finals by pengxiang

VIEWS: 13 PAGES: 55

									1
Which of the following OSI layers offers reliable, connection-oriented
data communication services?

application

presentation

session

*transport

network
--------------------------------------------------------------------
2
Router interface Ethernet 0 has been assigned the IP address
10.172.192.168 255.255.255.240. What is the network IP address of this
interface?

10.0.0.0

10.172.0.0

10.172.192.0

*10.172.192.160

10.172.192.168

10.172.192.175
--------------------------------------------------------------------
3
Examine the graphic with current configurations. The New York Offices of
ABC Company recently upgraded the computers in the administrative office.
Shortly after the upgrade, Host A in the clerical office failed and was
replaced with one of the retired administrative office computers.
However, the computer can not access the company network in the new
location. What is the likely cause of this network access issue for Host
A?

MAC address incorrectly entered

*default gateway incorrectly entered

subnet mask incorrectly entered

IP address incorrectly entered



4
Which of the following increases the potential for a collision to occur?

the use of an active hub instead of an intelligent hub
the use of an intelligent hub instead of an active hub

a reduction in the number of devices attached to the hub

*an increase in the number of devices attached to the hub *
--------------------------------------------------------------------
5
What is attenuation?

opposition to the flow of current

measurement of electrical signals relative to time

*degradation of a signal as it travels along the medium

amount or volume of traffic that is flowing on the medium
--------------------------------------------------------------------
6
Two peer hosts are running applications that exchange data using UDP.
During the current session, a datagram fails to arrive at the
destination. What is true concerning the retransmission of the datagram?

*Datagram retransmission occurs when the retransmission timer expires in
the source host.

Datagram retransmission occurs when the retransmission timer expires in
the destination host.

Datagram retransmission is controlled by the application layer protocol.

Datagram retransmission involves only the data with sequence numbers
equal to or higher than the sequence number of the current datagram.
--------------------------------------------------------------------
7
What is significant about the ping 127.0.0.1 command?

*It verifies the operation of the TCP/IP protocol stack on a host and is
called an internal loopback test.

It verifies connection to the remote host with the IP address 127.0.0.1.

It verifies whether the router that connects the local network to other
networks can be reached.

It verifies the route packets take between the local host and the host
with the IP address 127.0.0.1.

8
Which LAN switching mode has the highest latency?

fast forward

fragment-free
latency forwarding
*store-and-forward
--------------------------------------------------------------------
9
Which of the following application layer protocols use UDP segments?
(Choose two.)

*DNS

FTP

Telnet

*TFTP

SMTP
--------------------------------------------------------------------
10
Which cable specifications are indicated by 100BASE-T?

100-Mbps transmission speed, baseband signal, coaxial cable

100-Mbps transmission speed, broadband signal, twisted-pair cable

*100-Mbps transmission speed, baseband signal, twisted-pair cable

Equal to 10-Gbps transmission speed, baseband signal, twisted-pair cable
--------------------------------------------------------------------
11
When is a crossover cable used in a network?

when connecting a host to the router console port

when connecting a host to a switch

*when connecting a host to a host

when connecting a switch to a router

12
Refer to the graphic. What must be configured on Host A to allow it
communicate with the e-mail server? (Choose three.)

IP address *

subnet mask *

default gateway *

router name

switch name

NetBIOS name address
--------------------------------------------------------------------
13
Which cable diagram displays the end to end pinout for a crossover cable
used with Cisco devices?

Cable A

Cable B

*Cable C

Cable D
--------------------------------------------------------------------
14
Which type of address is 192.168.17.134/29?

*host address

network address

broadcast address

multicast address

15
How many collision domains are shown in the diagram?

three

four

five

*six

seven

eight
--------------------------------------------------------------------
16
When is a straight-through cable used in a network?

when connecting a router through the console port

when connecting one switch to another switch

*when connecting a host to a switch

when connecting a router to another router
--------------------------------------------------------------------
17
How does network cable length affect attenuation?
Category 5 cable that is run in metal conduit has the highest attenuation
in the shortest distance.

Shorter cable lengths have greater signal attenuation.

*Longer cable lengths have greater signal attenuation.

The length of the cable has no effect on signal attenuation.

18
Which of the following statements are correct about CSMA/CD? (Choose
three.)

It is a media access method used in LANs. *

It is a media access method used in FDDI WANs.

When a device needs to transmit, it checks to see if the media is
available. *

A device sends data without checking media availability because all
devices have equal access. Multiple devices can successfully transmit
simultaneously.

*Only one device can successfully transmit at a time.
--------------------------------------------------------------------
19
Which of the following must be present for current to flow? (Choose
three.)

*closed loop

bit-generating device

insulating material

*source of voltage

*load

switch
--------------------------------------------------------------------
20
If Host A pings Host B through a newly installed switch with no entries
in the MAC address table, which stations will receive the ping packet?

B only

A and B

B and switch

A, B, and switch
B, C, D, and switch *

A, B, C, D, and switch


21
Which devices shown in the graphic must have a MAC address?

only PC

only router

PC and router

PC, hub, and router

*PC, printer, and router
--------------------------------------------------------------------
22
What kind of connection is represented in the graphic?

*console connection

Ethernet connection

ISDN connection

leased line connection
--------------------------------------------------------------------
23
Which of the following is the decimal representation of the binary number
11010011?

203

204

*211

212
--------------------------------------------------------------------
24
Which type of cable is required to make a connection between a router
console port and a PC COM port?

straight-through cable

crossover cable

*rollover cable

DB-9 cable

coaxial cable
25
Determine the number of useable networks and hosts for the IP address
192.168.50.0/27

4 networks / 62 hosts

6 networks / 64 hosts

32 networks / 8 hosts

*6 networks / 30 hosts

8 networks / 32 hosts

2 networks / 8 hosts
--------------------------------------------------------------------
26
A network administrator is placing an older router back in to service.
The administrator discovered that the IOS and configuration files need to
be updated to meet the LAN specifications. Which application layer
protocol is used to transfer the new configuration files into the router
memory?

*SNMP

SMTP

HTTP

TFTP
--------------------------------------------------------------------
27
Which of the following best describes Spanning Tree Protocol?

It enables a network to span across multiple physical segments.

*It enables a switch to eliminate switching loops.

It enables a switch to dynamically choose the best switch mode.

It enables a switch to perform as a router.
--------------------------------------------------------------------
28
Which of the following subnet masks could be used when subnetting a Class
B IP address? (Choose two.)

255.0.0.0

*255.255.0.0

255.192.255.0

255.224.0.0
*255.255.252.0

255.255.255.128
--------------------------------------------------------------------
29
How is data encapsulated as it is moved down the OSI model?

data, segments, frames, packets, bits

data, packets, segments, frames, bits

*data, segments, packets, frames, bits

data, packets, frames, segments, bits
--------------------------------------------------------------------
30
Which of the following describes latency?

the noise generated from outside a cable

the degradation of a signal as it travels along the media

the time required for a NIC to place a frame on the network media

*the delay between the time a frame leaves its source device and reaches
its destination
--------------------------------------------------------------------
31
Which of the following is the binary representation of the decimal number
111?

*01101111

01111101

11110111

11101101
--------------------------------------------------------------------
32
Which LAN switching mode begins switching after reading only the first 64
bytes of the frame?

fast forward

*fragment-free

latency forwarding

store-and-forward

33
When using Category 5 UTP cable, which RJ-45 pin pairs are used to
exchange data between hosts on an Ethernet network?

1 and 2; 4 and 5

1 and 2; 3 and 6 *

3 and 6; 7 and 8

4 and 5; 7 and 8
--------------------------------------------------------------------
34
Which of the following commands could be used on a Windows-based computer
to view the current IP configuration of the system? (Choose two.)

configip

ifconfig

*ipconfig

*winipcfg

winipconfig
--------------------------------------------------------------------
35
Which type of address is 192.168.17.111/28?

host address

network address

*broadcast address

multicast address

36
Which of the following networking devices increase the number of
collision domains? (Choose three.)

*switch
hub
*router
repeater
*bridge
--------------------------------------------------------------------
37
What information can be determined from the MAC addresses of PC1, PC2,
and PC3, as shown in the graphic? (Choose two.)

PC1 and PC2 NICs need to be replaced because they have the same OUI
identifier.
PC2 and PC3 NICs need to be replaced because they have different OUI
identifiers.

*PC1 and PC2 NICs are from the same vendor.

PC1 and PC3 NICs need to be replaced because they have the same vendor-
assigned address.

*PC2 and PC3 NICs are from different vendors.

PC2 and PC3 NICs are from the same vendor.
--------------------------------------------------------------------
38
Which of the following are considered WAN technologies? (Choose two.)

*DSL

Ethernet

Wireless Ethernet

*T1-Carrier

Token Ring
39
which one of the router connectors shown in the graphic would be used for
a LAN connection?

Connector A

Connector B

*Connector C

Connector D
--------------------------------------------------------------------
40
How is full-duplex capability typically achieved in fiber-optic cable?

*Two fibers are encased in separate sheaths.

Light is bounced at different rates in opposite directions.

Transmit speeds are so high that half-duplex is acceptable.

Colors of the light spectrum are separated into transmit and receive
streams.
--------------------------------------------------------------------
41
Which of the following are characteristics of IP? (Choose three.)

connection-oriented protocol

connectionless protocol*
reliable protocol

unreliable protocol *

routed protocol *

routing protocol
--------------------------------------------------------------------
42
Which of the following describe the token-passing logical topology?
(Choose two.)

*FDDI is an example of a token-passing network.

Token-passing logical topologies must also be physical ring topologies.

One of the disadvantages of the token-passing logical topology is the
high collision rate.

Computers transmit data after "listening" to the wire to detect other
traffic.

*Computers are allowed to transmit data only when they possess a token.


43
What is the maximum length of a media segment used for 100BASE-TX?

*100 meters

185 meters

400 meters

500 meters
--------------------------------------------------------------------
44
which of the following networking devices divide a network into separate
collision domains? (Choose two.)

repeater

*bridge

*switch

AUI

hub
--------------------------------------------------------------------
45
Which of the following are characteristics of UTP cable? (Choose three.)
*Each wire is covered by insulating material.

It is not affected by EMI or RFI.

*It is a four-pair wire medium.*

It is difficult to terminate the cable.

*It relies on the cancellation effect produced by the twisted wire pairs.

It is more expensive than any other type of LAN cabling.

46
Examine the graphic with current configurations. Host A in the Clerical
offices failed and was replaced. Although a ping to 127.0.0.1 was
successful, the replacement computer can not access the company network.
What is the likely cause of the problem?

IP address incorrectly entered

network cables unplugged

*subnet mask incorrectly entered

network card failure
--------------------------------------------------------------------
47
Which of the following describes a physical full-mesh topology?

It requires termination at both ends of the cable.

It uses a hub or a switch as a central point to connect all wires.

*It provides maximum connectivity between all network systems.

It links all computers to a main computer that controls all traffic on
the network.
--------------------------------------------------------------------
48
Which two statements describe the TFTP protocol? (Choose two.)

uses authenticated file transfer procedure

provides connection-oriented service

*provides connectionless service

provides more features that FTP

*lacks most of the features of FTP
--------------------------------------------------------------------
49
Which of the following are transport layer protocols of the TCP/IP model?
(Choose two.)
FTP
*UDP
SMTP
TFTP
*TCP



50
Which type of UTP network cable connects two Cisco switches?

straight-through

*crossover

rollover

patch
--------------------------------------------------------------------
51
How will the MAIN router dynamically learn a route to the 10.16.10.48/28
subnetwork in the diagram?

with a routed protocol

with a routing protocol

*with a static route

with a directly connected route
--------------------------------------------------------------------
52
Which of the following describes the RIP version 1 routing protocol?

Cisco proprietary hybrid protocol

*distance vector protocol that uses hop count as the only metric *

link state protocol supporting multiple routed protocols

distance vector protocol that uses delay, bandwidth, load, and
reliability metrics
--------------------------------------------------------------------
53
How many broadcast domains are shown in the diagram?

*three

four

five

six
seven

eight


54
Which of the following are advantages of UTP cable? (Choose three.)

*less expensive than fiber optic

*flexible and easy to run in a building

distance between signal boosts is longer than it is for coaxial

*transmits data at a faster rate than any copper-based media

receives less RMF and EMI interference than other types
--------------------------------------------------------------------
Which of the following devices extend a collision domain? (choose 2)
*-hub
*-repeater



/////////////////////////////////////////////////////////////////////////

We are not sure what module this is, only that its Cisco CCNA


Final Study Guide
1. Which of the following describes the use of Spanning Tree Protocol
(STP)?
A. resolve routing loops
B. eliminate Split Horizon errors
C. limit collisions
D. resolve switching loops

2. CompA" is trying to locate a new computer named "CompB" on the
network. Which of the following does "CompA" broadcast to find the MAC
address of "CompB"?
A. MAC request
B. ARP request
C. ping
D. Telnet
E. proxy ARP

3.   Broadcast radiation can cause which of the following? (Choose three.)
A.   higher segment attenuation
B.   reduced host performance
C.   reduced switching speeds
D.   increased network collisions
E.   increased protocol storms
F.   increased ARP requests
4. Which of the following protocols use a three-layer hierarchical
network-addressing scheme?
A. IPX
B. IP
C. NetBeui
D. UDP

5. Which of the following are useable Class A IP addresses with a default
subnet mask? (Choose three.)
A. 127.0.39.1
B. 111.9.28.30
C. 123.1.2.132
D. 128.50.38.2
E. 105.1.34.1
F. 0.23.92.3

6. What are the total number of bits available for assignment to the
subnet field when subnetting Class A, Class B, and Class C networks?
(Choose three.)
A. 24
B. 22
C. 16
D. 14
E. 8
F. 6

7. Which of the following protocols are used for e-mail transfer between
clients and servers? (Choose three.)
A. TFTP
B. SNMP
C. POP3
D. SMTP
E. IMAP4
F. postoffice


8. Which   of the following is important when considering IP addressing in
relation   to BOOTP?
A. BOOTP   dynamically creates a database of all available IP addresses
within a   network.
B. BOOTP   allows multiple workstation profiles sharing the same IP
address.
C. BOOTP   is not designed to provide dynamic address assignment.
D. BOOTP   must statically assign IP addresses through RARP.

9. Which of the following does 1000BASE-T use to accomplish gigabit
speeds on Cat 5e cable?
A. the use of four conductors in full-duplex mode
B. the use of two multiplexed pairs of wires, simultaneously
C. the use of three pairs of wires for data and the fourth for
stabilization and forward error correction
D. the use of all four pairs of wires in full-duplex mode, simultaneously
10. Which of the following are features of the Internet Protocol (IP)?
(Choose two.)
A. It is the most widely implemented global addressing scheme.
B. It allows two hosts to share a single address on a local area network.
C. It is a hierarchical addressing scheme allowing addresses to be
grouped.
D. It is only locally significant, used primarily on local area networks.

11. Which of the following are small, discrete components found within a
personal computer? (Choose three.)
A. transistor
B. microprocessor
C. power supply
D. capacitor
E. light emitting diode
F. hard disk

12. Which of the following features are important considerations when
designing a 10BASE-T network? (Choose three.)
A. operates in either full-duplex or half-duplex modes
B. cable is heavy, stiff, and difficult to install
C. supports a longer segment length than 10BASE5
D. usually configured in a star or extended star topology
E. cabling represents a single point of failure
F. utilizes a shared bus device

13. Which of the following is a term associated with replacing hubs with
switches to increase the number of collision domains?
A. encapsulation
B. latency
C. segmentation
D. layered model
E. broadcast domain
F. extended

14. Select the necessary information that is required to compute the
estimated time it would take to transfer data from one location to
another. (Choose two.)
A. file size
B. data format
C. network in use
D. type of medium
E. bandwidth of the link

15. What type of network cable is used to interconnect the ISDN BRI port
to a service-provider device?
A. cross-over
B. straight-through
C. roll-over
D. patch cable

16. When an administrator establishes a terminal connection to a server
named corporate.mydomain.com, which protocols are used to remotely issue
commands to that server? (Choose two.)
A.   SMTP
B.   SNMP
C.   DNS
D.   Telnet
E.   FTP
F.   NMS

17. Convert the binary number 10111010 into its hexadecimal equivalent.
Select the correct answer from the list below.
A. 85
B. 90
C. BA
D. A1
E. B3
F. 1C

18. Which of the following describe characteristics of the Telnet
protocol? (Choose three.)
A. The client host requires processing power equal to that of the server
to which it is connected.
B. The processing and storage takes place on the remote server.
C. Telnet is a true client server application.
D. Telnet is a presentation layer applet.
E. The Telnet server runs special software called a daemon.
F. Telnet requires the support of DNS and FTP to function properly.

19. Which of the following are valid frame types for an 802.3 WLAN?
(Choose three.)
A. control
B. directional
C. data
D. byte
E. management
F. signal

20. A small company has a class C network license and needs to create
five usable subnets, each subnet capable of accommodating at least 20
hosts. Which of the following is the appropriate subnet mask?
A. 255.255.255.0
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240

21. Which of the following correctly describe AC and DC currents? (Choose
three.)
A. DC always flows in the same direction, and DC voltages always have the
same polarity.
B. In DC systems, the flow of electrons is always from a negatively
charged source to a positively charged source.
C. In AC systems, electrons flow from negative to positive and then from
positive to negative.
D. Power lines carry electricity in the form of DC because it can be
delivered efficiently over large distances.
E. AC voltage reverses its polarity, so that the positive terminal
becomes negative, and the negative terminal becomes positive.
F. For AC and DC electrical systems, the flow of electrons is always from
a positively charged source to a negatively charged source.

22. Using the data transfer calculation T=S/BW, how long would it take a
4MB file to be sent over a 1.5Mbps connection?
A. 52.2 seconds
B. 21.3 seconds
C. 6.4 seconds
D. 2 seconds
E. 0.075 seconds
F. 0.0375 seconds

23. Which term describes an ARP response by a router on behalf of a
requesting host?
A. ARP
B. RARP
C. Proxy ARP
D. Proxy RARP

24. The highest capacity Ethernet technologies should be implemented in
which areas of a network? (Choose three.)
A. between workstation and backbone switch
B. between individual workstations
C. between backbone switches
D. between enterprise server and switch
E. on aggregate access links

25. A company with a Class B license needs to have a minimum of 1,000
subnets with each subnet capable of accommodating 50 hosts. Which mask
below is the appropriate one?
A. 255.255.0.0
B. 255.255.240.0
C. 255.255.255.0
D. 255.255.255.192
E. 255.255.255.224

26. Which of the following are considered the best electrical conductors
for use in data network communications? (Choose three.)
A. glass fibers
B. copper
C. gold
D. plastic
E. silicon
F. silver

27. When a network admin applies the subnetmask 255.255.255.248 to a
Class A address, for a given subnet, how many IP addresses are available
to be assigned to devices?
A. 1022
B. 510
C. 254
D. 126
E. 30
F. 6

28. Depending on how easily free electrons flow through them, materials
are classified into which three groups? (Choose three.)
A. semiconductors
B. solids
C. insulators
D. conductors
E. liquids
F. gases

29. Why are internets necessary? (Choose three.)
A. to overcome LAN scalability limitations
B. to overcome LAN speed limitations
C. to overcome LAN distance limitations
D. to prevent collision and congestion conditions
E. to network networks

30. Which devices separate collision domains? (Choose three.)
A. hubs
B. routers
C. bridges
D. switches
E. repeaters
F. transceivers

31. What is unique about the Dynamic Host Configuration Protocol (DHCP)?
(Choose two.)
A. It uses profiles to identify individual workstation configurations
while assigning IP addresses.
B. DHCP packets also include a leased IP address.
C. It uses a different message format than does BOOTP.
D. It allows a host to obtain an IP address dynamically without a network
administrator.
E. It allows the administrator to design a preset list of addresses for
the hosts to choose from automatically.

32. What device must be used between an AUI port of a networking device
and the media to which it is being connected?
A. a transducer
B. a transmitter
C. a transceiver
D. a transponder
E. a port replicator

33. What are facts about the operation of the Bootstrap Protocol (BOOTP)?
(Choose two.)
A. operates in a client-server environment
B. requires only a single packet exchange to obtain an IP address
C. is designed to work best in a peer-to-peer networking environment
D. requires a multiple packet exchange to complete the IP address request
34. The 802.11b standard has a transmitting rate of 11 Mbps. What is the
actual throughput?
A. 2.0 to 3.5 Mbps
B. 3.5 to 4.5 Mbps
C. 5.0 to 5.5 Mbps
D. 6.0 to 7.5 Mbps

35. Which of the following are defined by the terms "taking turns" and
"first come, first served"? (Choose two.)
A. dual-ring
B. linear bus
C. deterministic
D. non-deterministic
E. contention
F. non-contention

36. A positive decibel measurement indicates which of the following about
a networking signal?
A. The signal has become distorted.
B. The signal will have increased error rates.
C. Power has been decreased.
D. Power has been increased.
E. Power is stable.
F. Power is sufficient for data communications.


37. Using the IP address 38.159.163.37 with a subnet mask
255.255.255.240, determine the subnetwork address.
A. 38.159.0.0
B. 38.159.163.0
C. 38.159.163.0
D. 38.159.163.16
E. 38.159.163.32
F. 38.159.163.36

38. What are the characteristics of a local collision? (Choose two.)
A. The frame is less than minimum length.
B. The frame is longer than the maximum length.
C. The frame has an invalid FCS checksum.
D. The frame has a valid FCS checksum.
E. Over-voltage is detected on the coaxial network.
F. Simultaneous RX/TX activity is detected.

39. Which of the following are common LAN Technologies? (Choose three.)
A. Frame Relay
B. Ethernet
C. ISDN
D. Token Ring
E. Arcnet
F. HDLC

40. What is established during a connection-oriented file transfer
between computers? (Choose two.)
A. a temporary connection to establish authentication of hosts
B. a connection used for ASCII or binary mode data transfer
C. a connection used to provide the tunnel through which file headers are
transported
D. a command connection which allows the transfer of multiple commands
directly to the remote server system
E. a control connection between the client and server

41. Which type of noise affects all transmission frequencies equally?
A. baseband interference
B. narrowband interference
C. broadband interference
D. black noise
E. white noise
F. gray noise

42. Which combinations of charges will be repelled by electric force?
(Choose two.)
A. neutral and neutral
B. neutral and positive
C. neutral and negative
D. positive and positive
E. positive and negative
F. negative and negative

43. Which OSI layer defines the functions of a router?
A. physical
B. data link
C. network
D. transport
E. session


44. Which of the following items are common to all 100BASE technologies?
(Choose three.)
A. frame format
B. media
C. connectors
D. timing
E. multi-part encoding

45. An ISDN Basic Rate Interface (BRI) is composed of how many signaling
channels?
A. 1
B. 2
C. 3
D. 4

46. Which of these workstation installation and setup tasks are concerned
with network access layer functions? (Choose two.)
A. configuring the e-mail client
B. installing NIC drivers
C. configuring IP network settings
D. connecting the network cable
E. using FTP to download application software updates
47. For which of the following is Ethernet considered the standard?
(Choose three.)
A. inter-building connection
B. mid-length voice
C. video conferencing
D. vertical wiring
E. horizontal wiring
F. diagonal wiring

48. How will data loss be handled after a late collision? (Choose two.)
A. The stations involved in the collision automatically retransmit the
frames after the collision and jam signals clear.
B. The upper layer protocols will determine the frame was lost and
request retransmission.
C. The NIC will believe the frame went out fine, unaware of the data
loss.
D. The upper layer protocols will reconstruct the data from the damaged
frame since most of the frame was transmitted before the collision and
only the padding was damaged.
E. Retransmitted data will have a segment identifier that is a higher
priority than the original so the data receives special handling.

49. Which type of encoding does 100BASE-TX use?
A. Manchester
B. 4B/5B
C. 4B/8B
D. 4e/5e
E. HDLC

50. John has been hired as the network administrator of a local company
and has decided to add more hubs to the company's existing network. Which
of the following has been caused by John's inexperience?
A. collision domain extended
B. an increased number of collision domains
C. increased network performance
D. increased bandwidth
E. extended bandwidth

51. Which of the following describe interframe spacing? (Choose two.)
A. the minimum interval, measured in bit-times, that any station must
wait before sending another frame
B. the maximum interval, measured in bit-times, that any station must
wait before sending another frame
C. the 96-bit payload padding inserted into a frame to achieve a legal
frame size
D. the 96-bit frame padding transmitted between frames to achieve proper
synchronization
E. the time allowed for slow stations to process a frame and prepare for
the next frame
F. the maximum interval within which a station must send another frame to
avoid being considered unreachable
52. What is important to remember about the data link layer of the OSI
model when considering Peer to Peer communication? (Choose three.)
A. It links data to the transport layer.
B. It encapsulates frames into packets.
C. It provides a service to the network layer.
D. It encapsulates the network layer information into a frame.
E. Its header contains a physical address which is required to complete
the data link functions.
F. It encodes the data link frame into a pattern of 1s and 0s (bits) for
transmission on the medium.

53. Which of the following is the IEEE Standard for 10 Gigabit (GbE)
Ethernet?
A. 802.3gb
B. 803.2gb
C. 802.311gb
D. 802.5ae
E. 802.3ae
F. 802.5gb

54. Which of the following are Cisco proprietary routing protocols?
(Choose two.)
A. RIPv2
B. IGRP
C. OSPF
D. BGP
E. RIPv1
F. EIGRP

55. What are features of the TCP/IP Transport layer? (Choose two.)
A. path determination
B. handles representation, encoding and dialog control
C. uses TCP and UDP protocols
D. packet switching
E. reliability, flow control and error correction

56. Select the option that describes the relationship between analog and
digital transmissions.
A. Analog transmissions occur over wire; digital transmissions do not.
B. Analog transmission is bandwidth dependent; digital transmission is
not.
C. Digital transmission carries a variety of information; analog
transmission is restricted.
D. Digital signals use a wide range of frequencies; analog signals use a
small range of frequencies.

57. Convert the Hexadecimal number A2 into its Base 10 equivalent. Select
the correct answer from the list below.
A. 156
B. 158
C. 160
D. 162
E. 164
F. 166
58. If a network administrator needed to download files from a remote
server, which protocols could the administrator use to remotely access
those files? (Choose two.)
A. NFS
B. ASCII
C. TFTP
D. IMAP
E. FTP
F. UDP

59. During cable testing, which of the following are used to calculate
the information carrying capacity of a data cable? (Choose two.)
A. bit speed
B. attenuation
C. wire map
D. saturation limit
E. analog bandwidth

60. What are the three types of collisions? (Choose three.)
A. premature
B. late
C. local
D. early
E. remote
F. delayed


////////////////////////////////////////////


When purchasing a NIC for a computer, which of the following factors need
to be considered? (Choose three.)
* protocols
* system bus
brand of PC
web browser
operating system
* type of media use on the network

Convert the hexadecimal number 19 into its base 10 equivalent. Select the
correct answer from the list below.
19
91
52
* 25
36
63

The corporate user at 210.98.105.70 is having problems communicating with
the remote PC at 192.5.5.25. The computers internal loopback has been
tested successfully. Which of the following commands could be next in the
troubleshooting process? (Choose three.)
ping 129.0.0.1
ping 127.0.0.1
* ping 192.5.5.1
* ping 192.5.5.25
* ping 210.98.105.1
ping 210.98.106.70

In an 8 bit binary number, what is the total number of combinations of
the eight bits?
128
254
255
* 256
512
1024

Which of the following interprets the data and displays the information
in an understandable form for the user to see?
* application
protocol stack
remote devices
logical connection
physical connection

Which statements best describe the Internet physical layer connection?
(Choose two.)
connection using standard protocols
internet standard is TCP/IP
* could utilize modem or NIC
interprets data and displays information
* used to transfer data between PC and local network

Which of the following are considered to be "always on" services? (Choose
two.)
* DSL
ISDN
56kbps
* cable modem

Convert the decimal number 227 into its binary equivalent. Select the
correct answer from the list below.
11100101
11100001
11100110
11001101
* 11100011
11100010

Which specialized equipment is used to make a physical connection to a
network from a PC? (Choose two.)
router
* modem
CD Rom
ATM Switch
* network interface card

Which of the following describes a network interface card?
large circuit board that contains sockets for expansion cards
interface card capable of transferring more than one bit simultaneously
and is used to connect external devices
* expansion board inserted into a computer so that the computer can be
connected to a network
interface card that can be used for parallel communication in which only
1 bit is transmitted at a time

Which of the following are functions of a web browser without the
addition of plug-ins? (Choose three.)
updates IRQ's
* receives information
* requests information
* contacts web servers
displays flash animation
displays Quicktime movies

Convert the hexadecimal number CD into its base 10 equivalent. Select the
correct answer from the list below.
197
199
201
203
* 205
207

Convert the hexadecimal number 52 into its base 10 equivalent. Select the
correct answer from the list below.
25
52
28
* 82
A2
2A

Which of the following are valid hexadecimal numbers? (Choose three.)
* DEF3
1G45
* 1F35
DH3F
* 453
X35F

Connections to the Internet may use multiple protocols. Select the
description that best defines a protocol.
a group of numbers
definitions of specific standards
explanations of procedures
wiring specification
* a set of rules and conventions
Which of the following will test the internal loopback of a node?
ping 10.10.10.1
ping 192.168.1.1
* ping 127.0.0.1
ping 223.223.223.223
ping 255.255.255.255

Why were TCP/IP protocols developed?
To insure that error correction of each packet takes place.
* To allow cooperating computers to share resources across a network.
To allocate resources that are needed for operating a computer on a LAN.
To determine the "best path" decision making when forwarding packets of
data.

Which of the following are popular web browsers? (Choose two.)
Acrobat
* Internet Explorer
Macromedia Flash
* Netscape Navigator
Quicktime
World Wide Web

What is the numeric base of hexadecimal numbers?
Base 2
Base 8
Base 10
* Base 16
Base 32

Convert the decimal number 231 into its binary equivalent. Select the
correct answer from the list below.
11110010
11011011
11110110
* 11100111
11100101
11101110

Which of the following are high speed digital connections available to
the local consumer? (Choose two.)
56kbps modem
* DSL
T1
* cable modem
ISDN

#ass2
LANs were developed to solve which business needs? (Choose three.)
* reduce duplication of equipment
promote the use of sneakernets
increase productivity while saving money
* reduce the number of duplicate copies of files
connect users in different geographic locations
* increase complexity of the work environment

Which of the following were disadvantages of electronic bulletin boards?
(Choose 3.)
Simultaneous user connections to multiple computers were very fast.
* Availablity was limited to those who knew the location.
They did not scale well to keep up with growing demand.
* Users could not simultaneously share files.
* Modem and telephone line requirements were demanding.

Which of the following types of networks pass a token sequentially to
each host? (Choose two.)
Ethernet
* Token Ring
* FDDI
Frame Relay
ISDN

Which of the following are LAN design goals? (Choose three)
provide full-time connectivity to remote services
consolidate network devices and protocols to a single vendor
* provide access to high-bandwidth media
* operate within a limited geographic area
* allow users to share files and printers
provide access to geographically separated networks

Which of the following are considered WAN technologies? (Choose three)
* DSL
Ethernet
FDDI
* Frame Relay
* Modem
Token Ring

Which of the following are ways that bandwidth is commonly measured?
(Choose three.)
GHzps
* kbps
* Mbps
Nbps
MHzps
* Gbps

Which of the following are typical features that determine throughput?
(Choose two.)
types of passwords used on servers
type of Layer 3 protocol used
* network topology
length of the network cable
* number of users on the network

Which of the following would be used by a network administrator to
calculate an estimate of network performance? (Choose two.)
* size of file
protocol overhead
* line bandwidth
encapsulation rate
bit error rate

What reasons prompted the development of a standardized set of rules to
define the networking technologies? (Choose two.)
* Networks used different specifications and implementations to exchange
information.
Networking technologies strictly following proprietary rules could
communicate with technologies that followed different proprietary rules
Proprietary networking technology seldom presented problems in
communication among different external networks.
* Companies developed private or proprietary networking technologies
The Federal Government wanted a "level playing field" for all of the
networking industry.

What are the advantages of dividing the network into the seven layers of
the OSI model? (Choose three.)
describes the entire network to facilitate learning about its parts
* breaks down network communtication into manageable parts
* allows for different types of hardware to communicate with each other
* prevents changes in one layer from affecting other layers
allows for an uneven grouping of information to increase network speed
prevents the IOS from affecting the OSI

Which protocols are commonly part of the application layer of the TCP/IP
model? (Choose three.)
* FTP
* DNS
UDP
TCP
* HTTP

Which of the following are data link layer encapsulation details? (Choose
two.)
Packets are put into frames.
* Data is packaged into a packet.
Data is segmented into segments.
Data is converted for Internet travel.
* An address is added to identify the directly connected device.

Which device is used to connect LANs that are geographically separated?
hub
bridge
* router
repeater

Which of the following terms refers to end-user devices that provide
users with a connection to the network?
* hub
router
host
server
Which of the following physical topologies is used in situations where
breaks in communications are unacceptable?
ring
star
* mesh
bus

Which of the following networks is a dedicated, high-performance network
used to move data between servers and storage resources?
LAN
MAN
* SAN
WAN

Which type of VPN uses analog, dialup, ISDN, DSL, mobile IP, or cable
technologies to securely connect mobile users and telecommuters to branch
office networks?
* Access VPN
Intranet VPN
Extranet VPN
Shared VPN

A contracting company is planning to allow its subcontractors and
suppliers access to its network resources. It desires the security of
knowing that the general public and competitors will not be able to
access the information. Which of the following technologies should the
company implement?
Access VPN
Dial-up VPN
* Extranet VPN
Intranet VPN
Secure VPN
Wide-Area VPN

Which of the following is a transport layer protocol of the TCP/IP model?
FTP
* UDP
IP
TFTP

In a description of bandwidth that uses the analogy of a network of pipes
bringing water to and from a house, which of the following represents
bandwidth?
* width of a pipe
length of a pipe
valves connecting to the pipe
the water running through a pipe.

Which of the following is the approximate amount of time it would take to
transmit a 23.1 megabyte file on a T1 link?
fifteen seconds
fifteen million seconds
* one hundred twenty seconds
one hundred twenty thousand seconds

Which of the following is the Layer 4 PDU?
bit
frame
packet
* segment

Which of the following are layers of the TCP/IP model? (Choose three.)
* application
physical
* internet
* network
presentation

What is important to remember about the data link layer of the OSI model
when considering Peer to Peer communication? (Choose three.)
* It links data to the transport layer.
It encapsulates frames into packets.
It provides a service to the network layer.
* It encapsulates the network layer information into a frame.
Its header contains a physical address which is required to complete the
data link functions.
* It encodes the data link frame into a pattern of 1s and 0s (bits) for
transmission on the medium.

#ass3
Which devices could cause problems with a wireless transmission? (Choose
two.)
Radio
TV
* microwave
* wireless phone
DVD remote control

What is the minimum number of devices that can exist in a wireless
network?
1
* 2
3
4

Which of the following are attributes of singlemode fiber optic cable?
(Choose two.)
* one path of light
larger fiber optic core
uses LEDs as a light source
distances up to 5000 meters
* higher bandwidth than multimode

Which of the following are benefits of coaxial cable within a LAN
environment? (Choose two.)
easier to install than UTP
* less expensive than fiber
* requires fewer repeaters than UTP
easily accommodates additions to network
faster transport speeds than fiber

Which of the following must be present for current to flow? (Choose
three.)
* closed loop
resistance
insulating material
* source of voltage
* conducting material
bit generating device

Which term refers to the amount of signal power loss that can be
tolerated on a fiber optic link?
linear laser light loss
* optical link loss budget
acceptable decibel power reduction
maximum allowable light attenuation

Which of the following characteristics describe STP cable? (Choose
three.)
* costs more than UTP
easier to install than UTP
uses the shield to carry data signals
twisted pairs are not required because of the shield
* must be grounded at both ends for high frequency signals
* reduces both internal and external sources of interference

Which effects comprise impedance? (Choose three.)
* capacitance
voltage
current
* resistance
* inductance
power

Which factors can lead to a loss of signal strength in fiber optic cable?
(Select three.)
* absorption
RFI
crosstalk
* scattering
* dispersion
EMI

Select the characteristics specified by 10BaseT. (Choose three.)
* twisted pair cable
T style connectors
* baseband transmission
10 gigabits per second data rate
* 10 megabits per second data rate
decimal encoded data transmission
What is the core size of a single mode fiber-optic cable?
* 8-10 microns
15 microns
50-60 microns
125 microns

Which of the following are characteristics of fiber optic light
receivers? (Choose two.)
react to multiple wavelengths
* react to a specific wavelength
tuned to one wavelength for noise reduction
* use PIN photodiodes to convert light pulses to electrical signals

Which of the following wireless standards increased transmission
capabilities to 11 Mbps?
802.11a
* 802.11b
802.11c
802.11d

Which of the following are typical specifications for data transmission
cables? (Choose three.)
* achievable bit transmission speeds
supported data encoding schemes
minimum distance between hosts
* maximum distance before fatal attenuation
* intended transmission type
intended bit level protocols type

Which tasks must be performed when installing fiber optic cable? (Choose
three.)
* install connectors
inspect laser signal using a microscope
* cleave and polish cable ends
wash cable ends with mild soap and water
* protect connector ends from dirt and damage
pull cables tight to reduce the number of bends and twists

Which combinations of charges will be repelled by electric force? (Choose
two.)
neutral and neutral
neutral and positive
neutral and negative
* positive and positive
positive and negative
* negative and negative

Which of the following radio carrier signal modulation types will
modulate the height (amplitude) of the carrier signal?
* AM
FM
PM
RF
How is full-duplex capability achieved in fiber   optic cable?
* Two fibers are encased in separate sheaths.
Light is bounced at different rates in opposite   directions.
Transmit speeds are so high that half-duplex is   acceptable.
Colors of the light spectrum are separated into   transmit and receive
streams.

Your company has a new wireless network setup in their building. The boss
has heard the throughput for a wireless network would be 11 Mbps. You
mention that because of the way WLANs transmit and acknowledge data the
actual percentage of throughput would be which of the following?
25%
40%
* 50%
70%

Which of the following describe the ray model of light? (Choose three.)
* Light bends at the boundary of two transparent materials.
The speed of light is greatest when passing through optical glass.
The speed of light is constant no matter what material passes through.
* The optical density of the material determines how much the light will
bend.
* The index of refraction is the ratio of the speed of light in a
material compared to a vacuum.

Which of the following identifies a node that has been authenticated but
not yet associated with the access point?
unauthenticated and unassociated
unauthenticated and associated
* authenticated and unassociated
authenticated and associated

Which two are necessary to achieve total internal reflection within a
fiber-optic cable? (Choose two.)
The entire incident light ray must be refracted into the cladding.
The index of refraction of the core must be less than that of the
cladding.
* The index of refraction of the core must be greater than that of the
cladding.
The optical density of the reflecting material must be higher than the
refracting index.
* The angle of incidence of the light ray must be greater than the
critical angle for the core and cladding.

#ass4
Which of the following describes frequency?
length of each wave
height of each wave
* number of cycles each second
amount of time between each wave

Which of the following describe sine waves? (Choose three.)
They do not continuously vary with time.
* They repeat the same pattern at regular intervals.
* They occur naturally and change regularly over time.
They are artificially created and do not occur naturally.
* No two adjacent points on a graph have the same value.
They have continuously varying patterns that do not repeat.

Which of the following are true about square waves? (Choose three.)
*They repeat the same pattern at regular intervals.
They continuously vary with time.
*They repeat the flat pattern on both the top and bottom of the wave.
*They do not continuously vary with time.
They occur naturally and change regularly over time.
They change intervals based upon voltage.

Which of the following is another name for the binary number system?
*Base 2
Base 5
Base 10
Base 16

Which of the following is another name for the decimal number system?
Base 2
Base 5
*Base 10
Base 16

Which of the following units of measure are commonly used in formulas for
calculating the amount of gain or loss in networking signals? (Choose
three.)
*watts
ohms
*volts
*decibels
joules
amperes

For which type of waves would the signal gain or loss be calculated using
the power formula? (Choose two.)
electromagnetic waves on copper cables
electrical waves on copper cables
*light waves on optical fiber
*radio waves in the air
sound waves in the air

What type of analysis is performed by using an oscilloscope?
power-domain
frequency-domain
*time-domain
wave-domain
spectrum-domain
signal-domain

Which of the following are possible sources of line noise? (Choose
three.)
*radio transmitters
*electrical motors
*crosstalk
laser light
incandescent light

For what purpose are two y-axis inputs used when displaying voltage
patterns on an oscilloscope?
to insure a clean signal is obtained
to determine if one is primary and one is backup
to display multiple time frames
to analyze a complex spectrum
* to observe and measure two waves simultaneously

How does noise impact a data signal in a communication system?
It replaces the data signal.
It blocks the data signal.
*It is added to the data signal.
It creates a harmonic signal.

Identify common ways in which the capacities of communication systems are
measured? (Choose two.)
analog bandwidth
resistance capacity
carrier bandwidth
polarity capacity
*digital bandwidth

Which of the following correctly matches the definitions of analog and
digital bandwidth? (Choose two.)
*Analog bandwidth refers to frequency range.
Analog bandwidth is a measurement of the amount of frequency sent.
Digital bandwidth refers to the range of a frequency.
*Digital bandwidth measures speed of the transmission.
Analog bandwidth is a measurement of how much information can flow.

Why would fiber optic installations be favored over copper between
buildings? (Choose two.)
cheaper installation
larger media
*attentuation properties
*no electrical interference
easier termination and installation

How are binary ones and zeros represented in fiber optic installations?
(Choose two.)
+5 volts/-5 volts
0 volts/5 volts
*light/no light
high to low electrical transition
low to high electrical transition
*increasing/decreasing light intensity

What are some of the factors that contribute to attenuation in a copper
media? (Choose three.)
type of voltage used
*long cable lengths
jitter signal sent by the transmitting device
*defective connectors
energy leaks through the insulation of the cable
low signal frequencies

What problems are associated with impedance mismatches in copper cabling?
(Choose two.)
*jitter
signal absorption
termination of signals
* reflection
NEXT

What conditions are described when transmission signals from one wire
pair affects another wire pair? (Choose two.)
* noise
resistance mismatch
jitter
*crosstalk
attenuation

What type of wiring problem is depicted in this sample of a cable tester?
a fault
a short
* an open
a split
a good map

What factors need to be considered to limit the amount of signal
attenuation in long Ethernet cable runs? (Choose two.)
*type of media
number of users
type of users
*length of cable
type of electrical equipment

Fiber optic cable was installed in a new warehouse that also houses large
electrical motors. The fiber run of the longest segment has a total
length of 2650m. What signal problems might be associated with this
installation? (Choose two.)
electrical noise
* attenuation
impedance mismatches
crosstalk
* signal loss caused by damaged cable

Which of the following are tests specified by the TIA/EIA-568-B standard
for copper cable? (Choose three.)
signal harmonics
conductive response
* wire map
signal absorption
*insertion loss
*propagation delay

Which RJ-45 pins on an Ethernet NIC are used for data transmission?
* 1 and 2
3 and 6
2 and 4
6 and 8
5 and 6

Which of the following describe amplitude?
* the height of each wave
the length of each wave
the number of waves each second
the amount of time between each wave

In a new network installation, the network administrator has decided to
use a medium that is not affected by electrical noise. Which cable type
will best meet this standard?
coaxial
screened twisted pair
shielded twisted pair
unshielded twisted pair
* fiber optic

#ass5
What must be connected to the DB-15 AUI port to provide connectivity for
an RJ-45 terminated cable?
hub
joystick
* transceiver
router
WIC
NIC

At which layer of the OSI model is a NIC classified?
physical
* data link
network
transport

Which of the following are other names for a hub? (Choose two.)
* concentrator
transceiver
switch
bridge
* multiport repeater
active host

Which of the following are benefits of wireless networks when compared to
wired networks? (Choose two.)
higher data speeds
better security
* mobility
less expensive NIC cards
* no need to run cables to hosts
no transceivers required

In addition to operating at higher speeds, which of the following
functionalities does a switch offer over a bridge?
collision domains
forwarding tables
broadcast domains
* Virtual LANs (VLAN's)
MAC address based forwarding

What are the reasons for the Four Repeater Rule of 10 Mbps Ethernet?
(Choose two.)
to reduce total attenuation
to prevent microsegmentation
* to prevent late collisions
to prevent bit slippage
* to limit latency

Which of the following are benefits of peer-to-peer networks? (Choose
three.)
centralized security
* easy to create
very scalable
* no centralized equipment required
* centralized administrator not required
centralized control of assets

What types of interfaces may be used on ISDN BRI? (Choose two.)
NT1
* S/T
* U
NT2
TA
TE1

Which of the following companies are responsible for creating and
implementing the first Ethernet LAN specifications? (Choose three.)
* Intel
Cisco
* Digital
* Xerox
Microsoft
Hewlett Packard

What is the recommended maximum number of workstations configured on a
peer-to-peer network?
25
15
* 10
5
2
Which protocol is typically used to carry data over an ISDN B channel?
* PPP
SLIP
PAP
Frame Relay

What are advantages of client/server networks? (Choose three.)
* centralized security
single point of failure
* centralized backups
lower operating costs
* enhanced network services
users control their own resources

What type of network cable is used between a terminal and a console port?
cross-over
straight-through
* rollover
patch cable

Which of the following are hub types? (Choose three.)
LAN
core
* active
* passive
* intelligent
convergent

What are the two basic functions of a switch? (Choose two.)
* switching data frames
cost effective operation
switching Layer 3 traffic
* build and maintain tables
isolating packets on the LAN

Which layer of the OSI model covers physical media?
* Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6

In which of the following situations would a straight-through cable be
used? (Choose three.)
router to router
router to PC
* router to switch
* PC to hub
switch to hub
* switch to PC
From the diagram above, we see that Host B is connected directly to a
network device. What does that network device use to make forwarding
decisions?
Layer 2 network addresses
* Layer 2 physical addresses
Layer 3 network addresses
Layer 3 physical addresses

Which type of connector supports 100BASE-T Ethernet over Category 5e UTP?
BNC
* RJ-45
S/T MIC
RJ-46

Which of the following provide local address resolution services to the
local area network? (Choose two.)
NIC
ARP
* DTE
* DCE
CSU/DSU
RARP

What are the various ways interfaces are labeled on routers? (Choose
three.)
slot type
* port number
MAC address
interface hostname
* port type
* slot number

In which of the following situations would a crossover cable be used?
(Choose two.)
switch to router
switch to PC
* router to PC
* switch to hub
hub to router

Which port on a router is used with a modem to make configuration
changes?
* Console
Aux
BRI
Ethernet

An ISDN BRI connection is composed of how many bearer channels?
1
* 2
3
4
What type of connector is used to connect ADSL to the wall jack?
RJ-45
* RJ-11
RJ-12
V.35
RS-232

#ass6
Which Ethernet data link layer frame comparison is correct?
higher speed networks require more fields be included in the frame
the faster speed frame structures are incompatible with the slower speed
networks
the frame structure changes with each higher speed, however, they are
compatible with slower speeds
* all speeds of Ethernet have nearly identical frame structures

Which of the following is included in the frame address field? (Choose
two.)
source IP address
destination IP address
destination subnet mask
* source MAC address
* destination MAC address

Which of the following are sublayers of the OSI data link layer? (Choose
two.)
* Logical Link Control
Logical Layer Control
* Media Access Control
Logical Link Communication
Media Access Communication
Physical Access Communication

How is a MAC address represented?
four groups of eight binary digits separated by a decimal point
four Base10 digits separated by a decimal point
six hexadecimal digits
* twelve hexadecimal digits
twenty-four Base10 digits

What does the "10" in 10Base2 indicate about this version of Ethernet?
The version uses Base10 numbering within the frames.
* The version operates at a transmission rate of 10 Mbps.
Frames can travel 10 meters unrepeated.
The maximum frame length is 10 octets.

Which of the following would indicate the beginning of the frame?
flag bit
* start of frame
frame check sequence
address field

Why is Ethernet considered very scalable?
The NIC cards do not need to be changed to increase the bandwidth of the
network.
* Bandwidth can be increased without changing the underlying technology.
Ethernet standards do not need to change as new technologies are
introduced.
Ethernet changes the packet as necessary to move from one link to
another.

What are the possible reasons the MAC layer would be unable to send a
frame in sixteen attempts? (Choose two.)
The destination is more than 16 hops away and unreachable.
* A physical problem exists on the network.
The destination never received a token and therefore could not return
verification of the CRC.
The network administrator assigned the wrong MAC address to the device.
* The network is experiencing extremely heavy traffic loads.
The physical layer has not yet reached a state of convergence.

What does the letter "T" indicate in 10BaseT?
fiber optic cable
* copper unshielded twisted pair
thicknet coaxial cable
thinnet coaxial cable

Where does the MAC address originate?
DHCP server database
configured by the administrator
* burned into ROM on the NIC card
network configuration on the computer
included in the creation of the processor chip

Select the statements that correctly describe the Length and Type
Ethernet frame fields. (Choose three.)
Both fields, Length and Type, exist in all versions of Ethernet frames.
* DIX versions of Ethernet use the field Type.
Early IEEE Ethernet versions used a combined Length/Type field.
* Early IEEE Ethernet versions used the field Length.
* Later IEEE Ethernet versions use a combined Length/Type field.
Later IEEE Ethernet versions use separate Length and Type fields.

Which characteristics of Ethernet contribute to its widespread use?
(Choose three.)
* ease of maintenance
collision free technology
* scalability
* low cost of installation
compatibility with 802.5 standard
collision avoidance capabilities

What does the word "Base" indicate in 10Base2?
The number standard used.
* Baseband signaling is used.
Only a portion of the transmission medium is used.
Broadband signaling is used.
What happens on an Ethernet network after a collision occurs? (Choose
three.)
* A backoff algorithm is invoked and transmission is stopped.
Devices involved in the collision have a random period of time for
priority retransmission of the damaged packet.
The devices involved in the collision release a token indicating the time
each station may begin retransmitting.
* The devices involved in the collision do not have priority to transmit
data.
* The devices with data to transmit return to a listen-before-transmit
mode.
Transmit work will restart with the reissuance of all data.

A network administrator, while analyzing the network, notices a large
number of "runts". What is significant about this? (Choose two.)
A server with high network priority is receiving significant use,
overriding normal packet delivery.
* A significant number of collisions are occurring, leaving collision
fragments.
Corrupt data has been split into small packets allowing the network to
function more smoothly.
The network is operating smoothly allowing data to be sent in smaller
increments.
* Throughput on the network is significantly reduced due to excessive
collisions.

Why is half-duplex mode not permitted on 10 Gigabit Ethernet?
It was removed from the Ethernet standards as outdated technology.
* Transmission is completed before the sending station can be made aware
of any collisions.
Full-duplex transmission is needed in order to reach 10 Gigabit speeds.
Full-duplex stations transmit too quickly, blocking half-duplex stations
from sending data.

Ethernet standard specifications limit network service interruption.
Select the items that describe the standards. (Choose three.)
minimum segment length
* maximum segment length
minimum number of stations per segment
* maximum number of stations per segment
minimum number of repeaters between segments
* maximum number of repeaters between segments

Which options below are field names of a generic frame? (Choose three.)
IP header
voltage reference
* data
description
* length
* frame check sequence

Which of the following are the functions of CSMA/CD? (Choose three.)
* transmitting and receiving data packets
releasing a token when the network is clear
* detecting errors within data packets or on the network
passing a token to each station on the network
* decoding data packets and checking them for valid addresses before
passing them to the upper layers of the OSI model

Which features describe the Token Ring topology? (Choose two.)
* collisionless environment.
non-deterministic.
* deterministic
uses CSMA/CD
prone to collisions

What is the length of a MAC address?
8 bits
8 bytes
24 bits
24 bytes
* 48 bits
48 bytes

Which statements below are true about Ethernet? (Choose three.)
addresses the needs of Layer 2 and Layer 3 of the OSI model
first released as a Xerox proprietary standard
* essentially the same as 802.3 standards
* bandwidth can be increased without changing the underlying technology
essentially the same as 802.2 standards
* original idea developed at the University of Hawaii

What is indicated when the length/type frame field value is greater than
0x600?
DIX formatted frame header
* Ethernet II code used to interpret the frame
length of frame is 600 bits
half duplex transmission being utilized

How are collisions detected on an Ethernet network?
Stations identify the altered FCS field on the colliding packets.
* The signal amplitude on the networking media increases.
There is blockage on the network causing no traffic to be detected.
The signal amplitude on the networking media decreases.

Which statements correctly describe slot time? (Choose two.)
* the time period just longer than the longest possible round trip when
all options are at their maximum
the time required to send an entire frame through the outgoing port
the minimum spacing between two non-colliding frames
* undefined on 10 Gigabit Ethernet


Which of the following has limited the bandwidth of fiber based Ethernet?
(Choose three.)
*emitter technology
absolute fiber light-carrying capacities
theoretical limits of fiber capacity
* fiber manufacturing processes
* detector technology
angles and curves in the fiber run

Which of the following are Fast Ethernet technologies? (Choose two.)
100BASE-5
100BASE2
1000BASE-F
* 100BASE-FX
* 100BASE-TX

Which media types can be used in an implementation of a 10BASE-T network?
(Choose three.)
* Category 5 UTP
* Category 5e UTP
* Category 3 UTP
coaxial cable
multi-mode fiber
single mode fiber
Why would an organization choose to implement twisted pair cabling over
coaxial cabling? (Choose two.)
* cheaper
* easier to install
proprietary
used in most older networks
easy to make wiring errors
no limitations to the length of each segment

For a network manager planning the installation of a new network, which
of the following will be needed to implement a typical 10BASE-T network
installation? (Choose three.)
RJ-11
BNC connectors
RJ-48 patch cables
* RJ-45 connectors
* Category 5 UTP cables
* hubs or switches

Which of the following are true when comparing 10BASE2 and 10BASE5?
(Choose three.)
10BASE2 supports faster data rates than 10BASE5.
10BASE2 has longer allowable cable lengths.
* 10BASE2 cable is more flexible than 10BASE5 cable.
* 10BASE5 cable is heavier than 10BASE2 cable.
* 10BASE5 and 10BASE2 networks operate in half-duplex mode.
10BASE5 and 10BASE2 networks have central hubs to control traffic
networks.

Which of the following were considered advantages of 10BASE5 networks?
(Choose two.)
easy to install
easy to find hardware
* inexpensive
* no configuration

Which of the following Ethernet technologies are considered legacy
Ethernet? (Choose three.)
* 10BASE2
* 10BASE5
* 10BASE-T
100BASE-T
100BASE-FX
100BASE-TX

Which of the following Ethernet technologies share the same timing
parameters? (Choose three.)
* 10BASE2
* 10BASE5
* 10BASE-T
100BASE-TX
100BASE-FX
100BASE-RX

Which of the following common networking problems is eliminated when an
Ethernet network uses separate transmit and receive wire pairs and a
switched topology?
* collisions on the physical bus
single segment distance limitations
the maximum bandwidth available on CAT 3 wiring
Multi-port bridge replication errors
CSCD/MA maximum repeater rules

Which of the following is the line encoding conversion used by 1000BASE-
X?
SRS
PCM
NZS
B8ZS
* NRZ
ASCII

What does the "S" in 1000BASE-SX mean?
short range fiber
* short wavelength light source
shielded twisted pair
shielded fiber cladding
single-mode fiber

Which class of repeater changes between one Ethernet implementation and
another?
* Class I
Class II
Class III
Class IV
Class V
Which of the following best describes how the Gigabit Ethernet, Media
Access Control method views the link?
Ring
Shared bus
* point-to-point
Star
extended star

What is the maximum distance that 10BASE5 will transmit data before
signal degration?
185 meters
200 meters
* 500 meters
550 meters

Which of the following is the maximum distance that 10BASE2 will transmit
data before signal degration?
100 meters
* 185 meters
200 meters
500 meters

What is the maximum distance that 10BASE-T will transmit data before
signal attenuation affects the data delivery?
* 100 meters
185 meters
300 meters
500 meters

Which of the following describe the Gigabit Ethernet bit patterns created
at the physical layer?
pulses
triads
frames
*symbols
icons

What is the most important aspect to consider when designing a 10BASE-T
architecture?
specifying the correct category of cable in the design
minimizing the number of switches in the design
maximizing the use of hubs
* minimizing the delay between distant stations

To make sure timing limitations are not violated when implementing a 10
Mbps Ethernet network involving hubs or repeaters, a technician should
adhere to which rule?
the 4-5-3 rule
the 6-4-2 rule
the 3-4-5 rule
*the 5-4-3 rule
While working on her computer, Mary noticed longer than normal network
data transfers. Mary investigates the problem and notices that her co-
worker John has been hosting an online video conference. What is the
network probably experiencing?
collision storm
* broadcast storm
IP storm
data rain storm

Which of the following is a term associated with replacing hubs with
switches to increase the number of collision domains?
encapsulation
latency
* segmentation
layered model
broadcast domain
extended

What does a switch broadcast to let other switches know of its existence
on the LAN?
STP
STA
BDPU
BPU
* BPDU

What impact does a bridge have on a network? (Choose two.)
reduces collision domains
* increases number of collision domains
adds additional broadcast domains
* has no impact on broadcast domains
breaks collision domains into equal parts

Which of the following is the switching technique that reads the header
and passes the frame prior to the checksum being sent?
* fragment-free
cut-through
store-and-forward
latency forwarding
fast forward

Which LAN switching methods have a fixed latency time? (Choose two.)
store-and-forward
* cut-through
fast-forward
free-forward
cut-and-store
* fragment-free

Which of the following is created with switched full-duplex transmission?
more collision domains
fewer collision domains
* no collision domains
no increase in broadcast domains
more broadcast domains

What is the area referred to as, that controls frame propagation within
that area?
MAC address domain
* collision domain
broadcast domain
propagation domain

A network administrator has a multi-floor LAN to monitor and maintain.
Through careful monitoring, the administrator has noticed a large amount
of broadcast traffic slowing the network. Which device would you use to
best solve this problem?
bridge
hub
* router
transceiver

Which of the following does a router use to make a forwarding decision?
* destination IP address
MAC address
source IP address
encapsulation address
default gateway

Which of the following would alleviate the problem of excessive
collisions in a LAN? (Choose two.)
* reduce the size of collision domains
reduce number of broadcast domains
add extra hubs
* add extra managed switches
add additional transceivers
increase the length of UTP cable runs

What is a disadvantage of cut-through switching?
* no error checking
a decrease in error checking
decrease in number of collision domains
decrease in bandwidth
increased latency

Which of the following describes shared media environment?
a collision free environment made up of systems on the same medium
multiple hosts have access to the same cable ISP system
* multiple hosts have access to the same medium.
multiple router environment in a mesh topology

Which switching mode has the lowest latency?
* cut-through
fast-forward
store-and-forward
fragment-free
Which switching mode describes a switch that transfers a frame as soon as
the destination MAC address is read?
fragment-free
* cut-through
store-and-forward
latency forwarding

Which device uses full-duplex mode to provide full bandwidth between two
nodes on a network?
hub
router
* switch
gateway
repeater
transceiver

Which of the following protocols is used to eliminate loops?
* STP
BDPU
UDP
EIGRP
learning

Which switching mode has the highest latency?
fast-forward
* store-and-forward
fragment-free
cut-through

Which of the following devices performs the task of viewing and
forwarding frames based on MAC addresses? (Choose two.)
hub
router
* bridge
* switch
transceiver
ATM

Which of the following network types uses networking devices to extend
the distances that cable can be run?
length/shared media
* extended shared media
point-to-point network
extended point-to-point network
multiple access/point-to-point


Within a company's TCP/IP network, failure to access e-mail on a remote
server has been diagnosed as a network access problem. Which of the
following could be the cause? (Choose two.)
DNS
PPP
* ATM
TCP
SMTP
* Ethernet

In the network shown in the accompanying graphic, where would it be
appropriate to use private addressing ?
only area a
only area b
only area c
areas a and b
* areas a and c
areas a and b and c

Which criteria identify a Class B address? (Choose two.)
decimal number in first octet between 127-191
decimal number in first octect between 128-192
* decimal number in first octect between 128-191
first bit of binary IP address is 0
* first two bits of binary IP address are 10
first three bits of IP binary address are 110

What version of IP was developed as IPng , and what year was it
introduced by IETF? (Choose two.)
IPv4
* IPv6
IPv8
1981
* 1992
2002

Which TCP/IP model layer supports both LAN and WAN technologies?
* network access layer
internet layer
transport layer
application layer

Which of the following are TCP services? (Choose three.)
address resolution
* end-to-end communication
* flow control
* reliability of data delivery
path determination
data representation

Which items may be included in a BOOTP packet? (Choose two.)
the destination IP address of a WAN workstation
* the address of a router
* vendor-specific information
the routing protocol of the destination network

How do some computer operating systems prevent duplicate IP addresses on
a local area network?
They are able to allow duplicate IP addresses on a single LAN segment.
The network DNS server reconciles IP address duplication.
* They send ARP requests throughout a local area network.
They use UDP packets to bypass IP addresses.

What is the function of the Reverse Address Resolution Protocol (RARP) on
a local area network?
RARP binds a known IP address to an unknown MAC address.
RARP reports the MAC address of a website to the ARP table of the
workstation.
RARP seeks out diskless workstations to assign a physical address to the
network interface cards of the workstations.
* RARP binds a known MAC address to an IP unknown address.

Which model would a networking professional use to better understand the
data communication process?
* OSI model
IEEE model
ANSI model
Internetworking model

What should a system administrator consider when assigning an IP address
to a network server? (Choose two.)
Servers should have addresses assigned dynamically through a DHCP.
* Servers with a dynamically assigned IP address would be difficult to
locate on a network.
Servers with periodically changed IP addresses have little effect on a
network.
* Servers should have IP addresses assigned statically by a network
system administrator.

Which functions are handled by the TCP/IP application layer? (Choose
three.)
logical addressing
* encoding
logical topology
route selection
* dialog control
* data presentation

Which OSI layers relate to the network access layer of the TCP/IP model?
(Choose two.)
transport
* physical
session
network
* data link
application

Which of the following are major advantages of DHCP over BOOTP? (Choose
two.)
* It allows user to be mobile.
* It does not require fixed profiles to assign IP addresses.
It requires only three packet exchanges to obtain an IP address.
It uses a table of static IP addresses developed by the network system
administrator.
It requires the IP address to be linked with the same MAC address.
Name the protocols that operate at the transport layer of the TCP/IP
model. (Choose two.)
* TCP
IP
* UDP
FTP
NDS
IPX

What organization developed the TCP/IP reference model?
Internet Engineering Task Force (IETF)
National Intstitute of Standards and Technology (NIST)
Department of the Navy (DoN)
* Department of Defense (DoD)
Massachusetts Institute of Technology (MIT)
Stanford University

Which TCP/IP layer provides services that support a logical connection
between the sending and receiving hosts?
application
network
IP
* transport
presentation
session

In what ways are the TCP/IP and OSI models the same? (Choose three.)
* Both have an application layer.
Both have a physical layer.
Both assume circuit-switched networks.
Both have network access and data-link layers.
* Both have similar transport and network layers.
* Both assume packet-switched networks.

Which operations are performed by IP? (Choose three.)
* routing packets to remote hosts
providing a physical addressing scheme
defining frames
* defining packets
* transferring data between the internet layer and the network access
layer
transferring data between the internet layer and the application layer

Which network device table contains the IP and MAC address of other
devices on the same LAN?
DHCP
RARP
* ARP
DNS

What steps must occur for devices to communicate between different
physical network segments? (Choose two.)
learning the IP address of the source device
* obtaining the MAC address of the intermediate device
* transferring the data packets from one network segment to another to
reach the destination host
obtaining the IP address of the local host

Which layer is considered to be the host-to-network layer of the TCP/IP
model?
application
presentation
transport &nb

								
To top