CH 2 Flashcards
1
Q
Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers? (Choose all that apply.) a. Total number of computers that could be connected b. The processing speed of the computers connected c. Cable length d. No Internet access
A
A and C
2
Q
Which of the following is true of a repeater? a. Receives frames and forwards them b. Determines which network to send a packet c. Receives bit signals and strengthens them d. Has a burned-in MAC address for each port
A
C
3
Q
Which of the following is true of a hub? (Choose all that apply.) a. Usually has just two ports b. Transmits regenerated signals to all connected ports c. Usually has four or more ports d. Works with MAC addresses
A
C
4
Q
Which of the following is the unit of measurement by which a hub’s bandwidth is usually specified? a. Bytes per second b. Bits per second c. Packets per second d. Bytes per minute
A
B
5
Q
Which of the following describes how devices connected to a hub use the speed at which the hub can transmit data? a. Bandwidth optimization b. Bandwidth dedication c. Bandwidth sharing d. Bandwidth multiplier
A
C
6
Q
Which of the following is a likely indicator light on a hub? (Choose all that apply.) a. CRC error b. Link status c. Connection speed d. Activity e. Signal strength
A
B, C, D
7
Q
Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data? a. Dedicated bandwidth b. Half-duplex bandwidth c. Half-scale bandwidth d. Shared bandwidth
A
A
8
Q
What does a switch use to create its switching table? a. Source IP addresses b. Destination logical addresses c. Destination physical addresses d. Source MAC addresses
A
D
9
Q
What purpose does the timestamp serve in a switching table? a. Tells the switch when to forward a frame b. Tells the switch how long to wait for a response c. Tells the switch when to delete an entry d. Tells the switch how long it has been running
A
C
10
Q
What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch? a. Uplink port b. Full-duplex mode c. Shared bandwidth d. Bit strengthening e. Frame doubling f. Signal regeneration
A
B
11
Q
To which device is a wireless access point most similar in how it operates? a. Hub b. Switch c. NIC d. Router
A
A
12
Q
What’s the purpose of an RTS signal
in wireless networking?
a. It allows the AP to request which
device is the transmitting station.
b. It allows the AP to tell all stations that
it’s ready to transmit data.
c. It allows a client to notify the AP that
it’s ready to send data.
d. It allows a client to request data from
the AP.
A
C
13
Q
Which of the following is a common operational speed of a wireless network? a. 10 Kbps b. 110 Gbps c. 600 Kbps d. 11 Mbps
A
D
14
Q
Which of the following is a task performed by a NIC and its driver? (Choose all that apply.) a. Provides a connection to the network medium b. Converts bit signals into frames for transmission on the medium c. Receives packets from the network protocol and creates frames d. Adds a header before sending a frame to the network protocol e. Adds error-checking data to the frame
A
A, C, E
15
Q
Which of the following best describes a MAC address? a. A 24-bit number expressed as 12 decimal digits b. Two 24-bit numbers, in which one is the OUI c. A 48-bit number composed of 12 octal digits d. A dotted decimal number burned into the NIC
A
B
16
Q
.How does a protocol analyzer capture all frames? a. It configures the NIC to capture only unicast frames. b. It sets all incoming destination addresses to be broadcasts. c. It configures the NIC to operate in promiscuous mode. d. It sets the exclusive mode option on the NIC. e. It captures only multicast frames.
A
C
17
Q
Which of the following is the purpose of an SSID? a. Assigns an address to a wireless NIC b. Acts as a unique name for a local area connection c. Acts as a security key for securing a network d. Identifies a wireless network
A
D
18
Q
.What information is found in a routing table? a. Computer names and IP addresses b. Network addresses and interfaces c. MAC addresses and ports d. IP addresses and MAC addresses
A
B
19
Q
.If a router receives a packet with a destination network address unknown to the router, what does the router do? a. Send the packet out all interfaces. b. Discard the packet. c. Add the destination network to its routing table. d. Query the network for the destination network.
A
B