CCNA Introduction to Networks Chapter 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? A. transport B. physical C. application D. data link

D. data link

What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.) A. to increase the media throughput B. to reduce the number of collisions on the media C. to provide better media error correction D. to distinguish data bits from control bits E. to identify where the frame starts and ends

D. to distinguish data bits from control bits E. to identify where the frame starts and ends

What is this connection called?

Duplex Multimode Lucent Connector (LC)

The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network? A. 95 Mb/s B. 80 Mb/s C. 15 Mb/s D. 55 Mb/s E. 65 Mb/s

E. 65 Mb/s

What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?

LLC

This is sometimes called a little or local connector. It is quickly growing in popularity due to its smaller size. It is used with single-mode fiber and also supports multimode fiber.

Lucent Connector (LC) "C for Click"

10,000,000,000 b/s can also be written as __________ Gb/s.

10

Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?​ A. 1 - rollover, 2 - straight-through, 3 - crossover B. 1 - rollover, 2 - crossover, 3 - straight-through C. 1 - crossover, 2 - straight-through, 3 - rollover D. 1 - crossover, 2 - rollover, 3 - straight-through

A. 1 - rollover, 2 - straight-through, 3 - crossover

A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.) A. RFI​ B. crosstalk C. signal attenuation D. EMI E. extended length of cabling

A. RFI​ D. EMI

How is the magnetic field cancellation effect enhanced in UTP cables? A. by increasing and varying the number of twists in each wire pair B. by decreasing the number of wires that are used to carry data C. by increasing the thickness of the copper wires D. by increasing the thickness of the PVC sheath that encases all the wires

A. by increasing and varying the number of twists in each wire pair

A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.) A. coverage area B. mobility options C. interference D. security E. packet collision F. extensive cabling

A. coverage area C. interference D. security

What are two characteristics of 802.11 wireless networks? (Choose two.) A. They use CSMA/CD technology. B. Collisions can exist in the networks. C. They use CSMA/CA technology. D. Stations can transmit at any time. E. They are collision-free networks.

B. Collisions can exist in the networks. C. They use CSMA/CA technology.

Which statement is correct about multimode fiber? A. Multimode fiber commonly uses a laser as a light source. B. SC-SC patch cords are used with multimode fiber cables. C. SC-ST patch cords are used with multimode fiber cables. D. Multimode fiber cables carry signals from multiple connected sending devices.

B. SC-SC patch cords are used with multimode fiber cables.

Why are two strands of fiber used for a single fiber optic connection? A. The two strands allow the data to travel for longer distances without degrading. B. They allow for full-duplex connectivity. C. They increase the speed at which the data can travel. D. They prevent crosstalk from causing interference on the connection.

B. They allow for full-duplex connectivity.

What is the purpose of the FCS field in a frame? A. to verify the logical address of the sending node B. to determine if errors occurred in the transmission and reception C. to obtain the MAC address of the sending node D. to compute the CRC header for the data field

B. to determine if errors occurred in the transmission and reception

As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?​ A. The transmitting node sends a beacon to notify that a data frame is attached. B. The receiving node identifies the beginning of a frame by seeing a physical address. C. The transmitting node inserts start and stop bits into the frame. D. The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame.

C. The transmitting node inserts start and stop bits into the frame.

A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented? A. 802.11g B. 802.11n C. 802.11b D. 802.11ac

D. 802.11ac

What is one advantage of using fiber optic cabling rather than copper cabling? A. It is usually cheaper than copper cabling. B. It is easier to terminate and install than copper cabling. C. It is able to be installed around sharp bends. D. It is able to carry signals much farther than copper cabling.

D. It is able to carry signals much farther than copper cabling.

What is one main characteristic of the data link layer? A. It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network. B. It converts a stream of data bits into a predefined code. C. It generates the electrical or optical signals that represent the 1 and 0 on the media. D. It shields the upper layer protocol from being aware of the physical medium to be used in the communication.

D. It shields the upper layer protocol from being aware of the physical medium to be used in the communication.

What is true concerning physical and logical topologies? A. The logical topology is always the same as the physical topology. B. Physical topologies are concerned with how a network transfers frames. C. Physical topologies display the IP addressing scheme of each network. D. Logical topologies determine the media access control method used.

D. Logical topologies determine the media access control method used.

Which statement describes signaling at the physical layer? A. Signaling is a method of converting a stream of data into a predefined code. B. In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage. C. Wireless encoding includes sending a series of clicks to delimit the frames. D. Sending the signals asynchronously means that they are transmitted without a clock signal.

D. Sending the signals asynchronously means that they are transmitted without a clock signal.

Refer to the exhibit. What is wrong with the displayed termination? A. The cable is not shielded. B. The wires are too thick for the connector that is used. C. The jack used is an RJ-11 connector instead of an RJ-45 connector. D. The untwisted length of each wire is too long.

D. The untwisted length of each wire is too long.

This is an older bayonet style fiber connector widely used with multimode fiber.

Straight-Tip (ST) "T for Twist"

This is sometimes referred to as square connector or standard connector. It is a widely adopted LAN and WAN connector that uses a push-pull mechanism to ensure positive insertion. This connector type is used with multimode and single-mode fiber.

Subscriber Connector (SC)

The term __________ indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).​

bandwidth


Set pelajaran terkait

The Muscular System of the dog or cat

View Set

General Biology I Lab - Lab Safety Post Lab Questions

View Set

BADMA379 Ethics and Ethical Reasoning

View Set

Domain 8: Software Development Security

View Set

Chapter 3 - Analyzing Business Transactions Using T Accounts

View Set

Digital Email Marketing Strategies

View Set