Chapter 6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The following is a valid IP address:

128.23.86.2

The maximum length of the Ethernet Data Field is ___________ octets.

1500

T1 leased lines run at a speed of about ________.

1500 kbps

An Ethernet data field is 40 octets long. The length of the PAD is

6 octets long.

The ________ standard was created to prevent attackers from walking in and simply plugging a computer into a wall jack and therefore accessing the network.

802.1X

What 802 Working Group creates Ethernet standards?

802.3

The following is a valid MAC address:

E5-47-55-C4-5B-AA

________ provides the same transmission speed as a T1 line.

HDSL2

What organization creates Ethernet standards?

IEEE

At what layer is the 100BASE-TX standard?

Physical

A VLAN ID would be found in a ________ field.

Tag Control Information

Which of the following can be used to increase reliability considerably in an Ethernet LAN?

Using the Rapid Spanning Tree Protocol.

A closed collection of servers and the clients they serve in a switched network. Broadcast signals from servers and printers go only to computers in the closed collection.

VLAN

________ connect hosts to the network.

Workgroup switches

An Ethernet switch knows ________.

a single port number for each MAC address

VLANs address the problem of ________.

congestion

Switches farther up the hierarchy that carry traffic via trunk lines between switches and routers are called

core switches.

The Ethernet length field gives the length of the ________.

data field

If an Ethernet receiver detects an error in an arriving frame, it ________.

drops the frame

A leased line runs at a speed of 256 kbps. This probably is a ________ line.

fractional T1

Ethernet receivers detect errors by using the value in the ________ field.

frame check sequence

Switches in an Ethernet LAN are organized in a ________ topology.

hierarchy

Ethernet became the dominant LAN technology because of its ________.

low cost, compared with competing technologies

The use of two or more trunk lines between a pair of switches is ________.

possible through link aggregation

Companies that want to link various sites together into a WAN can 1) used leased lines (requires the company to configure and manage them) ; 2) use the Internet; or 3) outsource the work of running a switched data network connecting its sites together through a(n)

public switched data network

LANs that span distances of several kilometers by using multimode fiber are made possible by ________.

regeneration

In a routed LAN, routers divide the LAN into smaller groups of Ethernet switches called ________.

subnets

A DLCI in Frame Relay is a ________.

virtual circuit number

POE can provide enough power over UTP for ________.

wireless access points


Set pelajaran terkait

6 Tips for creating strong passwords

View Set

CH4: Prokaryotic & Eukaryotic Cells

View Set

Chapter 13: Nursing Care During Labor and Birth

View Set

Adolescent Psy Final ICC - Discussion

View Set

Cybersecurity Exam Professor Oliver

View Set

biology lecture SI study guide CH 42

View Set

(مفردات ١ (الاقاليات في الشرق الاوسط

View Set