Saturday, August 20, 2011

ENetwork Chapter 9

1   
Convert the binary number 10111010 into its hexadecimal equivalent. Select the correct answer from the list below.
  •     BA
   
2   
Which of the following describe interframe spacing? (Choose two.)
  •     the minimum interval, measured in bit-times, that any station must wait before sending another frame
  •     the time allowed for slow stations to process a frame and prepare for the next frame
   
3   
When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?
  •     The hosts return to a listen-before-transmit mode.
   
4   
After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?
  •     any device in the collision domain whose backoff timer expires first
   
5   
Which of the following is a drawback of the CSMA/CD access method?
  •     Collisions can decrease network performance.
   
6   


Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
  •     No collisions will occur on this link.
   
7   
Why do hosts on an Ethernet segment that experience a collision use a random delay before attempting to transmit a frame?
  •     A random delay helps prevent the stations from experiencing another collision during the transmission.

8   

In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do?
  •     Host B must wait until it is certain that Host A has completed sending its frame.

9   
Ethernet operates at which layers of the OSI model? (Choose two.)
  •     Physical layer
  •     Data-link layer

10   
What does the IEEE 802.2 standard represent in Ethernet technologies?
  •     Logical Link Control sublayer
   
11   
Which statements correctly describe MAC addresses? (Choose three.)
  •     copied into RAM during system startup
  •     contains a 3 byte OUI
  •     6 bytes long
   
12   


Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.)
  •     A frame with the destination MAC address of Router_A.
  •     A packet with the destination IP of Server_B.
   
13   
Host A has an IP address of 172.16.225.93, a mask of 255.255.248.0, and a default gateway of 172.16.224.1. Host A needs to send a packet to a new host whose IP is 172.16.231.78. Host A performs the ANDing operation on its address and subnet mask. What two things will occur? (Choose two.)
  •     Host A will broadcast an ARP request for the MAC of the host 172.16.231.78.
  •     Host A will change the destination IP of the packet to 172.16.224.1 and forward the packet.
   
14   
Which two features make switches preferable to hubs in Ethernet-based networks? (Choose two.)
  •     minimizing of collisions
  •     increase in the throughput of communications

15   
Ethernet operates at which layer of the TCP/IP network model?
  •     network access
   
16   
What are three functions of the upper data link sublayer in the OSI model? (Choose three.)
  •     identifies the network layer protocol
  •     makes the connection with the upper layers
  •     insulates network layer protocols from changes in physical equipment
   
17   
What three primary functions does data link layer encapsulation provide? (Choose three.)
  •     addressing
  •     error detection
  •     frame delimiting
   
18   
What are the two most commonly used media types in Ethernet networks today? (Choose two.)
  •     copper UTP
  •     optical fiber
   
19   


Refer to the exhibit. Which option correctly identifies content that the frame data field may contain?
  •     network layer packet
   
20   
What is the primary purpose of ARP?
  •     resolve IPv4 addresses to MAC addresses



ENetwork Chapter 8

1   
Which method of signal transmission uses radio waves to carry signals?
  •     wireless
   
2   


Refer to the exhibit. Which type of Category 5 cable is used to make an Ethernet connection between Host A and Host B?
  •     crossover cable
   
3   
Which type of cable run is most often associated with fiber-optic cable?
  •     horizontal cable
   
4   
What are three measures of data transfer? (Choose three.)
  •     frequency
  •     throughput
  •     bandwidth

5   
In most business LANs, which connector is used with twisted-pair networking cable?
  •     RJ-45
   
6   
Which of the following is a characteristic of single-mode fiber-optic cable?
  •     generally uses LEDs as the light source
   
7   
An installed fiber run can be checked for faults, integrity, and the performance of the media by using what device?
  •     OTDR

8   
Which OSI layer is responsible for binary transmission, cable specification, and physical aspects of network communication?
  •     Physical

9   
Which fiber connector supports full duplex Ethernet?
Jawaban no.9
    








10   
What is a possible effect of improperly applying a connector to a network cable?
  •     Data transmitted through that cable may experience signal loss.
   
11   
What characteristic of UTP cable helps reduce the effects of interference?
  •     the twisting of the wires in the cable
   
12   
What is considered a benefit of wireless as a media choice?
  •    more host mobility
   
13   
With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?
  •    the magnetic field around the adjacent pairs of wire
   
14   
What is a primary role of the Physical layer in transmitting data on the network?
  •     create the signals that represent the bits in each frame on to the media
   
15   
Which characteristics describe fiber optic cable? (Choose two.)
  •     It is not affected by EMI or RFI.
  •     It is the most expensive type of LAN cabling.
   
16   
When is a straight-through cable used in a network?
  •     when connecting a host to a switch
   
17   
In LAN installations where potential electrical hazards or electromagnetic interference may be present, what type of media is recommended for backbone cabling?
  •     fiber

ENetwork Chapter 7

1   
What is a characteristic of a logical point-to-point topology?
  •     The media access control protocol can be very simple.
   
2   
What are three characteristics of valid Ethernet Layer 2 addresses? (Choose three.)
  •     They are 48 binary bits in length.
  •     They are considered physical addresses.
  •     They are generally represented in hexadecimal format.
   
3   
What two facts are true when a device is moved from one network or subnet to another? (Choose two.)
  •     The device will still operate at the same Layer 2 address.
  •     The Layer 3 address must be reassigned to allow communications to the new network.

4   
What is a primary purpose of encapsulating packets into frames?
  •     facilitate the entry and exit of data on media
   
5   
Which options are properties of contention-based media access for a shared media? (Choose three.)
  •     non-deterministic
  •     less overhead
  •     collisions exist
   
6   
What is the purpose of the preamble in an Ethernet frame?
    is used for timing synchronization
   
7   
What is a function of the data link layer?
  •     provides for the exchange data over a common local media

8   
What statements are true regarding addresses found at each layer of the OSI model? (Choose two.)
  •     Layer 2 may identify devices by a physical address burned into the network card
  •     Layer 3 represents a hierarchical addressing scheme
   
9   


Refer to the exhibit. How many CRC calculations will take place as traffic routes from the PC to the laptop?
  •     8
   
10   
What is the primary purpose of the trailer in a data link layer frame?
  •     support frame error detection
   
11   
Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer?
  •     MAC
   
12   


Refer to the exhibit. A frame is being sent from the PC to the laptop. Which source MAC and IP addresses will be included in the frame as it leaves RouterB? (Choose two.)
  •     source MAC - Fa0/1 on RouterB
  •     source IP - PC
   
13   
What is true concerning physical and logical topologies?
  •     Logical topologies consist of virtual connections between nodes.

14   


Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit?
  •     Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.
   
15   
Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.)
  •     the geographic scope of the network
  •     the physical layer implementation
  •     the number of hosts to be interconnected
   
16   
What is true regarding media access control? (Choose three.)
  •     Ethernet utilizes CSMA/CD
  •     defined as placement of data frames on the media
  •     Data Link layer protocols define the rules for access to different media
   
17   
A network administrator has been asked to provide a graphic representation of exactly where the company network wiring and equipment are located in the building. What is this type of drawing?
  •     physical topology
   
18   
Which statements describe the logical token-passing topology? (Choose two.)
  •     Computers are allowed to transmit data only when they possess a token.
  •     Electronic tokens are passed sequentially to each other.
   
19   
What determines the method of media access control? (Choose two.)
  •     media sharing
  •     logical topology
   
20   


Refer to the exhibit. Assuming that the network in the exhibit is converged meaning the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for www.server?
  •     00-0c-85-cf-65-c0



ENetwork Chapter 6

1   
Which statements are true regarding IP addressing? (Choose two.)
  •     Private addresses are blocked from public Internet by router.
  •     IP address 127.0.0.1 can be used for a host to direct traffic to itself.

2   
A router interface has been assigned an IP address of 172.16.192.166 with a mask of 255.255.255.248. To which subnet does the IP address belong?
  •     172.16.192.160
   
3   


Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?
  •     The default gateway is on a different subnet from the host.

4   
What two things will happen if a router receives an ICMP packet which has a TTL value of 1 and the destination host is several hops away? (Choose two.)
  •     The router will discard the packet.
  •     The router will send a time exceeded message to the source host.
   
5   
What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?
  •     a network
   
6   
Which of the following network devices are recommended to be assigned static IP addresses? (Choose three.)
  •     servers
  •     network printers
  •     routers
   
7   


Refer to the exhibit. Which network prefix will implement the IP addressing scheme for the LANs shown in the graphic?
  •     /27
   
8   


Refer to the exhibit. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC?
  •    Internet Protocol is not properly installed on the host.
   
9   


Refer to the exhibit. A network administrator discovers that host A is having trouble with Internet connectivity, but the server farm has full connectivity. In addition, host A has full connectivity to the server farm. What is a possible cause of this problem?
  •     NAT is required for the host A network.

10   
What is the primary reason for development of IPv6?
  •     expanded addressing capabilities
   
11   
How many bits make up an IPv4 address?
  •     32

12   
Which process do routers use to determine the subnet network address based upon a given IP address and subnet mask?
  •     binary ANDing

13   
Which IPv4 subnetted addresses represent valid host addresses? (Choose three.)
  •     172.16.4.155 /26
  •     172.16.4.193 /26
  •     172.16.4.207 /27

14   
What subnet mask would a network administrator assign to a network address of 172.30.1.0 if it were possible to have up to 254 hosts?
  •     255.255.255.0
   
15   
Which of the following are features of IPv6? (Choose three.)
  •     larger address space
  •     simplified header format
  •     authentication and encryption

16   
Which three IP addresses are private? (Choose three.)
  •     10.35.66.70
  •     192.168.99.5
  •     172.18.88.90
   

17   


Refer to the exhibit. A network administrator has to develop an IP addressing scheme that uses the 192.168.1.0 /24 address space. The network that contains the serial link has already been addressed out of a separate range. Each network will be allocated the same number of host addresses. Which network mask will be appropriate to address the remaining networks?
  •     255.255.255.192
   
18   
What is the network address of the host 172.25.67.99 /23 in binary?
  •     10101100.00011001.01000010.00000000
   
19   
What three facts are true about the network portion of an IPv4 address? (Choose three.)
  •     is identical for all hosts in a broadcast domain
  •     varies in length
  •     is used to forward packets
   
20   

Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server's properties to allow connectivity to the network?
  •     IP address: 192.168.10.38 subnet mask: 255.255.255.248 default gateway: 192.168.10.33
   
21   
Given the IP address and subnet mask of 172.16.134.64 255.255.255.224, which of the following would describe this address?
  •     This is a network address.
   

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | GreenGeeks Review