CH.4
What method is used to manage contention-based access on a wireless network? a. CSMA/CD b. priority ordering c. CSMA/CA d. token passing
CSMA/CA
What is a characteristic of a WAN hub-and-spoke topology? a. It requires that some of the branch sites be interconnected through point-to-point links. b. It requires that every site be interconnected to each other through point-to-point links. c. All sites require a hub device that connects to a router. d. The branch sites are connected to a central site through point-to-point links.
The branch sites are connected to a central site through point-to-point links.
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended? a. The end-user device requires a dedicated connection because of performance requirements. b. The end-user device area has a high concentration of RFI. c. The end-user device needs mobility when connecting to the network. d. The end-user device only has an Ethernet NIC.
The end-user device needs mobility when connecting to the network.
Which statement describes a characteristic of the frame header fields of the data link layer? a. They all include the flow control and logical connection fields. b. Ethernet frame header fields contain Layer 3 source and destination addresses. c. They vary depending on protocols. d. They include information on user applications.
They vary depending on protocols.
Which method of data transfer allows information to be sent and received at the same time? a. full duplex b. half duplex c. multiplex d. simplex
full duplex
What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) a. greater bandwidth potential b. limited susceptibility to EMI/RFI c. durable connections d. easily terminated e. greater distances per cable run f. lower installation cost
greater bandwidth potential limited susceptibility to EMI/RFI greater distances per cable run
Which two factors influence the method that is used for media access control? (Choose two.) a. how data is generated by end devices applications b. how the connection between nodes appears to the data link layer c. how signals are encoded by the NICs on end devices d. how nodes share the media e. how the IP protocol forwards the packet to the destination
how the connection between nodes appears to the data link layer how nodes share the media
What type of cable is used to connect a workstation serial port to a Cisco router console port? a. crossover b. rollover c. straight-through d. coaxial
rollover
Which is a function of the Logical Link Control (LLC) sublayer? a. to define the media access processes that are performed by the hardware b. to provide data link layer addressing c. to identify which network layer protocol is being used d. to accept segments and package them into data units that are called packets
to identify which network layer protocol is being used
What is the purpose of the OSI physical layer? a. controlling access to media b. transmitting bits across the local media c. performing error detection on received frames d. exchanging frames between nodes over physical network media
transmitting bits across the local media