0% found this document useful (0 votes)
73 views4 pages

Logical Link Control

The document contains 20 multiple choice questions about Ethernet networking standards and technologies. It covers topics like the OSI model layers Ethernet operates in, the functions of a NIC, Ethernet cabling standards such as 10BASE-T and 100BASE-TX, the difference between half and full duplex transmission, and Ethernet standards like Fast Ethernet and Gigabit Ethernet.

Uploaded by

johntalbo
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
Download as doc, pdf, or txt
0% found this document useful (0 votes)
73 views4 pages

Logical Link Control

The document contains 20 multiple choice questions about Ethernet networking standards and technologies. It covers topics like the OSI model layers Ethernet operates in, the functions of a NIC, Ethernet cabling standards such as 10BASE-T and 100BASE-TX, the difference between half and full duplex transmission, and Ethernet standards like Fast Ethernet and Gigabit Ethernet.

Uploaded by

johntalbo
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1/ 4

1.

Which of the following are specified by IEEE standards as sublayers of the OSI data link
layer? (Choose two.)
• Logical Link Control
• Logical Layer Control
• Media Access Control
• Logical Link Communication
• Media Access Communication
• Physical Access Communication

2. Refer to the exhibit. Host A is communicating with host F. What happens to a frame sent from
host A to host F as it travels over the Ethernet segments?
• The frame format is modified as it passes through each switch.
• The frame format remains the same across each Ethernet segment.
• The frame format is modified as the media speed changed at switch B and switch E.
• The frame format is modified as the media material changes between copper and fiber at switch
C and switch D.

3. In which two layers of the OSI model does Ethernet function? (Choose two.)
• application
• session
• transport
• network
• data link
• physical

4. Where does the MAC address originate?


• DHCP server database
• configured by the administrator
• burned into ROM on the NIC card
• network configuration on the computer
• included in the creation of the processor chip

5. At what layer of the OSI model does a MAC address reside?


•1
•2
•3
•4
•7

6. A router has an Ethernet, Token Ring, serial, and ISDN interface. Which interfaces will have a
MAC address?
• serial and ISDN interfaces
• Ethernet and Token Ring interfaces
• Ethernet and ISDN interfaces
• Token Ring and serial interfaces

7. Which two devices can provide full-duplex Ethernet connections? (Choose two.)
• hub
• modem
• repeater
• NIC
• Layer 2 switch

8.Refer to the exhibit. The small office network shown in the exhibit consists of four computers
connected through a hub. Which configuration would cause collisions and errors on the network?
• autonegotiation
• FastEthernet
• peer-to-peer shared resources
• administratively configured full duplex

9.Refer to the exhibit. The switch and workstation are administratively configured for full-duplex
operation. Which statement accurately reflects the operation of this link?
• No collisions will occur on this link.
• Only one of the devices can transmit at a time.
• The switch will have priority for transmitting data.
• The devices will default back to half duplex if excessive collisions occur.

10. What are three functions of a NIC in a PC? (Choose three.)


• A NIC connects the PC to the network media.
• A NIC detects collisions on the Ethernet segment.
• A NIC checks the formatting of data before it is transmitted.
• A NIC passes the contents of selected frames to the upper OSI layers.
• A NIC acknowledges and retransmits data that was not received properly.
• A NIC discards frames when the destination IP address does not match the local host.

11. In an Ethernet LAN, how does the NIC know when it can transmit data?
• An Ethernet NIC transmits data as soon as the frame is received.
• An Ethernet NIC transmits data as soon as the NIC receives a token.
• An Ethernet NIC transmits data when it senses a collision.
• An Ethernet NIC transmits data after listening for the absence of a signal on the media.

12.Refer to the exhibit. All hosts are in listen mode. Host 1 and Host 4 both transmit data at the
same time. How do the hosts respond on the network? (Choose two.)
• Hosts 1 and 4 may be operating full duplex so no collision will exist.
• The hub will block the port connected to Host 4 to prevent a collision.
• After the end of the jam signal, Hosts 1, 2, 3, and 4 invoke a backoff algorithm.
• When the four hosts detect the collision, Hosts 1, 2, 3, and 4 generate a jam signal.
• Hosts 1 and 4 are assigned shorter backoff values to provide them priority to access the media.
• If a host has data to transmit after the backoff period of that host, the host checks to determine if
the line is idle, before transmitting.

13. Which statement describes how CSMA/CD on an Ethernet segment manages the
retransmission of frames after a collision occurs?
• The first device to detect the collision has the priority for retransmission.
• The device with the lowest MAC address determines the retransmission priority.
• The devices on the network segment hold an election for priority to retransmit data
• The devices transmitting when the collision occurs DO NOT have priority for retransmission.

14. What is the maximum distance that 10BASE-T will transmit data before signal attenuation
affects the data delivery?
• 100 meters
• 185 meters
• 300 meters
• 500 meters

15. Which of the following are Fast Ethernet technologies? (Choose two.)
• 100BASE-5
• 100BASE2
• 1000BASE-F
• 100BASE-FX
• 100BASE-TX

16. At which OSI layer do the differences between standard Ethernet, Fast Ethernet and Gigabit
Ethernet occur?
• physical layer
• data link layer
• network layer
• transport layer

17. How does 1000BASE-T use the UTP wire pairs to accomplish transmission?
• two pairs are used to transmit and two pairs are used to receive
• one pair is used to transmit, one pair is used to receive, one pair is used for clocking, and one
pair is used for error correction
• all four pairs are used in parallel by both hosts to transmit and receive simultaneously
• two pairs of wires are used as in 10BASE-T and 100BASE-TX

18. Which statements describe Gigabit Ethernet technology? (Choose two.)


• operates at 100 Mbps
• typically used for backbone cabling
• requires shielded twisted-pair cabling
• can be implemented over copper and fiber
• primarily used between workstations option

19. Which media types can be used in an implementation of a 10BASE-T network? (Choose
three.)
• Category 5 UTP
• Category 5e UTP
• Category 3 UTP
• coaxial cable
• multi-mode fiber
• single mode fiber

20. Which of the following Ethernet technologies are considered legacy Ethernet? (Choose three.)
• 10BASE2
• 10BASE5
• 10BASE-T
• 100BASE-T
• 100BASE-FX

You might also like