sirhulk1
Quiz by , created more than 1 year ago

Understanding LANs in the perspective of Ethernet Technologies

49
0
0
sirhulk1
Created by sirhulk1 almost 11 years ago
Close

Ethernet Networks In Review - Chapter 3

Question 1 of 37

1

What is Ethernet ? (Choose two)

Select one or more of the following:

  • Ethernet is a trademark for a family of Ethernet technologies for Local Area Networks (LANs) was introduced in 1980 and standardized in 1985 as IEEE 802.3

  • Ethernet is a contention based media access method that allows all hosts on a network to share the same bandwidth of a link.

  • Ethernet is a access method that provides end to end delivery during network services.

Explanation

Question 2 of 37

1

What is a collision domain?

Select one of the following:

  • This is an Ethernet term describing two devices on one physical segment both sends out a packet at the same time. This will result in a collision and forcing both devices to retransmit at a later time. A collision domain is typically found in a Hub network environment.

  • A collision domain is a feature where a device fails to send a packet to the network and tries to resend the packet.

Explanation

Question 3 of 37

1

What is a broadcast domain?

Select one of the following:

  • Its part of a network technology that provides broadcasts for all hosts connected to the internetwork.

  • This refers to a group of devices on a network segment that hear all the broadcasts sent on that network segment.

Explanation

Question 4 of 37

1

Carrier Sense Multiple Access w/collision detection (CSMA/CD) is a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium.

Select one of the following:

  • True
  • False

Explanation

Question 5 of 37

1

When two devices send out a packet at the same time on the same segment causing a collision, how does CSMA/CD act on resolving this? (Choose four)

Select one or more of the following:

  • A jam signal informs all devices that a collision occurred.

  • The collision triggers a random back off algorithm.

  • The signal provides the devices to generate an inquiry file log.

  • Each device on the segment stops transmitting for a short time until their backoff timers expire.

  • All hosts have equal priority to transmit after the timers have expired.

Explanation

Question 6 of 37

1

What is the difference between Half Duplex and Full Duplex Ethernet?

Select one or more of the following:

  • Half Duplex uses just one pair on the network cable wire with a signal running in both directions. It also uses CSMA/CD protocol to help detect and prevent collisions. Half Duplex is typically run on hub environments.

  • Full Duplex uses one pair on the network cable wire with a signal running in both directions which offers a collision free network segment.

  • Half Duplex uses two pairs on the network cable wire with a signal running in both directions which is a collision free network segment. Half Duplex is typically run on hub environments.

  • Full Duplex uses two pairs on the network cable wire with a signal running in both directions which offers a collision free network segment.

Explanation

Question 7 of 37

1

Full Duplex Ethernet can run on Hub device environments

Select one of the following:

  • True
  • False

Explanation

Question 8 of 37

1

Full Duplex mode requires a dedicated switch port and a host network card that is capable of Full Duplex mode .

Select one of the following:

  • True
  • False

Explanation

Question 9 of 37

1

Ethernet at the Data Link layer is responsible for Ethernet addressing that is commonly referred to as ______________ addressing or _____________ addressing.

Select one or more of the following:

  • Logical

  • Hardware

  • MAC

Explanation

Question 10 of 37

1

In the Data Link layer there are four different types of Ethernet frames.

Select one or more of the following:

  • Ethernet_II

  • IEEE 802.3

  • Media Access Control (MAC)

  • Sub Network Access Protocol (SNAP)

  • IEEE 802.2

Explanation

Question 11 of 37

1

Ethernet_II frame is the most commonly used

Select one of the following:

  • True
  • False

Explanation

Question 12 of 37

1

For Ethernet what is the most commonly used frame?

Select one of the following:

  • Sub Network Access Protocol (SNAP)

  • Ethernet_II

Explanation

Question 13 of 37

1

For wireless specifications what is the most commonly used frame?

Select one of the following:

  • Sub Network Access Protocol (SNAP)

  • Ethernet_II

Explanation

Question 14 of 37

1

What makes up Ethernet Addressing ?

Select one or more of the following:

  • It uses Media Access Control (MAC) which is a sublayer of the Data Link Layer

  • The MAC is a 48 bit (6 byte) address burned into every Ethernet network interface card (NIC) but it can be overridden.

  • It uses Media Access Control (MAC) which is a sublayer of the Physical Layer

  • The MAC address is divided into two parts, first 24 bits is called the Organizational Unit Identifier (OUI) and the second 24 bits are Vendor assigned.

Explanation

Question 15 of 37

1

What are the values of a nibble and a byte in binary numbering?

Select one or more of the following:

  • A nibble is 8 bits with the value of each bit are the following: 128 64 32 16 8 4 2 1

  • A byte is 8 bits with the value of each bit are the following: 128 64 32 16 8 4 2 1

  • A byte is 4 bits with the value of each bit are the following: 8 4 2 1

  • A nibble is 4 bits with the value of each bit are the following: 8 4 2 1

Explanation

Question 16 of 37

1

Each hex character has a value of one _______ and every two hex characters has the value of one _____

Select one or more of the following:

  • Each hex character has a value of one byte (8 bits) and every two hex characters has the value of one nibble (4 bits).

  • Each hex character has a value of one nibble (4 bits) and every two characters has the value of one byte (8 bits).

Explanation

Question 17 of 37

1

In order to convert a hex value to a decimal value, you must first convert hex into binary, then add the binary values that will result in the decimal value.
Example: 0xC84 => 1100 1000 0100 => 2048 + 1024 + 128 + 4 => 3204

Select one of the following:

  • True
  • False

Explanation

Question 18 of 37

1

In order to convert binary to hex, you must first break the 8 bit binary into two 4 bit nibbles, then add up each nibble value separately which will result in the hex value.
Example: 01010101 => 0101 => 5 and 0101 => 5 , now add the two nibble values separately in hex format using "0x" => 0x55

Select one of the following:

  • True
  • False

Explanation

Question 19 of 37

1

The Data Link layer is responsible for combining bits into bytes and bytes into frames.

Select one of the following:

  • True
  • False

Explanation

Question 20 of 37

1

What are the three types of media access methods for Ethernet networks?

Select one or more of the following:

  • Contention (Ethernet)

  • CSMA/CD (Carrier Sense Multiple Access/Collision Detection

  • Polling (IBM Mainframes)

  • Token Passing (Token Ring and Fiber Distributed Data Interface - FDDI)

Explanation

Question 21 of 37

1

Encapsulating a frame within a different type of frame is called Tunneling.

Select one of the following:

  • True
  • False

Explanation

Question 22 of 37

1

The Ethernet_II frame contains what field that is used to identify the network upper layer protocol.

Select one or more of the following:

  • Type field

  • Length field

Explanation

Question 23 of 37

1

SNAP frame has its own protocol field to identify the upper-layer protocol. How can you identify a SNAP Frame?

Select one or more of the following:

  • SNAP frame contains a field that is identified by Ethernet by its header.

  • SNAP frame has the DSAP and SSAP fields are always AA

Explanation

Question 24 of 37

1

Name the different types of Ethernet Cabling. (Choose three)

Select one or more of the following:

  • Fiber Optical Cabling (SC/LC)

  • Straight-through Cabling

  • Cross-over cabling

  • Rolled Cabling

  • CAT5 Cabling

Explanation

Question 25 of 37

1

Straight-Through cables can connect to which devices?

Select one or more of the following:

  • Host to switch or hub

  • Switch to Switch

  • Hub to Hub

  • Router to Switch or hub

  • Hub to Switch

  • Router direct to host

Explanation

Question 26 of 37

1

Crossover cables connect to what devices?

Select one or more of the following:

  • Host to switch or hub

  • Switch to Switch

  • Host to Host

  • Hub to Hub

  • Router direct to host

  • Router to switch or hub

  • Switch to hub

Explanation

Question 27 of 37

1

Cross-over cabling connects to what cable pins?

Select one of the following:

  • 1 to 1 , 2 to 2, 3 to 3, 6 to 6 (uses two pairs)

  • 1 to 8, 2 to 7, 3 to 6, 4 to 5, 5 to 4, 6 to 3, 7 to 2, 8 to 1 (uses four pairs)

  • 1 to 3, 2 to 6 (uses only two pairs)

Explanation

Question 28 of 37

1

Data Encapsulation is data wrapped with protocol information that is created for each layer of the OSI model. To communicate and exchange information each layer uses Protocol Data Units (PDUs)

Select one of the following:

  • True
  • False

Explanation

Question 29 of 37

1

What specific name for the PDU at the Transport layer?

Select one of the following:

  • Bits

  • Frames

  • Segments

  • Packets

Explanation

Question 30 of 37

1

What is the specific PDU name for the Data Link Layer?

Select one of the following:

  • Segment

  • Frames

  • Bits

  • Packets

Explanation

Question 31 of 37

1

What is the specific PDU name for the Network Layer?

Select one of the following:

  • Segment

  • Packet

  • Bits

  • Frames

Explanation

Question 32 of 37

1

What is the specific PDU name for the Physical Layer?

Select one of the following:

  • Segment

  • Frame

  • Bits

  • Packets

Explanation

Question 33 of 37

1

The Transport layer when using TCP, it takes the data stream and makes segments and establishes a __________ circuit.

Select one of the following:

  • physical

  • virtual

Explanation

Question 34 of 37

1

When TCP completes the virtual circuit session, its defined by the _______ and _________ port numbers.

Select one of the following:

  • high and well known

  • Source and Destination

Explanation

Question 35 of 37

1

In the Transport Layer, along with the Virtual Circuit session, the source and destination IP address is defined and called a __________.

Select one of the following:

  • Reliable session

  • Socket

Explanation

Question 36 of 37

1

In TCP the destination port number represents the upper layer process (Application). As an example if the destination port was 23 that would be considered a telnet session needed for the receiving host.

Select one of the following:

  • True
  • False

Explanation

Question 37 of 37

1

The Network layer is responsible in finding the destination hardware address that will dictate where the packet will go on the local area network (LAN). It does this by sending an ________ request.

Select one of the following:

  • ping (Packet Internetwork Grouper)

  • ARP (Address Resolution Protocol)

Explanation