Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
7 views

Module 4 7

Uploaded by

ohong.181278
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Module 4 7

Uploaded by

ohong.181278
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1 Which advantage does the store-and-forward switching method have compared with the cut-through switching

method?
1Which advantage does the store-and-forward switching method have compared with
the cut-through switching method?
 frame forwarding using IPv4 Layer 3 and 4 information
 faster frame forwarding
 collision detecting
 frame error checking

2 Which switching method uses the CRC value in a frame?


2Which switching method uses the CRC value in a frame?
 store-and-forward
 fragment-free
 fast-forward
 cut-through

3 What are two examples of the cut-through switching method? (Choose two.)
3What are two examples of the cut-through switching method? (Choose two.)
 store-and-forward switching
 CRC switching
 fast-forward switching
 fragment-free switching
 QOS switching

5 What is the auto-MDIX feature?


5What is the auto-MDIX feature?
 It enables a switch to dynamically select the forwarding method.
 It enables a device to automatically configure the duplex settings of a segment.
 It enables a device to automatically configure an interface to use a straight-through or a crossover cable.
 It enables a device to automatically configure the speed of its interface.

6 What is the auto-MDIX feature on a switch?


6What is the auto-MDIX feature on a switch?
 the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection
 the ability to turn a switch interface on or off accordingly if an active connection is detected
 the automatic configuration of an interface for 10/100/1000 Mb/s operation
 the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable

7 What is one advantage of using the cut-through switching method instead of the store-and-forward switching
method?
7What is one advantage of using the cut-through switching method instead of the
store-and-forward switching method?
 has a positive impact on bandwidth by dropping most of the invalid frames
 makes a fast forwarding decision based on the source MAC address of the frame
 provides the flexibility to support any mix of Ethernet speeds
 has a lower latency appropriate for high-performance computing applications

8 A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T
network. Which method of memory buffering would work best for this task?
8A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a
port connected to a 100Base-T network. Which method of memory buffering would
work best for this task?
 level 1 cache buffering
 port-based buffering
 shared memory buffering
 fixed configuration buffering

9 What is the purpose of the FCS field in a frame?


9What is the purpose of the FCS field in a frame?
 to compute the CRC header for the data field
 to verify the logical address of the sending node
 to obtain the MAC address of the sending node
 to determine if errors occurred in the transmission and reception

10 Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before
forwarding the frame?
10Which frame forwarding method receives the entire frame and performs a CRC
check to detect errors before forwarding the frame?
 cut-through switching
 store-and-forward switching
 fragment-free switching
 fast-forward switching

11 Which is a multicast MAC address?


11Which is a multicast MAC address?
 FF-FF-FF-FF-FF-FF
 5C-26-0A-4B-19-3E
 00-26-0F-4B-00-3E
 01-00-5E-00-00-03

12 What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?
12What action will occur if a switch receives a frame and does have the source MAC
address in the MAC table?
 The switch sends the frame to a connected router because the destination MAC address is not local.
 The switch shares the MAC address table entry with any connected switches.
 The switch does not forward the frame.
 The switch refreshes the timer on that entry.
13 Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)
13Which two functions are performed at the LLC sublayer of the OSI data link layer?
(Choose two.)
 Integrates various physical technologies.
 Adds Layer 2 control information to network protocol data.
 Provides synchronization between source and target nodes.
 Implements a trailer to detect transmission errors.
 Enables IPv4 and IPv6 to utilize the same network interface and media.

14 What OSI physical layer term describes the capacity at which a medium can carry data?
14What OSI physical layer term describes the capacity at which a medium can carry
data?
 latency
 throughput
 bandwidth
 goodput

15 What is a primary role of the Physical layer in transmitting data on the network?
15What is a primary role of the Physical layer in transmitting data on the network?
 determine the path packets take through the network
 control data access to the media
 create the signals that represent the bits in each frame on to the media
 provide physical addressing to the devices

17 In addition to the cable length, what two factors could interfere with the communication carried over UTP cables?
(Choose two.)
17In addition to the cable length, what two factors could interfere with the
communication carried over UTP cables? (Choose two.)
 signal modulation technique
 size of the network
 crosstalk
 bandwidth
 electromagnetic interference
 Navigation Bar

18 A network administrator is measuring the transfer of bits across the company backbone for a mission critical
financial application. The administrator notices that the network throughput appears lower than the bandwidth
expected. Which three factors could influence the differences in throughput? (Choose three.)
18A network administrator is measuring the transfer of bits across the company
backbone for a mission critical financial application. The administrator notices that
the network throughput appears lower than the bandwidth expected. Which three
factors could influence the differences in throughput? (Choose three.)
 the amount of traffic that is currently crossing the network
 the sophistication of the encapsulation method applied to the data
 the type of traffic that is crossing the network
 the latency that is created by the number of network devices that the data is crossing
 the bandwidth of the WAN connection to the Internet
 the reliability of the gigabit Ethernet infrastructure of the backbone

19 With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
19With the use of unshielded twisted-pair copper wire in a network, what causes
crosstalk within the cable pairs?
 the magnetic field around the adjacent pairs of wire
 the use of braided wire to shield the adjacent wire pairs
 the collision caused by two nodes trying to use the media simultaneously
 the reflection of the electrical wave back from the far end of the cable

22 What does the term "attenuation" mean in data communication?


22What does the term "attenuation" mean in data communication?
 strengthening of a signal by a networking device
 loss of signal strength as distance increases
 time for a signal to reach its destination
 leakage of signals from one cable pair to another
25 What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)
25What makes fiber preferable to copper cabling for interconnecting
buildings? (Choose three.)
 lower installation cost
 limited susceptibility to EMI/RFI
 durable connections
 greater distances per cable run
 greater bandwidth potential
 easily terminated
 Navigation Bar

26 Which three basic parts are common to all frame types supported by the data link layer? (Choose three.)
26Which three basic parts are common to all frame types supported by the data link
layer? (Choose three.)
 header
 MTU size
 data
 trailer
 CRC value
 type field

27 Which media communication type does not require media arbitration in the data link layer?
27Which media communication type does not require media arbitration in the data
link layer?
 controlled access
 half-duplex
 deterministic
 full-duplex

28 Which statement describes an extended star topology?


28Which statement describes an extended star topology?
 All end and intermediate devices are connected in a chain to each other.
 End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
 End devices are connected together by a bus and each bus connects to a central intermediate device.
 Each end system is connected to its respective neighbor via an intermediate device.

29 Which statement describes a characteristic of the frame header fields of the data link layer?
29Which statement describes a characteristic of the frame header fields of the data
link layer?
 They vary depending on protocols.
 They all include the flow control and logical connection fields.
 Ethernet frame header fields contain Layer 3 source and destination addresses.
 They include information on user applications.

30 During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?
30During the encapsulation process, what occurs at the data link layer for a PC
connected to an Ethernet network?
 An IP address is added.
 The logical address is added.
 The process port number is added.
 The physical address is added.

31 What is a characteristic of the LLC sublayer?


31What is a characteristic of the LLC sublayer?
 It provides delimitation of data according to the physical signaling requirements of the medium.
 It defines software processes that provide services to the physical layer.
 It provides the logical addressing required that identifies the device.
 It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

32 What is contained in the trailer of a data-link frame?


32What is contained in the trailer of a data-link frame?
 logical address
 data
 physical address
 error detection
33 What three items are contained in an Ethernet header and trailer? (Choose three.)
33What three items are contained in an Ethernet header and trailer? (Choose
three.)
 error-checking information
 destination MAC address
 source MAC address
 destination IP address
 source IP address
 Navigation Bar

34 Which statement is true about the CSMA/CD access method that is used in Ethernet?
34Which statement is true about the CSMA/CD access method that is used in
Ethernet?
 A jamming signal causes only devices that caused the collision to execute a backoff algorithm.
 Devices involved in a collision get priority to transmit after the backoff period.
 All network devices must listen before transmitting.
 When a device hears a carrier signal and transmits, a collision cannot occur.

You might also like