Module 4 7
Module 4 7
method?
1Which advantage does the store-and-forward switching method have compared with
the cut-through switching method?
frame forwarding using IPv4 Layer 3 and 4 information
faster frame forwarding
collision detecting
frame error checking
3 What are two examples of the cut-through switching method? (Choose two.)
3What are two examples of the cut-through switching method? (Choose two.)
store-and-forward switching
CRC switching
fast-forward switching
fragment-free switching
QOS switching
7 What is one advantage of using the cut-through switching method instead of the store-and-forward switching
method?
7What is one advantage of using the cut-through switching method instead of the
store-and-forward switching method?
has a positive impact on bandwidth by dropping most of the invalid frames
makes a fast forwarding decision based on the source MAC address of the frame
provides the flexibility to support any mix of Ethernet speeds
has a lower latency appropriate for high-performance computing applications
8 A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T
network. Which method of memory buffering would work best for this task?
8A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a
port connected to a 100Base-T network. Which method of memory buffering would
work best for this task?
level 1 cache buffering
port-based buffering
shared memory buffering
fixed configuration buffering
10 Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before
forwarding the frame?
10Which frame forwarding method receives the entire frame and performs a CRC
check to detect errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching
12 What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?
12What action will occur if a switch receives a frame and does have the source MAC
address in the MAC table?
The switch sends the frame to a connected router because the destination MAC address is not local.
The switch shares the MAC address table entry with any connected switches.
The switch does not forward the frame.
The switch refreshes the timer on that entry.
13 Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)
13Which two functions are performed at the LLC sublayer of the OSI data link layer?
(Choose two.)
Integrates various physical technologies.
Adds Layer 2 control information to network protocol data.
Provides synchronization between source and target nodes.
Implements a trailer to detect transmission errors.
Enables IPv4 and IPv6 to utilize the same network interface and media.
14 What OSI physical layer term describes the capacity at which a medium can carry data?
14What OSI physical layer term describes the capacity at which a medium can carry
data?
latency
throughput
bandwidth
goodput
15 What is a primary role of the Physical layer in transmitting data on the network?
15What is a primary role of the Physical layer in transmitting data on the network?
determine the path packets take through the network
control data access to the media
create the signals that represent the bits in each frame on to the media
provide physical addressing to the devices
17 In addition to the cable length, what two factors could interfere with the communication carried over UTP cables?
(Choose two.)
17In addition to the cable length, what two factors could interfere with the
communication carried over UTP cables? (Choose two.)
signal modulation technique
size of the network
crosstalk
bandwidth
electromagnetic interference
Navigation Bar
18 A network administrator is measuring the transfer of bits across the company backbone for a mission critical
financial application. The administrator notices that the network throughput appears lower than the bandwidth
expected. Which three factors could influence the differences in throughput? (Choose three.)
18A network administrator is measuring the transfer of bits across the company
backbone for a mission critical financial application. The administrator notices that
the network throughput appears lower than the bandwidth expected. Which three
factors could influence the differences in throughput? (Choose three.)
the amount of traffic that is currently crossing the network
the sophistication of the encapsulation method applied to the data
the type of traffic that is crossing the network
the latency that is created by the number of network devices that the data is crossing
the bandwidth of the WAN connection to the Internet
the reliability of the gigabit Ethernet infrastructure of the backbone
19 With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
19With the use of unshielded twisted-pair copper wire in a network, what causes
crosstalk within the cable pairs?
the magnetic field around the adjacent pairs of wire
the use of braided wire to shield the adjacent wire pairs
the collision caused by two nodes trying to use the media simultaneously
the reflection of the electrical wave back from the far end of the cable
26 Which three basic parts are common to all frame types supported by the data link layer? (Choose three.)
26Which three basic parts are common to all frame types supported by the data link
layer? (Choose three.)
header
MTU size
data
trailer
CRC value
type field
27 Which media communication type does not require media arbitration in the data link layer?
27Which media communication type does not require media arbitration in the data
link layer?
controlled access
half-duplex
deterministic
full-duplex
29 Which statement describes a characteristic of the frame header fields of the data link layer?
29Which statement describes a characteristic of the frame header fields of the data
link layer?
They vary depending on protocols.
They all include the flow control and logical connection fields.
Ethernet frame header fields contain Layer 3 source and destination addresses.
They include information on user applications.
30 During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?
30During the encapsulation process, what occurs at the data link layer for a PC
connected to an Ethernet network?
An IP address is added.
The logical address is added.
The process port number is added.
The physical address is added.
34 Which statement is true about the CSMA/CD access method that is used in Ethernet?
34Which statement is true about the CSMA/CD access method that is used in
Ethernet?
A jamming signal causes only devices that caused the collision to execute a backoff algorithm.
Devices involved in a collision get priority to transmit after the backoff period.
All network devices must listen before transmitting.
When a device hears a carrier signal and transmits, a collision cannot occur.