Microsoft Networking Essentials Q3

19 Questions | Total Attempts: 182

SettingsSettingsSettings
Please wait...
It Essentials Quizzes & Trivia

Physical


Questions and Answers
  • 1. 
    Which of the following devices enables two computers to communicate when they are using different protocols at each layer of the Open Systems Interconnection (OSI) reference model?
    • A. 

      A router

    • B. 

      A switch

    • C. 

      A hub

    • D. 

      A gateway

  • 2. 
    Review the following illustration. Station A is sending a message to Station B.If you examined the contents of the frame as it traveled across Segment 1, what would the source and destination Media Access Control (MAC) addresses be?
    • A. 

      The source MAC address would be AA, and the destination MAC address would be 22.

    • B. 

      The source MAC address would be BB, and the destination MAC address would be 11.

    • C. 

      The source MAC address would be AA, and the destination MAC address would be 11.

    • D. 

      The source MAC address would be AA, and the destination MAC address would be BB.

  • 3. 
    Which of the following devices enables two computers to communicate when they are using different protocols at each layer of the Open Systems Interconnection (OSI) reference model?
    • A. 

      A router

    • B. 

      A switch

    • C. 

      A hub

    • D. 

      A gateway

  • 4. 
    Review the following illustration. Station A is sending a message to Station B.If you examined the contents of the frame as it traveled across Segment 1, what would the source and destination Media Access Control (MAC) addresses be?
    • A. 

      The source MAC address would be AA, and the destination MAC address would be 22.

    • B. 

      The source MAC address would be BB, and the destination MAC address would be 11.

    • C. 

      The source MAC address would be AA, and the destination MAC address would be 11.

    • D. 

      The source MAC address would be AA, and the destination MAC address would be BB.

  • 5. 
    You have been hired by a company to redesign its local area network (LAN). Right now it has a single 10-Mbps Ethernet LAN with 40 users and two shared servers, all connected through three hubs. Users on the network must share files with one another and also access the shared servers to retrieve and store files. Users are complaining that the network is too slow. Management states that cost is a factor that must be considered. What would you implement in this situation?
    • A. 

      Split the network into smaller segments with dedicated hubs as opposed to shared hubs.

    • B. 

      Split the network into two routed LANs with 20 users each.

    • C. 

      Replace the hubs with switches to define separate collision domains and filter unnecessary traffic from each segment.

    • D. 

      Replace the hubs with a Layer 3 switch and define two virtual LANs (VLANS) with 20 users each.

  • 6. 
    • A. 

      They are network layer devices that use logical addressing to forward frames.

    • B. 

      They are data-link layer devices that use Media Access Control (MAC) addresses to forward frames.

    • C. 

      They build their internal tables based on destination address and forward packets based on source address.

    • D. 

      They must support the network layer protocol implemented on the local area network. (LAN).

    • E. 

      Each port defines a separate broadcast domain.

  • 7. 
    Review the following illustration. How many collision domains and broadcast domains exist in the network diagram?
    • A. 

      There are three collision domains and three broadcast domains.

    • B. 

      There are one collision domain and three broadcast domains.

    • C. 

      There are one broadcast domain and three collision domains.

    • D. 

      There are no collision domains and only one broadcast domain.

  • 8. 
    Review the following illustration. Station A is sending a message to Station B across a router.If you examined the contents of the frame as it traveled across Segment 2, what would the source and destination Media Access Control (MAC) addresses be?
    • A. 

      The source MAC address would be AA and the destination MAC address would be 22.

    • B. 

      The source MAC address would be BB and the destination MAC address would be 11.

    • C. 

      The source MAC address would be 22 and the destination MAC address would be BB.

    • D. 

      The source MAC address would be AA and the destination MAC address would be BB.

  • 9. 
    Which of the following features can network interface adapters use to automatically configure themselves to run at an agreed-upon speed and duplex mode?
    • A. 

      Link negotiation

    • B. 

      Speed negotiation

    • C. 

      Autonegotiation

    • D. 

      Media Access Control (MAC) negotiation

  • 10. 
    • A. 

      They are data-link layer devices that connect network devices in a star or ring topology.

    • B. 

      They are physical layer devices that connect network devices in a star or ring topology.

    • C. 

      They amplify and repeat signals received through one port out all other ports regardless of the destination.

    • D. 

      Token Ring hubs are multistation access units (MAUs). MAUs can be joined together through dedicated Ring In (RI) and Ring Out (RO) ports to build a larger ring.

    • E. 

      Hubs provide internal crossover circuits and use uplink ports to form a hierarchical star.

  • 11. 
    Which of the following statements about full-duplex communication is not true?
    • A. 

      All devices attached to a full-duplex segment must support full-duplex communication.

    • B. 

      Only the transmitting device must support full-duplex communication.

    • C. 

      Full-duplex communication is not subject to collisions.

    • D. 

      Full-duplex communication does not use the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access control method.

  • 12. 
    What is the main function of the Media Access Control (MAC) mechanism?
    • A. 

      To convert hexadecimal data to binary

    • B. 

      To provide a common data frame to communicating systems

    • C. 

      To perform error detection and correct segment errors

    • D. 

      To regulate access to the network medium

  • 13. 
    Which of the following statements best describes the bus mastering feature?
    • A. 

      It converts binary to electrical signals prior to transmission.

    • B. 

      It provides the signal amplification and timing within the computer.

    • C. 

      It performs error detection and corrects bus errors.

    • D. 

      It offloads processor cycles by taking over the bus arbitration process when data is being transferred from system memory to a network interface card (NIC).

  • 14. 
    In the 100Base-X or Fast Ethernet specification, what function of the fast link pulse (FLP) signals sent by hubs and network interface adapters is not provided by the normal link pulse (NLP) signals used by standard Ethernet?
    • A. 

      To verify the integrity of the connection (or link) between devices

    • B. 

      To advertise the capabilities of the interface adapters and negotiate the speed and duplex mode of the link

    • C. 

      To negotiate the Media Access Control (MAC) layer mechanism to be used between communicating devices

    • D. 

      To detect bad frames

  • 15. 
    On Microsoft Windows operating systems (Windows 95 and later), what is the primary tool that you use to manage and configure a network interface adapter, and where is it located?
    • A. 

      The Network Connection tool, accessed from the Network Connections dialog box in Control Panel

    • B. 

      The Device Manager utility, accessed from the System Properties dialog box in Control Panel

    • C. 

      The System Manager utility, accessed from the Network Connections dialog box in Control Panel

    • D. 

      The Interface Manager utility, accessed from the System Properties dialog box in Control Panel

  • 16. 
    What communication method does not allow for the simultaneous transmission and reception of data and is subject to collisions?
    • A. 

      Half-duplex

    • B. 

      Full-duplex

    • C. 

      Biplex

    • D. 

      Dual channel

  • 17. 
    Which of the following protocols do enterprise networks use to track the performance of critical network components?
    • A. 

      SMTP

    • B. 

      MGMP

    • C. 

      SMGP

    • D. 

      SNMP

  • 18. 
    Which communication method requires separate channels for simultaneously transmitting and receiving data without collisions?
    • A. 

      Half-duplex

    • B. 

      Full-duplex

    • C. 

      Biplex

    • D. 

      Dual channel

  • 19. 
    • A. 

      Cut-through

    • B. 

      Source route

    • C. 

      Store-and-forward

    • D. 

      Destination switch