What is the effective maximum rate of data transmission on a 10 Mbps full-duplex Ethernet link? A. 5 Mbps. B. 10 Mbps. C. 15 Mbps. D. 20 Mbps.

20 Mbps

How many DS-3 frames can be transported in an OC-3 frame? A. 1 B. 2 C. 3 D. 4

3

A network consists of the components shown in the diagram. Assuming there are no VLANs, how many broadcast and collision domains are on this network? A. 9 broadcast domains, 3 collision domains B. 3 broadcast domains, 3 collision domains C. 3 broadcast domains, 9 collision domains D. 1 broadcast domain, 9 collision domains

3 broadcast domains, 9 collision domains

An Ethernet Local Area Network (LAN) consists of the components shown in the diagram. How many broadcast and collision domains are on this LAN? a. 2 broadcast domains, 7 collision domains b. 2 broadcast domains, 9 collision domains c. 3 broadcast domains, 7 collision domains d. 3 broadcast domains, 9 collision domains

3 broadcast domains, 9 collision domains

Click the Exhibit Button below: An Ethernet Local Area Network (LAN) consists of the components shown in the diagram below: How many broadcast and collision domains are on this LAN? A. 9 broadcast domains, 3 collision domains. B. 3 broadcast domains, 3 collision domains. C. 3 broadcast domains, 9 collision domains. D. 1 broadcast domain, 9 collision domains.

3 broadcast domains, 9 collision domains

An Ethernet Local Area Network (LAN) consists of the components shown in the diagram. How many collision domains are on this LAN? A. 1 B. 2 C. 5 D. 6

5

1. Which of the following values for the Ethertype/length fields indicates an 802.3 frame (numbers are in decimal)? A. 64 B. 1540 C. 2048 D. 9000

64

1. What are the two main types of Ethernet frames? A. Thinnet and Thicknet B. 10baseT and 100baseT C. DIX Ethernet and Ethernet II D. 802.3 and Ethernet II

802.3 and Ethernet II

11. An Ethernet MAC address consists of ______. A. A 4-byte number in four parts B. A 4-byte number in two parts C. A 6-byte number in two parts D. D. A 6-byte number in four parts

A 6-byte number in two parts

Which of the following is a feature of a VLAN? A. A VLAN allows multiple Ethernet switches to be connected in a single broadcast domain. B. A VLAN allows multiple Ethernet switches to be connected in a single collision domain. C. A VLAN can separate ports on the same switch into different broadcast domains. D. A VLAN can separate ports on the same switch into different collision domains.

A VLAN can separate ports on the same switch into different broadcast domains

Which of the following best describes an Ethernet bridge? A. A passive device simply used to connect two or more cables. Does not generate or amplify any signals. B. A device that receives and retransmits a signal out its other ports, but does not do any Layer 2 analysis of the data. C. A device that receives a signal and based on the Layer 2 destination address, makes a decision on which ports the signal should be retransmitted. D. A device that receives a signal and based on the Layer 3 destination address, makes a decision on which ports the signal should be retransmitted.

A device that receives a signal and based on the Layer 2 destination address, makes a decision on which ports the signal should be retransmitted

Which of the following best describes a repeater? A. A passive device simply used to connect two or more cables. It does not generate or amplify any signals. B. A device that receives and retransmits a signal out its ports but does not do any Layer 2 analysis of the data. C. A device that receives a signal and based on the Layer 2 destination address, makes a decision on which ports the signal should be retransmitted. D. A device that receives a signal and based on the Layer 3 destination address makes a decision on which ports the signal should be retransmitted.

A device that receives and retransmits a signal out its ports but does not do any Layer 2 analysis of the data

Which of the following best describes an Ethernet switch? A. A passive device used to connect cables without signal amplification. B. A device that receives and retransmits data without Layer 2 header inspection. C. A device that receives and retransmits data based on the Layer 2 destination address. D. A device that receives and retransmits data based on the Layer 3 destination address.

A device that receives and retransmits data based on the Layer 2 destination address

Which of the following best describes a hub? A. A passive device used to connect cables without signal amplification. B. A device that receives and retransmits data without Layer 2 header inspection. C. A device that receives and retransmits data based on the Layer 2 destination address. D. A device that receives and retransmits data based on the Layer 3 destination address.

A device that receives and retransmits data without Layer 2 header inspection

Which of the following ATM AAL types is associated with an incorrect description? A. AAL3/4—Connection-oriented service B. AAL5—Connectionless service C. AAL2—Variable bit rate traffic D. AAL1—High bit rate traffic

AAL1—High bit rate traffic

Which ATM adaptation layer is usually used for connectionless data service? A. AAL1 B. AAL2 C. AAL3/4 D. AAL5

AAL3/4

Which ATM adaptation layer is commonly used for transporting IP datagrams or non-real time data? A. AAL0 B. AAL1 C. AAL2 D. AAL3/4 E. AAL5

AAL5

Which of the following is a characteristic of ATM? A. Application data is transported in 53-byte cells. B. ATM circuits are identified by a VPI/VCI value. C. Provides enhanced QoS support with 5 classes of service. D. Ideal for multiple services on the same physical line. E. All of the above. F. None of the above

All of the above: Application data is transported in 53-byte cells ATM circuits are identified by a VPI/VCI value Provides enhanced QoS support with 5 classes of service Ideal for multiple services on the same physical line

What must occur for a LAG to become operational? A. There must be multiple ports assigned to the LAG. B. All ports in the LAG must be configured with the same characteristics. C. Auto-negotiation must be enabled on all ports in the LAG. D. All of the above.

All ports in the LAG must be configured with the same characteristics

What must occur before a LAG becomes operational? A. There must be multiple ports assigned to the LAG. B. All ports in the LAG must be configured with the same speed and duplex settings. C. Auto-negotiation must be enabled on all ports in the LAG. D. The duplex setting on all the ports must be forced to half. E. Auto-negotiation must be set to limited or disabled on at least one member port.

All ports in the LAG must be configured with the same speed and duplex settings

What are the characteristics of Ethernet?

Allows collision-free transmission on point-to-point interfaces Uses MAC addresses to identify devices on network Uses frame format that includes: source and destination MAC addresses, type of information being carried upper-layer payload frame-check field to detect transmission errors

In what type of network is a broadcast storm likely to occur? A. An Ethernet network with redundant paths not running STP. B. An ATM network. C. A SONET network. D. All of the above.

An Ethernet network with redundant paths not running STP

Which of the following is TRUE regarding Ethernet half-duplex transmission? A. Half-duplex transmission is less efficient because the frame MTU is smaller. B. An end-station connected to a hub will always be half-duplex. C. Ethernet switches only support half-duplex transmission. D. All of the above.

An end-station connected to a hub will always be half-duplex

What type of MAC address is ff:ff:ff:ff:ff:ff? A. Unicast B. Multicast C. Broadcast D. Anycast

Broadcast

Which address type is used to send frames to all devices in a Local Area Network? a. Anycast b. Multicast c. Broadcast d. Unicast

Broadcast

What problems can be encountered in a switched network with path redundancy if STP is not used?

Broadcast storm due to constant looping of Ethernet frames FDB table instability

What problem was Spanning Tree Protocol (STP) primarily designed to solve? A. Broadcast storms caused by redundancy in Layer 2 networks. B. Missing protocol field in the Ethernet header. C. Missing sequence number in the Ethernet header. D. Unreliable data transfer in Layer 2 networks

Broadcast storms caused by redundancy in Layer 2 networks

The advantage of using multicast packets instead of broadcast packets is: A. Broadcasts are received by every host. B. Multicast is newer technology. C. Broadcasts are processed by every host. D. Multicast provides multiple addresses for flexibility.

Broadcasts are processed by every host

What is CSMA/CD?

Carrier Sense Multiple Access with Collision Detection. Protocol used to reduce collisions and their occurrences but can't prevent them

Which of the following is not a data link layer (oSI Layer 2) protocol? A. Ethernet B. ATM C. Cell-Relay D. PPP

Cell-Relay

Collision domain vs Broadcast domain

Collision domains deal with two nodes transmitting data simultaneously in contrast to broadcast domains where multiple nodes are receiving and processing all broadcast packets

Who was responsible for developing and publishing the original standard that was used for 10 Mbit/s Ethernet? A. Intel Corporation. B. Digital Equipment Corporation. C. DEC-Intel-Xerox. D. Apple Computer. E. IBM.

DEC-Intel-Xerox

Which of the following is required if devices on different VLANs wish to communicate with each other? A. Devices on different VLANs cannot communicate with each other. B. Devices on different VLANs can communicate with each other if they are connected to the same switch. C. Devices on different VLANs can communicate with each other if the switches are connected using a single high-bandwidth port. D. Devices on different VLANs can communicate with each other if there is a router to connect the VLANs.

Devices on different VLANs can communicate with each other if there is a router to connect the VLANs

What is required if devices on different VLANs wish to communicate with each other? A. Devices on different VLANs cannot communicate with each other. B. Devices on different VLANs can communicate with each other as long as they are connected to the same switch. C. Devices on different VLANs can communicate with each other as long as the switches they are attached to are connected to each other with an Ethernet connection. D. Devices on different VLANs can communicate with each other if there is an IP router to connect the VLANs.

Devices on different VLANs can communicate with each other if there is an IP router to connect the VLANs

Wha are the functions of the Link Layer?

Encapsulating upper layer data Unique addressing of physical interfaces into local network Orderly access of devices to use physical medium

How is Ethernet II different from Ethernet 802.3? A. Ethernet II can be used on broadcast networks where as 802.3 was designed for point-to-point networks. B. Ethernet II identifies its payload type where as 802.3 indicates the frame length. C. Ethernet II identifies its frame length while 802.3 indicates the payload type. D. Ethernet II and Ethernet 802.3 are two different names for the same protocol.

Ethernet II identifies its payload type where as 802.3 indicates the frame length

What are the differences between an Ethernet switch and an Ethernet hub?

Ethernet switches provide full-duplex capabilities on point-to-point interfaces, make intelligent forwarding decision and send frames only to port that needs them Hubs provide half-duplex capabilities and collisions can occur. Any Ethernet frame that arrives on a port is automatically forwarded out to all other ports

11. The original Thicknet standard had a maximum cable length as well as a mini-mum distance for stations to tap into the cable. Based on the description of CSMA/CD, what is the most likely reason for these distance requirements? A. A signal might be too weak to travel farther than the maximum distance. B. Every station on the wire had to be able to "detect" a collision in order to function properly. C. Too many taps in the cable would weaken the wire. D. Thicknet cable came in fixed lengths.

Every station on the wire had to be able to "detect" a collision in order to function properly

Which Ethernet frame field does the receiver use to verify the integrity of the received bits? A. Destination address B. Frame check sequence C. Preamble D. Length field

Frame check sequence

Which of the following is true of Ethernet half-duplex transmission? A. Half-duplex transmission is less efficient because the frame MTU is smaller. B. Half-duplex transmission is only 30-40% efficient because of collisions. C. Ethernet switches support half-duplex transmission only. D. All of the above.

Half-duplex transmission is only 30-40% efficient because of collisions

As described by the CSMA/CD algorithm, what is the first thing to happen when Host A and Host B begin transmitting data at the same time? A. Host A and B will generate a jam signal. B. Listening hosts will request retransmission. C. Host A or B will retry the transmission. D. A back-off timer is started by Host A or B.

Host A and B will generate a jam signal

Which of the following is NOT an example of a Layer 2 protocol? A. POS B. IP C. ATM D. Frame Relay E. Ethernet

IP

How is Ethernet II different from Ethernet 802.3? A. Ethernet 802.3 can only be used on point-to-point links, while Ethernet II can be used on broadcast networks. B. In Ethernet II the 2 bytes after the source MAC address is used as a type indicator. In Ethernet 802.3 these two bytes indicate the length of the frame. C. In Ethernet 802.3, the 2 bytes after the source MAC address is used as a type indicator. In Ethernet II these two bytes indicate the length of the frame. D. Ethernet II and Ethernet 802.3 are two different names for the same protocol

In Ethernet II: 2 bytes after the source MAC address is used as a type indicator. In Ethernet 802.3: two bytes indicate the length of the frame

What problem was Spanning Tree Protocol (STP) primarily designed to solve? A. Inability to perform switch to switch redundancy using multiple connections at Layer 2. B. Missing protocol field in Ethernet II required to identify redundancy protocols at Layer 2. C. Missing packet sequencing in Layer 2 Ethernet required to re-order packets on arrival. D. Inability to forward multicast frames without a routing protocol.

Inability to perform switch to switch redundancy using multiple connections at Layer 2

What are the benefits of a LAG?

Increases bandwidth available between two Ethernet devices by grouping multiple ports into one logical link Provides link redundancy between devices

Which of the following statements about VLAN stacking is FALSE? a. It allows a service provider to support customers that use overlapping VLAN IDs. b. It increases the number of customers sending VLAN-tagged traffic that a service provider can support. c. It increases the size of the VLAN ID field in the Ethernet header. d. It allows a service provider to add another VLAN tag to traffic.

It increases the size of the VLAN ID field in the Ethernet header

Which of the following is NOT a characteristic of a hub? a. It can interconnect hosts located in the same local area network. b. It replicates Ethernet frames across all ports except the receiving port. c. It inspects layer-2 frame headers. d. Devices connected to it must operate in half-duplex mode.

It inspects layer-2 frame headers

Which of the following is a function of the Link layer? A. It is responsible for encapsulating packets into frames for transmission on physical media B. It is responsible for encapsulating packets into IP datagrams and routing them C. It is responsible for encapsulating application data into TCP/UDP messages D. It is responsible for the timing of the signals on physical media.

It is responsible for encapsulating packets into frames for transmission on physical media

What is the purpose of the ATM Adaptation Layer? A. It determines the amount of data in the cell. B. It maps data from upper-layer service classes to ATM cells. C. It adapts Ethernet frames to ATM cells. D. It wraps a header around the ATM cell.

It maps data from upper-layer service classes to ATM cells

Which of the following statements about LAG is FALSE? a. It aggregates multiple physical links into a single logical link. b. It improves performance by increasing bandwidth between devices. c. It provides protection against link or node failure. d. It supports limited auto-negotiation on member ports.

It provides protection against link or node failure

What happens immediately after an Ethernet switch receives an Ethernet frame? A. It records the destination MAC address and the interface on which it arrived. B. It records the source MAC address and the interface on which it arrived. C. It floods the frame out of all its interfaces except the interface on which the frame arrived. D. It transmits the frame out of the appropriate interface.

It records the source MAC address and the interface on which it arrived

Which of the following is NOT characteristic of Ethernet? A. It is a broadcast technology that can send frames to all devices attached to shared media. B. It uses a passive, wait-listen protocol called Carrier Sense Multiple Access with Collision Detection (CSMA/ CD). C. It uses IP addresses to identify interfaces on the common network media. D. It is part of the network interface layer of the TCP/IP protocol suite.

It uses IP addresses to identify interfaces on the common network media

Which of the following statements about the IP forwarding process is TRUE? A. It uses the forwarding table to find a match for the source IP address. B. It uses the ARP table to find a match for the source MAC address. C. It uses the ARP table to find a match for the destination MAC address. D. It uses the forwarding table to find a match for the destination IP address.

It uses the forwarding table to find a match for the destination IP address

Which technologies can be used with Ethernet switches to achieve redundancy? (Choose two.) A. LAG B. OSPF C. RIP D. STP

LAG, STP

What is the function of Layer 2? A. Layer 2 is responsible for encapsulating packets into frames for transmission on physical media. B. Layer 2 is responsible for encapsulating packets into IP datagrams and routing them. C. Layer 2 is responsible for encapsulating application data into TCP/UDP messages. D. Layer 2 is responsible for the timing of the signals on physical media.

Layer 2 is responsible for the timing of the signals on physical media

11. When an Ethernet station wants to transmit information, the process it follows is ______. A. Just start transmitting. B. Listen for other stations transmitting; if none, then begin transmitting. C. Transmit whenever it receives the token. D. Issue a transmit request, and transmit when given authorization to do so.

Listen for other stations transmitting; if none, then begin transmitting

What type of MAC address is 01:00:5e:01:01:01? A. Unicast B. Multicast C. Broadcast D. Anycast

Multicast

Which of the following type of addressing scheme delivers information from one source to all devices who are members of a specific group? A. Anycast. B. Multicast. C. Broadcast. D. Unicast.

Multicast

A switch with the MAC FDB shown in the exhibit receives an Ethernet frame with source MAC address 00:00:8c:01:00:0a and destination MAC address ff:ff:ff:ff:ff:ff. On which ports is the frame forwarded? A. Only on port 1/1/1. B. On all ports except 1/1/1. C. On all four ports. D. On none of the ports.

Only on port 1/1/1

A PPP frame has several fields that are not used, like addressing. Why do these fields exist in the frame? A. They are reserved for future use. B. They are legacy fields from older versions of PPP headers. C. PPP is based on the HDLC frame format. D. PPP can be adapted for use on multi-point networks and might need the fields.

PPP is based on the HDLC frame format

Why is the address field in a PPP header always set to "11111111"? A. PPP supports multipoint access networks with many stations. The all 1's acts as a broadcast. B. PPP supports multipoint access networks with many stations. The all 1's acts as a multicast. C. PPP supports point-to-point networks only. The address field is fixed. D. PPP supports point-to-point networks only. The address field can change dynamically since every station is assigned a PPP address.

PPP supports point-to-point networks only. The address field is fixed

Which Ethernet frame field allows the transmitter and receiver to synchronize communications? A. Preamble B. Start Frame Delimiter C. Length/Type D. Frame Check Sequence

Preamble

Which of the following is typically a characteristic of Layer 2 framing? A. Provides a universal addressing scheme to uniquely identify destinations in the network. B. The size of the Layer 2 frame cannot exceed 1518 bytes. C. Provides error checking of the frame contents after transmission. D. All the above.

Provides error checking of the frame contents after transmission

What problems was Spanning Tree Protocol (STP) primarily designed to solve? (Choose two.): A. Providing path redundancy. B. Preventing loops. C. Handling collisions. D. Allowing flooding of multicast traffic.

Providing path redundancy Preventing loops

Which of the following technologies ensures that a unicast packet is visible only to the device with the specific destination address? A. Ethernet B. Switched Ethernet C. Satellite Wireless LAN

Switched Ethernet

Which of the following are examples of Time Division Multiplexing (Choose two.)? A. Ethernet. B. Token-Ring. C. SONET/SDH. D. E1 carrier. E. PPP

SONET/SDH, E1 carrier

What is the basic unit of framing in SDH and the bit rate for its transmission? A. STM-1 with a bit rate of 1.544 Mbit/s B. STM-1 with a bit rate of 2.048 Mbit/s C. STM-1 with a bit rate of 51.84 Mbit/s D. STM-1 with a bit rate of 155.52 Mbit/s

STM-1 with a bit rate of 155.52 Mbit/s

What is the basic unit of framing in SDH and the bit rate for transmission? A. STM-1 with a bit rate of 1.544 Mbit/s. B. STM-1 with a bit rate of 2.048 Mbit/s. C. STM-1 with a bit rate of 51.84 Mbit/s. D. STM-1 with a bit rate of 155.52 Mbit/s.

STM-1 with a bit rate of 155.52 Mbit/s

Which of the following protocols is used to prevent loops in Ethernet networks? a. LAG b. STP c. ARP d. ICMP

STP

What is the basic unit of framing in SONET and the bit rate for its transmission? A. STS-1 with a bit rate of 1.544 Mbit/s B. STS-1 with a bit rate of 2.048 Mbit/s C. STS-1 with a bit rate of 51.84 Mbit/s D. STS-1 with a bit rate of 155.52 Mbit/s

STS-1 with a bit rate of 51.84 Mbit/s

Which of the following is not a function of PPP? A. Provide support for multiple upper-layer protocols. B. Support the connection of multiple devices on a single link. C. Support authentication. D. Support data integrity via a CRC on frame contents.

Support the connection of multiple devices on a single link

The method by which Ethernet frames are associated to a specific VLAN is referred to as: A. Segmenting B. Stacking C. Routing D. Tagging

Tagging

If a 5-port LAG is configured with the option of 'port-threshold 2 action down', and dynamic-cost is enabled, what will happen if the total number of operational links in the LAG is 2? A. The LAG cost is equal to the link cost divided by 3. B. The LAG cost is equal to the link cost. C. The LAG is operationally down. D. The LAG cost is equal to the link cost divided by 5.

The LAG is operationally down

If a 4-port LAG is configured with the option of 'port-threshold 2' and 'action down' what will happen if the total operational links in the LAG is 2? A. If dynamic-cost is enabled it will adjust the cost for routing protocols such as OSPF. B. If dynamic-cost is not enabled it will adjust the cost for routing protocols such as OSPF by dividing the link bandwidth by 2. C. The LAG will be changed to an operational state of 'down'. D. The LAG will function with only 2 ports. There will be no change to the routing metric.

The LAG will be changed to an operational state of 'down'

Using Q-in-Q Virtual Local Area Network (VLAN) stacking, how does a carrier differentiate one customers traffic from that of another? A. The provider edge (PE) switch adds an additional field called a PE tag to the customers Layer 2 data. B. The PE switch replaces the customers VLAN tag with a carrier-assigned tag. C. The PE switch adds a second VLAN tag to identify the customers traffic on the carriers network. D. The PE switch assigns a customer-specific priority label to the customers traffic.

The PE switch adds a second VLAN tag to identify the customers traffic on the carriers network

What information is used to separate VLANs on a VLAN trunk that connects multiple VLANs? A. The VLAN tag B. The IP Header C. The VID D. The Priority Value

The VLAN tag

What is the meaning of carrier sense in the CSMA/CD algorithm? A. The host will retransmit the frame if it detects a collision during transmission. B. The host is able to detect the transmission speed of the Ethernet switch port to which the host is connected. C. The host will only transmit data when it detects that no other devices are transmitting. D. The host will only transmit upon a timer expiry. E. The host will only transmit when it receives the token.

The host will only transmit data when it detects that no other devices are transmitting

Collision domain

The portion of an Ethernet (LAN) network in which collisions could occur if two nodes transmit data at the same time.

11. What happens when two or more Ethernet stations attempt to transmit at the same time? A. This is impossible on half-duplex. B. The signal results in a collision, the stations stop, and the stations all wait the same amount of time to retransmit. C. The signal results in a collision, and the stations retransmit based on a configured priority. D. The signal results in a collision, and the stations stop and retransmit after waiting a random amount of time.

The signal results in a collision, and the stations stop and retransmit after waiting a random amount of time

What happens when a switch receives an Ethernet frame with an unknown source MAC address and a destination MAC address of ff:ff:ff:ff:ff:ff? a. The destination MAC address is saved in the MAC FDB, and the frame is discarded. b. The destination MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port. c. The source MAC address is saved in the MAC FDB, and the frame is discarded. d. The source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port.

The source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port

What happens when a switch receives an Ethernet frame with unknown source and destination MAC addresses? A. The frame is silently discarded. B. The source MAC address is saved in the MAC FDB, and the frame is discarded. C. The source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port. D. The source and destination MAC addresses are saved in the MAC FDB, and the frame is flooded to all ports.

The source MAC address is saved in the MAC FDB, and the frame is flooded to all ports except the receiving port

What must be configured before a LAG becomes operational? A. The cost must be statically configured on all ports in the LAG. B. The speed and duplex setting on all ports in the LAG must be the same. C. Auto-negotiation must be enabled on all ports in the LAG. D. The duplex setting on all the ports in the LAG must be forced to half.

The speed and duplex setting on all ports in the LAG must be the same

What is the behavior of a typical Ethernet switch when it receives a frame with a uncast destination MAC address? (Choose two.) A. The switch floods the frame out of all ports except the port on which it was received. B. The switch looks in its FDB. If the source address is unknown it discards the frame. C. The switch looks in its FDB. If the destination address is known it forwards the frame out the appropriate interface. D. The switch looks in its FDB. If the destination address is unknown it floods the frame out all ports except the port on which it was received. E. The switch looks in its FDB. If the destination address is unknown it discards the frame.

The switch looks in its FDB. If the destination address is known it forwards the frame out the appropriate interface The switch looks in its FDB. If the destination address is unknown it floods the frame out all ports except the port on which it was received

A 24 port Ethernet switch is configured with VLAN 100 on ports 1 - 8, VLAN 200 on ports 9 - 16 and VLAN 300 on ports 17 - 24. Which of the following describes the behavior of the switch when a broadcast frame is received on port 1? A. The switch will discard the broadcast frame because there is no specific destination address. B. The switch will flood the broadcast frame on all ports on which the switch has seen frames from attached devices C. The switch will flood the broadcast frame on ports 2 to 8. D. The switch will flood the broadcast frame on all 24 ports.

The switch will flood the broadcast frame on ports 2 to 8

Which of the following Ethernet rates requires an optical cable to operate? A. 10 Mb/s Ethernet. B. 100 Mb/s Ethernet. C. 1000 Mb/s Ethernet . D. There are copper and optical versions possible for all of these Ethernet data rates.

There are copper and optical versions possible for all of these Ethernet data rates

Which of the following statements are TRUE regarding SONET/SDH? (Choose two.) A. They are deployed over point-to-point physical topologies to allow sub-50ms convergence. B. An ADM (Add Drop Multiplexer) is used to connect various sites to the infrastructure. C. IP datagrams are encapsulated in a PPP frame for transmission over an SDH network, D. IP datagrams are encapsulated in an Ethernet frame for transmission over a SONET network.

They are deployed over point-to-point physical topologies to allow sub-50ms convergence IP datagrams are encapsulated in an Ethernet frame for transmission over a SONET network

How do ATM and Frame-Relay protocols differentiate multiple customers or traffic types on the same physical wire? A. They use virtual circuits to create a logical separation of traffic. B. They use subnetting to create a logical separation of traffic. C. They use VLANs to create a logical separation of traffic. D. They use IP header information to create a logical separation of traffic.

They use virtual circuits to create a logical separation of traffic

What is the purpose of a multicast address? A. To provide an address that refers to all devices in a network. B. To provide an address that refers to a specific group of devices in a network. C. To provide an address that refers to a group of devices with the same IP address in different Layer 2 networks. D. To provide an address that refers to a single device in a network.

To provide an address that refers to a specific group of devices in a network

ATM uses 53-byte cells, which is quite a bit smaller than the maximum Ethernet frame. What is the purpose of having such a small cell size? A. To support latency-sensitive applications like voice traffic B. To provide less overhead on ATM switches C. To support the use of multiple classes of service D. To provide the ability to do switching in hardware

To support latency-sensitive applications like voice traffic

What information is used to separate VLANs on a VLAN trunk that connects multiple VLANs? A. VLAN tag. B. IP Header. C. FCS. D. Priority Value.

VLAN tag

Which of the following are functions of VLANs? (Choose two.) A. VLANs can group ports on multiple switches into unified broadcast domains B. VLANs allow multiple Ethernet switches to be connected in a single collision domain C. VLANs can separate ports on the same switch into different broadcast domains D. VLANs can group ports on the same switch into different collision domains

VLANs can group ports on multiple switches into unified broadcast domains VLANs can separate ports on the same switch into different broadcast domains

When does an Ethernet switch record a MAC address in its MAC FDB?

When it receives an Ethernet frame, it records the source MAC address an the interface on which it arrived to its MAC forwarding table (FDB)

Why does CSMA/CD result in half duplex transmission?

When two hosts transmit frames simultaneously, they both detect collision. Both hosts will generate a jam signal to notify all other hosts. A random back-off timer starts on both transmitting hosts. Either host will start transmission after they detect no other transmission on the medium which results in only one host successfully transmitting at a time, resulting in half-duplex transmission

What are the advantages of using VLANs in an Ethernet network?

decreases broadcast traffic provides network security at Link layer because it limits user access to VLAN membership keeps each user group's data separated from all others during service delivery requires no router

Broadcast domain

every Ethernet device within a LAN will receive and process all broadcast packets.


Ensembles d'études connexes

ECON 2030 Assignment 9: Fiscal Policy

View Set

ECEN_323_Dr. Archibald_Midterm 1_Chapter 1

View Set

Chapter 3: "Defining, Measuring, & Manipulating Variables"

View Set

Ethnicity and Immigration Final review

View Set

Radian Measure and The Unit Circle

View Set

Life and Health Insurance- Florida 2-15

View Set

Biology 4.4 Review Questions w/ 4 additional questions

View Set

ISCI exam 2 in depth study guide

View Set