Similar documents
2. What is a characteristic of a contention-based access method?

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

CCNA Exploration1 Chapter 7: OSI Data Link Layer

1. Data Link Layer (Layer 2)

CCNA 1 Final Exam Answers UPDATE 2012 eg.1

1. Data Link Layer Protocols

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

Study Guide. Module Two

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

CCNA 1 v5.0 R&S ITN Final Exam 2014

Introduction to LAN Protocols

Computer Networks Principles LAN - Ethernet

Chapter 3.1 Acknowledgment:

1. Which OSI layers offers reliable, connection-oriented data communication services?

Objectives. Network Structure. Network Structure

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

Part3. Local Area Networks (LAN)

Internetworking Concepts Overview. 2000, Cisco Systems, Inc. 2-1

Communicating over the Network

The MAC Address Format

Defining Networks with the OSI Model. Module 2

Testpassport.

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Introduction to LAN Protocols

Chapter 7. OSI Data Link Layer. CCNA1-1 Chapter 7

Chapter 7. OSI Data Link Layer

1: Review Of Semester Provide an overview of encapsulation.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

Fundamentals of Networking. OSI & TCP/IP Model. Kuldeep Sonar 1

Lab Using Wireshark to Examine Ethernet Frames

SYSTEMS ADMINISTRATION USING CISCO (315)

CISCO SYSTEM ADMINISTRATION (41)

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

2. Which two functions of the OSI model occur at layer two? (Choose two.) physical addressing encoding routing cabling media access control

Copyright 2011 Sakun Sharma

Medium Access Control

Imi :... Data:... Nazwisko:... Stron:...

LAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks

Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Wireless# Guide to Wireless Communications. Objectives

Lab Using Wireshark to Examine Ethernet Frames

Take Assessment - CCNA 607 Certification Practice Exam - CCNA 4 WAN Technologies Version 3.1

Internetwork Expert s CCNP Bootcamp. Hierarchical Campus Network Design Overview

Full file at

Chapter 6 Connecting Device

PASS4TEST IT 인증시험덤프전문사이트

CHAPTER 2 - NETWORK DEVICES

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

CS 3516: Advanced Computer Networks

ก ก Information Technology II

Cisco Cisco Certified Network Associate (CCNA)

Chapter 4. The Medium Access Control Sublayer

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Link Layer and Ethernet

Cisco Exam Questions & Answers

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

EXAM Interconnecting Cisco Networking Devices Part 1 (ICND1) v3. For More Information:

Link Layer and Ethernet

Chapter 2. Communicating Over The Network

CCNA 3 (v v6.0) Chapter 3 Exam Answers % Full

Chapter 3: Network Protocols and Communications

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Exam Questions

Examsheets Questions and Answers

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Switched Ethernet Virtual LANs

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3


Q&As. Interconnecting Cisco Networking Devices Part 1. Pass Cisco Exam with 100% Guarantee

et Su cc es s in Passing Yourertification Exam at first

Lecture 7: Ethernet Hardware Addressing and Frame Format. Dr. Mohammed Hawa. Electrical Engineering Department, University of Jordan.

CN [Network Devices]

Cisco Interconnecting Cisco Networking Devices Part 1.

Chapter 4 NETWORK HARDWARE

OSI Model with Protocols. Layer Name PDU Address Protocols Device

NETWORK SECURITY ITEC 435

Redes de Computadores. Medium Access Control

Cisco Exam CCNA Version: 4.1 [ Total Questions: 215 ]

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Chapter 6: Network Communications and Protocols

Q&A. DEMO Version

IEEE 802 LANs SECTION C

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

LOCAL AREA NETWORKS Q&A Topic 4: VLAN

Interconnecting Cisco Networking Devices Part1 ( ICND1) Exam.

Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan

Communicating over the Network

Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open

Guide to Wireless Communications, Third Edition. Objectives

Chapter 2. Switch Concepts and Configuration. Part I

Data Link Layer, Part 3 Medium Access Control. Preface

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

CCNA Cisco Certified Network Associate CCNA (v3.0)

Transcription:

Page 1 of 4 Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - ENetwork Chapter 7 - CCNA Exploration: Network Fundamentals (Version 4.0) Time Remaining: 01:59:40 1 Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.) the Layer 3 protocol selected 2 the geographic scope of the network the PDU defined by the transport layer the physical layer implementation the number of hosts to be interconnected Refer to the exhibit. Assuming that the network in the exhibit is converged meaning the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for www.server? 00-1c-41-ab-c0-00 00-0c-85-cf-65-c0 00-0c-85-cf-65-c1 00-12-3f-32-05-af 3 Which options are properties of contention-based media access for a shared media? (Choose three.) non-deterministic less overhead one station transmits at a time collisions exist devices must wait their turn token passing 4 What is true concerning physical and logical topologies? The logical topology is always the same as the physical topology. Physical topologies are concerned with how a network transfers frames. Physical signal paths are defined by Data Link layer protocols. Logical topologies consist of virtual connections between nodes. 5 What determines the method of media access control? (Choose two.) network layer addressing

Page 2 of 4 media sharing application processes logical topology intermediary device function 6 What is true regarding media access control? (Choose three.) Ethernet utilizes CSMA/CD defined as placement of data frames on the media contention-based access is also known as deterministic 802.11 utilizes CSMA/CD Data Link layer protocols define the rules for access to different media controlled access contains data collisions 7 Which statements describe the logical token-passing topology? (Choose two.) Network usage is on a first come, first serve basis. Computers are allowed to transmit data only when they possess a token. Data from a host is received by all other hosts. Electronic tokens are passed sequentially to each other. Token passing networks have problems with high collision rates. 8 A network administrator has been asked to provide a graphic representation of exactly where the company network wiring and equipment are located in the building. What is this type of drawing? logical topology physical topology cable path wiring grid access topology 9 What is the purpose of the preamble in an Ethernet frame? is used as a padding for data is used for timing synchronization is used to identify the source address is used to identify the destination address 10 What statements are true regarding addresses found at each layer of the OSI model? (Choose two.) Layer 2 may identify devices by a physical address burned into the network card 11 Layer 2 identifies the applications that are communicating Layer 3 represents a hierarchical addressing scheme Layer 4 directs communication to the proper destination network Layer 4 addresses are used by intermediary devices to forward data

Page 3 of 4 Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit? All three networks use CSMA/CA None of the networks require media access control. Network 1 uses CSMA/CD and Network 3 uses CSMA/CA. Network 1 uses CSMA/CA and Network 2 uses CSMA/CD. Network 2 uses CSMA/CA and Network 3 uses CSMA/CD. 12 Refer to the exhibit. How many CRC calculations will take place as traffic routes from the PC to the laptop? 1 2 4 6 8 16 13 Refer to the exhibit. A frame is being sent from the PC to the laptop. Which source MAC and IP addresses will be included in the frame as it leaves RouterB? (Choose two.) source MAC - PC source MAC - S0/0 on RouterA source MAC - Fa0/1 on RouterB source IP - PC source IP - S0/0 on RouterA source IP - Fa0/1 of RouterB 14 Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer? LLC MAC HDLC NIC 15 What two facts are true when a device is moved from one network or subnet to another? (Choose two.) The Layer 2 address must be reassigned. The default gateway address should not be changed. The device will still operate at the same Layer 2 address. Applications and services will need additional port numbers assigned. The Layer 3 address must be reassigned to allow communications to the new network.

Page 4 of 4 Showing 1 of 2 <Prev Page: 1 Next> Close Window All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and Trademarks.

Page 1 of 4 Close Window Assessment System 1. Assessment Selection 2. Assessment Settings 3. Take Assessment Take Assessment - ENetwork Chapter 7 - CCNA Exploration: Network Fundamentals (Version 4.0) Time Remaining: 01:59:40 1 Which three factors should be considered when implementing a Layer 2 protocol in a network? (Choose three.) the Layer 3 protocol selected 2 the geographic scope of the network the PDU defined by the transport layer the physical layer implementation the number of hosts to be interconnected Refer to the exhibit. Assuming that the network in the exhibit is converged meaning the routing tables and ARP tables are complete, which MAC address will Host A place in the destination address field of Ethernet frames destined for www.server? 00-1c-41-ab-c0-00 00-0c-85-cf-65-c0 00-0c-85-cf-65-c1 00-12-3f-32-05-af 3 Which options are properties of contention-based media access for a shared media? (Choose three.) non-deterministic less overhead one station transmits at a time collisions exist devices must wait their turn token passing 4 What is true concerning physical and logical topologies? The logical topology is always the same as the physical topology. Physical topologies are concerned with how a network transfers frames. Physical signal paths are defined by Data Link layer protocols. Logical topologies consist of virtual connections between nodes. 5 What determines the method of media access control? (Choose two.) network layer addressing

Page 2 of 4 media sharing application processes logical topology intermediary device function 6 What is true regarding media access control? (Choose three.) Ethernet utilizes CSMA/CD defined as placement of data frames on the media contention-based access is also known as deterministic 802.11 utilizes CSMA/CD Data Link layer protocols define the rules for access to different media controlled access contains data collisions 7 Which statements describe the logical token-passing topology? (Choose two.) Network usage is on a first come, first serve basis. Computers are allowed to transmit data only when they possess a token. Data from a host is received by all other hosts. Electronic tokens are passed sequentially to each other. Token passing networks have problems with high collision rates. 8 A network administrator has been asked to provide a graphic representation of exactly where the company network wiring and equipment are located in the building. What is this type of drawing? logical topology physical topology cable path wiring grid access topology 9 What is the purpose of the preamble in an Ethernet frame? is used as a padding for data is used for timing synchronization is used to identify the source address is used to identify the destination address 10 What statements are true regarding addresses found at each layer of the OSI model? (Choose two.) Layer 2 may identify devices by a physical address burned into the network card 11 Layer 2 identifies the applications that are communicating Layer 3 represents a hierarchical addressing scheme Layer 4 directs communication to the proper destination network Layer 4 addresses are used by intermediary devices to forward data

Page 3 of 4 Refer to the exhibit. Which statement describes the media access control methods that are used by the networks in the exhibit? All three networks use CSMA/CA None of the networks require media access control. Network 1 uses CSMA/CD and Network 3 uses CSMA/CA. Network 1 uses CSMA/CA and Network 2 uses CSMA/CD. Network 2 uses CSMA/CA and Network 3 uses CSMA/CD. 12 Refer to the exhibit. How many CRC calculations will take place as traffic routes from the PC to the laptop? 1 2 4 6 8 16 13 Refer to the exhibit. A frame is being sent from the PC to the laptop. Which source MAC and IP addresses will be included in the frame as it leaves RouterB? (Choose two.) source MAC - PC source MAC - S0/0 on RouterA source MAC - Fa0/1 on RouterB source IP - PC source IP - S0/0 on RouterA source IP - Fa0/1 of RouterB 14 Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer? LLC MAC HDLC NIC 15 What two facts are true when a device is moved from one network or subnet to another? (Choose two.) The Layer 2 address must be reassigned. The default gateway address should not be changed. The device will still operate at the same Layer 2 address. Applications and services will need additional port numbers assigned. The Layer 3 address must be reassigned to allow communications to the new network.

Page 4 of 4 Showing 1 of 2 <Prev Page: 1 Next> Close Window All content copyright 1992-2008 Cisco Systems, Inc. Privacy Statement and Trademarks.