How is a MAC address represented?
four groups of eight binary digits separated by a decimal point
four Base10 digits separated by a decimal point
six hexadecimal digits
*** twelve hexadecimal digits
twenty-four Base10 digits
Which of the following are specified by IEEE standards as sublayers of the OSI data link layer? (Choose two.)
*** Logical Link Control
Logical Layer Control
*** Media Access Control
Logical Link Communication
Media Access Communication
Physical Access Communication
Which of the following are features of a Token Ring network? (Choose two.)
*** collisionless environment
prone to collisions
Which ports on a hub forward traffic?
only to the port where the destination host resides
to the ports in all other collision domains
*** all ports except the originating port
Which characteristics of Ethernet contribute to its widespread use? (Choose three.)
*** ease of maintenance
collision free technology
*** low cost of installation
compatibility with 802.5 standard
collision avoidance capabilities
Ethernet standard specifications limit network service interruption. Select the items that describe the standards. (Choose three.)
minimum segment length
*** maximum segment length
minimum number of stations per segment
*** maximum number of stations per segment
minimum number of repeaters between segments
*** maximum number of repeaters between segments
What is the name of the Layer 2 Protocol Data Unit(PDU)?
What is the length of a MAC address?
*** 48 bits
Which of the following are the functions of CSMA/CD? (Choose three.)
*** transmitting and receiving data packets
releasing a token when the network is clear
*** detecting errors within data packets or on the network
passing a token to each station on the network
*** decoding data packets and checking them for valid addresses before passing them to the upper layers of the OSI model
In which two layers of the OSI model does Ethernet function? (Choose two.)
*** data link
Which statements below are true about Ethernet? (Choose three.)
addresses the needs of Layer 2 and Layer 3 of the OSI model
first released as a Xerox proprietary standard
*** essentially the same as 802.3 standards
*** bandwidth can be increased without changing the underlying technology
essentially the same as 802.2 standards
X original idea developed at the University of Hawaii
Which options below are field names of a generic frame? (Choose three.)
*** frame check sequence
What does the word "Base" indicate in 10Base2?
The number standard used.
*** Baseband signaling is used.
Only a portion of the transmission medium is used.
Broadband signaling is used.
What happens on an Ethernet network after a collision occurs? (Choose three.)
*** A backoff algorithm is invoked and transmission is stopped.
Devices involved in the collision have a random period of time for priority retransmission of the damaged packet.
The devices involved in the collision release a token indicating the time each station may begin retransmitting.
*** The devices involved in the collision do not have priority to transmit data.
*** The devices with data to transmit return to a listen-before-transmit mode.
Transmit work will restart with the reissuance of all data.
After an Ethernet collision, when the backoff algorithm is invoked, which device has priority to transmit data?
the device involved in the collision with the lowest MAC address
the device involved in the collision with the lowest IP address
*** any device in the collision domain whose backoff timer expires first
those that began transmitting at the same time
Where does the MAC address originate?
DHCP server database
configured by the administrator
*** burned into ROM on the NIC card
network configuration on the computer
included in the creation of the processor chip
Which features describe the concept of Carrier Sense Multiple Access with Collision Detection? (Choose two.)
*** uses first-come, first-served approach
uses a token to transmit data
Which of the following is included in the frame address field? (Choose two.)
source IP address
destination IP address
destination subnet mask
*** source MAC address
*** destination MAC address
Kaynak: Cisco Curr v3.1