CCNA_Cisco_5.txt

  1. 1. Which of the following is not one of the recognized IEEE sublayers? A. Media Access Control B. Data Link Control C. Logical Link Control D. None of the above
    B. Data Link Control
  2. 2. The recognized IEEE sublayers are concerned with what layers of the OSI reference model? A. 2 and 3 B. 1 and 2 C. 3 and 4 D. 1 and 3
    B. 1 and 2
  3. 3. The LLC, as a sublayer, participates in the process. A. Encryption B. Encapsulation C. Framing D. All of the above
    B. Encapsulation
  4. 4. The first six hexadecimal numbers in a MAC address represent an ? A. Interface serial number B. Organizationally unique identifier C. Interface unique identifier D. None of the above
    B. Organizationally unique identifier
  5. 5. MAC addresses are bits in length. A. 12 B. 24 C. 48 D. 64
    C. 48
  6. 6. What is the name of the access method used in Ethernet that explains how Ethernet works? A. TCP/IP B. CSMA/CD C. CMDA/CS D. CSMA/CA
    B. CSMA/CD
  7. 7. Where does the MAC address reside? A. Transceiver B. Computer BIOS C. NIC D. CMOS
    C. NIC
  8. 8. Which of the following statements best describes communication between two devices on a LAN? A. The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it, but the devices with nonmatching addresses otherwise ignore the frame. B. The source encapsulates the data and places a destination MAC address in the frame. It puts the frame on the LAN, where only the device with the matching address can check the address field. C. The destination device encapsulates data in a frame with the MAC address of the source device and puts it on the LAN. The device with the matching address removes the frame. D. Each device on the LAN receives the frame and passes it up to the computer, where software decides whether to keep or to discard the frame.
    A. The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it, but the devices with nonmatching addresses otherwise ignore the frame.
  9. 9. Which functions are associated with framing? A. Identifies which computers are communicating with one another B. Signals when communication between individual computers begins and when it ends C. Flags corrupted frames D. All of the above
    D. All of the above
  10. 10. How does a computer on a LAN detect an error in a frame? A. It sends a copy of the frame back to the sender for verification. B. It checks the destination address to verify that the frame really was intended for it. C. It compares an FCS in the frame to one that the computer calculates from the contents of the frame. D. It calculates a checksum from the data in the frame and then sends it back to the source for verification.
    C. It compares an FCS in the frame to one that the computer calculates from the contents of the frame.
  11. 11. Media Access Control refers to what? A. The state in which a NIC has captured the networking medium and is ready to transmit. B. Rules that govern media capture and release. C. Protocols that determine which computer on a shared-medium environment is allowed to transmit the data. D. A formal byte sequence has been transmitted.
    C. Protocols that determine which computer on a shared-medium environment is allowed to transmit the data
  12. 12. Which best describes a CSMA/CD network? A. One node’s transmission traverses the entire network and is received and examined by every node. B. Signals are sent directly to the destination if the source knows both the MAC and IP addresses. C. One node’s transmission goes to the nearest router, which sends it directly to the destination. D. Signals always are sent in broadcast mode.
    A. One node’s transmission traverses the entire network and is received and examined by every node.
  13. 13. In an Ethernet or IEEE 802.3 LAN, when do collisions occur? A. When one node places a packet on a network without informing the other
    • nodes B. When two stations listen for a traffic, hear none, and transmit simultaneously C. When two network nodes send packets to a node that no longer is broadcasting D. When jitter is detected and traffic is disrupted during normal transmission
    • B. When two stations listen for a traffic, hear none, and transmit simultaneously
  14. 14. Which is an important Layer 2 data link layer function? A. Logical link control B. Addressing C. Media access control D. All of the above
    D. All of the above
  15. 15. Which of the following is an Ethernet frame error type? A. Local collision B. Remote collision C. Late collision D. All of the above
    D. All of the above
  16. 16. Which protocol is a nondeterministic protocol? A. Token Ring B. CSMA/CD C. IPX D. RIP
    B. CSMA/CD
  17. 17. Which is true of a deterministic MAC protocol? A. It defines collisions and specifies what to do about them. B. It allows the hub to determine the number of users active at any one time. C. It allows hosts to “take turns” sending data. D. It allows the use of a “talking stick” by network administers to control the media access of any users considered “troublemakers.”
    C. It allows hosts to “take turns” sending data.
  18. 18. The network area within which data packets originated and collide is called a ? A. Collision domain B. Network domain C. Broadcast domain D. Network segment
    A. Collision domain
  19. 19. Which best describes broadcasting? A. Sending a single frame to many stations at the same time B. Sending a single frame to all routers to simultaneously update their routing tables C. Sending a single frame to all routers at the same time D. Sending a single frame to all hubs and bridges at the same time
    A. Sending a single frame to many stations at the same time
  20. 20. Using repeaters the collision domain. A. Reduces B. Has no effect on C. Extends D. None of the above
    C. Extends
  21. 21. The process of using the complex networking devices, such as bridges, switches, and routers, to break up the collision domains is known as ? A. Sectioning B. Segmentation C. Collision domain reduction D. None of the above
    B. Segmentation
Author
gjpmp3
ID
50911
Card Set
CCNA_Cisco_5.txt
Description
CCNA Cisco chapter 5 questions
Updated