Cn_rev

20 Questions | Attempts: 150
Please wait...
Question 1 / 21
🏆 Rank #--
Score 0/100

1. You want to implement a network medium that is not susceptible to EMI. Which type of cabling should you use?  

Explanation

D. Fiber optic cable provides a more secure, long-distance cable that is not susceptible to EMI
interference at high speeds.

Submit
Please wait...
About This Quiz
Cn_rev - Quiz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. When data is encapsulated, which is the correct order?    

Explanation

C. The encapsulation method is: data, segment, packet, frame, bit.

Submit

3. Segmentation of a data stream happens at which layer of the OSI model?  

Explanation

D. The Transport layer receives large data streams from the upper layers and breaks these up
into smaller pieces called segments.

Submit

4. Acknowledgements, sequencing, and flow control are characteristic of which OSI layer?  

Explanation

C. A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted
and received reliably. A reliable connection is defined by a virtual circuit that uses
acknowledgments, sequencing, and flow control, which are characteristics of the Transport
layer (layer 4).

Submit

5. PDUs at the Network layer of the OSI are called what?  

Explanation

C. Protocol Data Units are used to define data at each layer of the OSI model. PDUs at the Network
layer are called packets.

Submit

6. Which layer of the OSI provides translation of data?  

Explanation

. The only layer of the OSI model that can change data is the Presentation layer.

Submit

7. You have the following MAC address: C9-3F-32-B4-DC-19. What is the OUI portion in binary?  

Explanation

C. The first three bytes of a hardware (MAC) address are considered the OUI portion and identify
the manufacturer of the card. This code, which is assigned by the IEEE, is called the organizationally
unique identifier (OUI). The first three bytes are C9-3F-32, which is 11001001-
00111111-00110010 in binary.

Submit

8. Which of the following are considered some reasons for LAN congestion? (Choose six.)  

Explanation

B, C, D, F, G, H. Although Bill Gates is a good answer for me, the answers are: not enough
bandwidth, too many users, broadcast storms, multicasting, adding hubs for connectivity to the
network, and a large amount of ARP or IPX traffic.

Submit

9. Why does the data communication industry use the layered OSI reference model? (Choose two.)  

Explanation

A, D. The main advantage of a layered model is that it can allow application developers to
change aspects of a program in just one layer of the layer model’s specifications. Advantages of
using the OSI layered model include, but are not limited to, the following: It divides the network
communication process into smaller and simpler components, thus aiding component development,
design, and troubleshooting; allows multiple-vendor development through standardization
of network components; encourages industry standardization by defining what functions
occur at each layer of the model; allows various types of network hardware and software to
communicate; and prevents changes in one layer from affecting other layers, so it does not hamper
development.

Submit

10. What is the maximum data rate for 802.11b wireless LANs?  

Explanation

C. 802.11b, also called “Wi-Fi,” has a maximum data rate of 11Mbps.

Submit

11. How does a host on an Ethernet LAN know when to transmit after a collision has occurred?

Explanation

18. C. Once transmitting stations on an Ethernet segment hear a collision, they send an extended
jam signal to ensure that all stations recognize the collision. After the jamming is complete, each
sender waits a predetermined amount of time, plus a random time. After both timers expire, they
are free to transmit.

Submit

12. Which of the following are reasons for breaking up a network into two segments with a router? (Choose two.)  

Explanation

17. B, D. Routers, by default, break up broadcast domains, which means that broadcasts sent on
one network would not be forwarded to another network by the router.

Submit

13. What are two purposes for segmentation with a bridge?  

Explanation

B, C. Bridges break up collision domains, which allows more bandwidth for users.

Submit

14. Which of the following types of connections can use full duplex? (Choose three.)  

Explanation

B, C, E. Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point
connection between two devices capable of running full duplex. Switches and hosts can run full
duplex between each other.

Submit

15. Which of the following describe router functions? (Choose four.)  

Explanation

A, C, E, G. Routers provide packet switching, packet filtering, internetwork communication,
and path selection.

Submit

16. Which fields are contained within an IEEE Ethernet frame header? (Choose two.)  

Explanation

A, D. An Ethernet frame has source and destination MAC addresses, an Ether-Type field to
identify the Network layer protocol, the data, and the FCS field that holds the result of the CRC.

Submit

17. Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?  

Explanation

A, D. Unlike full duplex, half-duplex Ethernet operates in a shared collision domain, and it has
a lower effective throughput then full duplex.

Submit

18. Which of the following are types of flow control?  

Explanation

A, C, D. The common types of flow control are buffering, windowing, and congestion avoidance.

Submit

19. You want to use full-duplex Ethernet instead of half duplex. Which two of the following will be benefits on your network?  

Explanation

19. B, C. No collision on a point-to-point full-duplex Ethernet segment should occur, and fullduplex
Ethernet should be faster then half-duplex Ethernet.

Submit

20. Which of the following describes a MAC address? (Choose two.)  

Explanation

C, D. A MAC address is 6 bytes long (48 bits) and is burned into the NIC card by the manufacturer.
IPX, when it was still used, used the MAC address as part of the configuration.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You want to implement a network medium that is not susceptible to EMI....
When data is encapsulated, which is the correct order?...
Segmentation of a data stream happens at which layer of the OSI model?...
Acknowledgements, sequencing, and flow control are characteristic of...
PDUs at the Network layer of the OSI are called what?  
Which layer of the OSI provides translation of data?  
You have the following MAC address: C9-3F-32-B4-DC-19. What is the OUI...
Which of the following are considered some reasons for LAN congestion?...
Why does the data communication industry use the layered OSI reference...
What is the maximum data rate for 802.11b wireless LANs?  
How does a host on an Ethernet LAN know when to transmit after a...
Which of the following are reasons for breaking up a network into two...
What are two purposes for segmentation with a bridge?  
Which of the following types of connections can use full duplex?...
Which of the following describe router functions? (Choose four.)...
Which fields are contained within an IEEE Ethernet frame header?...
Which of the following are unique characteristics of half-duplex...
Which of the following are types of flow control?  
You want to use full-duplex Ethernet instead of half duplex. Which two...
Which of the following describes a MAC address? (Choose two.)  
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!