Chapter 3 Flashcards
Which of the following is a valid MAC address? A CO-34-FF-15-01-8E B 25s.255.2s5.0 C 34-9A-86-1G-B3-24 D 83-5A-5B-0B-31-55-F1 E 192.168.12.15 F 73-99-12-61-15
A CO-34-FF-15-01-8E
Which of the following statements accurately describes how a modem works? (Select two.)
A It demodulates analog data from a telephone network into digital PC data.
B It transmits digital signals over ordinary telephone copper wiring at a rate up to 128 Kbps.
C It modulates digital data from the PC into analog data and transmits it on a telephone network.
D It communicates over a telephone network using digital signals.
E It modulates digital data from a telephone network into analog data that a PC can use.
F It demodulates analog PC data into digital data that can be transmitted through a telephone network.
A It demodulates analog data from a telephone network into digital PC data.
C It modulates digital data from the PC into analog data and transmits it on a telephone network.
What type of module might a switch use to allow it to modify the media type supported by a switch port? (Select two.) A MPLS B SFP C OC-X D GBIC
B SFP
D GBIC
At which OSI model layer does a media converter operate? A Layer 1 B Layer 2 C Layer 3 D Layer 4
A Layer 1
Which of the following is a valid MAC address? A 145.65.254.1O B FABC.875E.9BG6 C 95ABC2F4.ABC5.569D.43BF D AB.07.CF.62.16.BD
D AB.07.CF.62.16.BD
A host wants to send a message to another host with the IP address 115.99.80.157. IP does not know the hardware address of the destination device. Which protocol can be used to discover the MAC address? A Boorp B DHCP C ICMP D ous E IGMP F ARP
F ARP
You have a server that has a 100BaseFX network interface card that you need to connect to a switch. The switch only has 100BaseTX switch ports. Which device should you use? A Media converter B Bridge C Repeater D Hub E Gateway
A Media converter
What device sends signals from a computer onto a network? A Cable B Router C Transceiver D Gateway
C Transceiver
Which of the following is true about the MAC address? (Select two.)
A It is typically represented by octets of decimal numbers between 0-255.
B It is a 48-bit address.
C It is a 32-blt address.
D It is a 64-blt address.
E It is typically represented by hexadecimal numbers.
B It is a 48-bit address.
E It is typically represented by hexadecimal numbers.
Which network component connects a device with the transmission media and allows it to send and receive messages? A Client B Network interface card C Peripheral D Protocol E Server
B Network interface card
A switch is associated with which OSI model layer? A Data Link B Network C Transport D Physical
A Data Link
Which of the following best describes how a switch functions?
A It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.
B It connects multiple segments of different architectures. It translates frames, and broadcasts them to all of its
ports.
C It connects multiple cable segments (or devices), and broadcasts frames to all of its ports.
D It connects multiple segments of different architectures. It translates frames, and forwards them to the
appropriate segment.
A It connects multiple cable segments (or devices), and forwards frames to the appropriate segment.
Which of the following devices operate at OSI model layer Z? (Select two.) A Repeater B Router C Firewall D switch E Hub F Network interface card
D switch
F Network interface card
Which three of the following devices operate at the Data Link layer of the OSI model? A Routers B Network interface cards (NICs) C Hubs D Bridges E Switches F Repeaters
B Network interface cards (NICs)
D Bridges
E Switches
Which of the following devices is used on a LAN and offers guaranteed bandwidth to each port?
A Router
B switch
C Bridge
B switch
Your company purchases a new bridge, which filters packets based on the MAC address of the destination computer.
On which layer of the OSI model is this device functioning?
A Presentation
B Session
C Transport
D Data Link
D Data Link
An 8-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the
switch do?
A Send the frame out the destination port.
B Drop the frame.
C Send the frame out all 8 ports.
D Send the frame out ports 2-8.
D Send the frame out ports 2-8.
Which of the following hardware devices regenerates a signal out all connected ports without examining the frame or packet contents? (Select two.) A Gateway B Repeater C switch D Hub E Bridge F Router
B Repeater
D Hub
How do switches and bridges learn where devices are located on a network?
A When a frame enters a port, the source IP address is copied from the frame header.
B When a frame enters a port, the source MAC address is copied from the frame header.
C When a frame enters a port, the destination IP address is copied from the frame header.
D When a frame enters a port, the destination MAC address is copied from frame header.
B When a frame enters a port, the source MAC address is copied from the frame header.
At which layer of the OSI model do hubs operate? A Layer 3 B Data Link C Physical D Internet
C Physical
An access point that conforms to the IEEE 802.11b standard acts most closely to what other networking device? A Hub B Gateway C Patch bay D Router E Terminal
A Hub
At what OSI layer does a router operate to forward network messages? A Session B Transport C Network D Physical E Data Link
C Network
Which of the following hardware devices links multiple networks and directs traffic between networks? A Repeater B Bridge C Hub D Router
D Router
You are the administrator of your company’s network. You want to prevent unauthorized access to your intranet from
the Internet. Which of the following should you implement?
A ICS
B Firewall
C Proxy server
D Packet Internet Groper
B Firewall
At which of the following OSI layers does a router operate? A Layer 1 B Layer 2 C Layer 3 D Layer 4
C Layer 3
You are the network administrator for a small organization. Recently, you contracted with an ISP to connect your
organization’s network to the Internet to provide users with Internet access. Since doing so, it has come to your
attention that an intruder has invaded your network from the Internet on three separate occasions.
What type of network hardware should you implement to prevent this from happening again?
A csu/Dsu
B Router
C Firewall
D switch
E Hub
F Proxy server
C Firewall
Which two of the following tasks do routers perform?
A Control access to the transmission media
B Multiplex signals onto the same transmission media
C Maintain information about paths through an internetwork
D Route data based on logical network addresses
E Route data based on hardware device addresses
F Identify devices through hardware addresses
C Maintain information about paths through an internetwork
D Route data based on logical network addresses
Which of the following is the best device to deploy to protect your private network from a public untrusted network? A Gateway B Router C Firewall D Hub
C Firewall