0% found this document useful (0 votes)
11 views7 pages

Chapter 4-5

The document contains a series of questions and answers related to networking concepts, specifically focusing on the IEEE 802 LAN/MAN data link layer, topologies, duplex communication methods, and MAC addresses. It covers various aspects of data link layer functionality, including frame creation, error detection, and media access control methods. Additionally, it addresses the characteristics of Ethernet frames and switching methods used in networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views7 pages

Chapter 4-5

The document contains a series of questions and answers related to networking concepts, specifically focusing on the IEEE 802 LAN/MAN data link layer, topologies, duplex communication methods, and MAC addresses. It covers various aspects of data link layer functionality, including frame creation, error detection, and media access control methods. Additionally, it addresses the characteristics of Ethernet frames and switching methods used in networking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

::Question1::The IEEE 802 LAN/MAN data link layer consists of which two sublayers? (Choose two.

)
{
~Network Control Protocol
=Logical Link Control
=Media Access Control
~Link Control Protocol
}

::Question2::Which topology displays networking device layer IP addresses?


{
~aerial topology
~IP address topology
=logical topology
~physical topology
}

::Question3::Which duplex communication method is used in WLANs?


{
~full-duplex
=half-duplex
~simplex
~complex
}

::Question4::Which media access control method is used in legacy Ethernet LANs?


{
~carrier sense multiple access/collision annoyance
~carrier sense multiple access/collision avoidance
~carrier sense multiple access/collision destruction
=carrier sense multiple access/collision detection
}

::Question5::What does the data link layer add to a Layer 3 packet to create a frame? (Choose two.)
{
~flags
~sequence number
=header
=trailer
}

::Question6::What is the function of the last field in a data link layer frame?
{
=To determine whether the frame experienced transmission errors
~To identify special flow control services such as quality of service (QoS)
~To identify the beginning and end limits of the frame
~To identify the Layer 3 protocol in the data field
}

::Question7::Which lists the Layer 2 and Layer 3 address fields in the correct order?
{
=destination NIC address, source NIC address, source IP address, destination IP address
~source NIC address, destination NIC address, source IP address, destination IP address
~destination NIC address, source NIC address, destination IP address, source IP address
~source NIC address, destination NIC address, destination IP address, source IP address
}

::Question8::What identifier is used at the data link layer to uniquely identify an Ethernet device?
{
~IP address
=MAC address
~sequence number
~TCP port number
}

::Question9::What attribute of a NIC would place it at the data link layer of the OSI model?
{
~attached Ethernet cable
~IP address
=MAC address
~RJ-45 port
}

::Question10::What is true concerning physical and logical topologies?


{
~The logical topology is always the same as the physical topology.
~Physical topologies are concerned with how a network transfers frames.
~Physical topologies display the IP addressing scheme of each network.
=Logical topologies refer to how a network transfers data between devices.
}

::Question11::What method is used to manage contention-based access on a wireless network?


{
~CSMA/CD
~priority ordering
=CSMA/CA
~token passing
}

::Question12::A technician has been asked to develop a physical topology for a network that provides a
high level of redundancy. Which physical topology requires that every node is attached to every other
node on the network?
{
~bus
~hierarchical
=mesh
~Ring
}

::Question13::Which statement describes the half-duplex mode of data transmission?


{
~Data that is transmitted over the network can only flow in one direction.
=Data that is transmitted over the network flows in one direction at a time.
~Data that is transmitted over the network flows in one direction to many different destinations
simultaneously.
~Data that is transmitted over the network flows in both directions at the same time.
}

::Question14::Which is a function of the Logical Link Control (LLC) sublayer?


{
~to define the media access processes that are performed by the hardware
~to provide data link layer addressing
=to identify which network layer protocol is being used
~to accept segments and package them into data units that are called packets
}

::Question15::What type of physical topology can be created by connecting all Ethernet cables to a central
device?
{
~bus
~ring
=star
~Mesh
}

::Question16::What are two services performed by the data link layer of the OSI model? (Choose two.)
{
~It fragments data packets into the MTU size.
~It determines the path to forward packets.
=It accepts Layer 3 packets and encapsulates them into frames.
=It provides media access control and performs error detection.
}

::Question17::Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?


{
~the virtually unlimited availability of IPv6 addresses
~the use of CSMA/CA
=the use of full-duplex capable Layer 2 switches
~the development of half-duplex switch operation
}

::Question18::Which part of an Ethernet Frame describes the higher-layer protocol that is encapsulated?
{
=EtherType
~Preamble
~Start of Frame Delimiter
~Frame Check Sequence
}

::Question19::What are two methods for switching data between ports on a switch? (Choose two.)
{
~cut-off switching
=cut-through switching
=store-and-forward switching
~store-and-supply switching
}

::Question20::What feature automatically negotiates the best speed and duplex setting between
interconnecting devices?
{
~auto-MDIX
~autobots
=autonegotiation
~autotune
}

::Question21::What will a host on an Ethernet network do if it receives a frame with a unicast destination
MAC address that does not match its own MAC address?
{
=It will discard the frame.
~It will forward the frame to the next host.
~It will remove the frame from the media.
~It will strip off the data-link frame to check the destination IP address.
}

::Question22::What happens to runt frames received by a Cisco Ethernet switch?


{
=The frame is dropped.
~The frame is returned to the originating network device.
~The frame is broadcast to all other devices on the same network.
~The frame is sent to the default gateway.
}

::Question23::What addressing information is recorded by a switch to build its MAC address table?
{
~the destination Layer 3 address of incoming packets
~the destination Layer 2 address of outgoing frames
~the source Layer 3 address of outgoing packets
=the source Layer 2 address of incoming frames
}

::Question24::Which statement is true about MAC addresses?


{
~MAC addresses are implemented by software.
~A NIC only needs a MAC address if connected to a WAN.
=The first three bytes are used by the vendor assigned OUI.
~The ISO is responsible for MAC addresses regulations.
}

::Question25::What are the two sizes (minimum and expected maximum) of an Ethernet frame? (Choose
two.)
{
~56 bytes
=64 bytes
~1024 bytes
=1518 bytes
}

You might also like