CCNA_Cisco_4.txt

  1. 1. Which of the following is an 802.3u specification? A. 10BASE-F B. 10BASE-T C. 100BASE-TX D. 1000BASE-CX
    C. 100BASE-TX
  2. 2. Which of the following is the most appropriate choice for Ethernet connectivity? A. Use 10-Mbps Ethernet as a connection between server and LAN. B. Use Gigabit Ethernet as the link at the user level to provide good performance. C. Use Fast Ethernet as a link between the user level and network devices to sup- port the aggregate traffic from each Ethernet segment on the access link. D. None of the above.
    C. Use Fast Ethernet as a link between the user level and network devices to support the aggregate traffic from each Ethernet segment on the access link.
  3. 3. Which standards body created the cables and connector specification used to support Ethernet implementation? A. ISO B. ANSI C. TIA/EIA D. IETF
    C. TIA/EIA
  4. 4. Which of the following statements does not correctly describe a media connector? A. An RJ-45 connector is an 8-pin connector used mainly for terminating coaxial cable. B. An AUI is a 15-pin connector used between a NIC and an Ethernet cable. C. The GBIC is a transceiver that converts serial electric currents to optical signals, and vice versa. D. None of the above.
    A. An RJ-45 connector is an 8-pin connector used mainly for terminating coaxial cable.
  5. 5. For which of the following would you not need to provide a crossover cable? A. Connecting uplinks between switches B. Connecting routers to switches C. Connecting hubs to switches D. None of the above
    B. Connecting routers to switches
  6. 6. Which technology is not a type of wireless communication? A. Cellular B. Wideband C. Infrared D. Spread spectrum
    B. Wideband
  7. 7. Which of the following is not a feature of wired equivalent privacy (WEP)? A. WEP uses the RC4 stream cipher for encryption. B. WEP is a security mechanism defined within in the 802.3 standards. C. One of the goals of WEP is to deny access to the network by unauthorized users who do not possess the appropriate WEP key. D. None of the above.
    B. WEP is a security mechanism defined within in the 802.3 standards.
  8. 8. Which of the following is not a WAN implementation? A. DSL B. ISDN C. Frame Relay D. Ethernet
    D. Ethernet
  9. 9. What type of data-transmission method is used by a WAN? A. Parallel B. Serial C. Single D. None of above
    B. Serial
  10. 10. What best describes a DCE? A. User device at the end of a network B. Equipment that serves as the data source or destination C. Physical devices such as protocol translators and multiplexers D. Devices that make up the network end of the user-to-network interface
    D. Devices that make up the network end of the user-to-network interface
  11. 11. Which of the following media is used to interconnect the ISDN BRI port to the service-provider device? A. CAT 5 UTP straight-through B. CAT 5 UTP crossover C. Coaxial D. Fiber optic
    A. CAT 5 UTP straight-through
  12. 12. What type of connector is used for DSL connection? A. RJ-45 B. RJ-11 C. F D. DB-9
    B. RJ-11
  13. 13. What type of connector is used to connect a router and a cable system? A. RJ-45 B. RJ-11 C. F D. AUI
    C. F
  14. 14. What type of cable is used to connect a terminal and a console port? A. Straight-through B. Rollover C. Crossover D. Coaxial
    B. Rollover
Author
gjpmp3
ID
50909
Card Set
CCNA_Cisco_4.txt
Description
CCNA Cisco chapter 4 questions
Updated