Module 4-7 Exam Flashcards

1
Q

What is the purpose of the OSI physical layer?

controlling access to media
transmitting bits across the local media
performing error detection on received frames
exchanging frames between nodes over physical network media

A

transmitting bits across the local media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are two strands of fiber used for a single fiber optic connection?

The two strands allow the data to travel for longer distances without degrading.
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.

A

They allow for full-duplex connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which characteristic describes crosstalk?

the distortion of the network signal from fluorescent lighting
the distortion of the transmitted messages from signals carried in adjacent wires
the weakening of the network signal over long cable lengths
the loss of wireless signal over excessive distance from the access point

A

the distortion of the transmitted messages from signals carried in adjacent wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which procedure is used to reduce the effect of crosstalk in copper cables?

requiring proper grounding connections
twisting opposing circuit wire pairs together
wrapping the bundle of wires with metallic shielding
designing a cable infrastructure to avoid crosstalk interference
avoiding sharp bends during installation

A

twisting opposing circuit wire pairs together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

the amount of traffic that is currently crossing the network
the sophistication of the encapsulation method applied to the data
the type of traffic that is crossing the network
the latency that is created by the number of network devices that the data is crossing
the bandwidth of the WAN connection to the Internet
the reliability of the gigabit Ethernet infrastructure of the backbone

A
  • the amount of traffic that is currently crossing the network
  • the type of traffic that is crossing the network
  • the latency that is created by the number of network devices that the data is crossing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two characteristics of fiber-optic cable? (Choose two.)
It is not affected by EMI or RFI.
Each pair of cables is wrapped in metallic foil.
It combines the technique of cancellation, shielding, and twisting to protect data.
It typically contains 4 pairs of fiber-optic wires.
It is more expensive than UTP cabling is.

A
  • It is not affected by EMI or RFI.
  • It is more expensive than UTP cabling is.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a primary role of the Physical layer in transmitting data on the network?
create the signals that represent the bits in each frame on to the media
provide physical addressing to the devices
determine the path packets take through the network
control data access to the media

A

create the signals that represent the bits in each frame on to the media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs?

the magnetic field around the adjacent pairs of wire
the use of braided wire to shield the adjacent wire pairs
the reflection of the electrical wave back from the far end of the cable
the collision caused by two nodes trying to use the media simultaneously

A

the magnetic field around the adjacent pairs of wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

crosstalk
bandwidth
size of the network
signal modulation technique
electromagnetic interference

A
  • crosstalk
  • electromagnetic interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which two devices commonly affect wireless networks? (Choose two.)

Blu-ray players
home theaters
cordless phones
microwaves
incandescent light bulbs

A
  • cordless phones
  • microwaves
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two statements describe the services provided by the data link layer? (Choose two.)

It defines the end-to-end delivery addressing scheme.
It maintains the path between the source and destination devices during the data transmission.
It manages the access of frames to the network media.
It provides reliable delivery through link establishment and flow control.
It ensures that application data will be transmitted according to the prioritization.
It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.

A
  • It manages the access of frames to the network media.
  • It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame
to verify the physical address in the frame
to verify the logical address in the frame
to compute the checksum header for the data field in the frame

A

to verify the integrity of the received frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is contained in the trailer of a data-link frame?

logical address
physical address
data
error detection

A

error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which statement describes a characteristic of the frame header fields of the data link layer?

They all include the flow control and logical connection fields.
Ethernet frame header fields contain Layer 3 source and destination addresses.
They vary depending on protocols.
They include information on user applications.

A

They vary depending on protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites?

mesh
partial mesh
hub and spoke
point-to-point

A

partial mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two fields or features does Ethernet examine to determine if a received frame is passed to the data link layer or discarded by the NIC? (Choose two.)

auto-MDIX
CEF
Frame Check Sequence
minimum frame size
source MAC address

A
  • Frame Check Sequence
  • minimum frame size
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which media communication type does not require media arbitration in the data link layer?

deterministic
half-duplex
full-duplex
controlled access

A

full-duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which statement describes an extended star topology?

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.
End devices are connected together by a bus and each bus connects to a central intermediate device.
Each end system is connected to its respective neighbor via an intermediate device.
All end and intermediate devices are connected in a chain to each other.

A

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a characteristic of the LLC sublayer?

It provides the logical addressing required that identifies the device.
It provides delimitation of data according to the physical signaling requirements of the medium.
It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.
It defines software processes that provide services to the physical layer.

A

It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are three ways that media access control is used in networking? (Choose three.)

Ethernet utilizes CSMA/CD.
Media access control provides placement of data frames onto the media.
Contention-based access is also known as deterministic.
802.11 utilizes CSMA/CD.
Data link layer protocols define the rules for access to different media.
Networks with controlled access have reduced performance due to data collisions.

A
  • Ethernet utilizes CSMA/CD.
  • Media access control provides placement of data frames onto the media.
  • Data link layer protocols define the rules for access to different media.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?

An IP address is added.
The logical address is added.
The physical address is added.
The process port number is added.

A

The physical address is added.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What three items are contained in an Ethernet header and trailer? (Choose three.)

source IP address
source MAC address
destination IP address
destination MAC address
error-checking information

A
  • source MAC address
  • destination MAC address
  • error-checking information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What type of communication rule would best describe CSMA/CD?

access method
flow control
message encapsulation
message encoding

A

access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which three basic parts are common to all frame types supported by the data link layer? (Choose three.)

header
type field
MTU size
data
trailer
CRC value

A
  • header
  • data
  • trailer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which statement is true about the CSMA/CD access method that is used in Ethernet?

When a device hears a carrier signal and transmits, a collision cannot occur.
A jamming signal causes only devices that caused the collision to execute a backoff algorithm.
All network devices must listen before transmitting.
Devices involved in a collision get priority to transmit after the backoff period.

A

All network devices must listen before transmitting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the auto-MDIX feature on a switch?

the automatic configuration of an interface for 10/100/1000 Mb/s operation
the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection
the automatic configuration of full-duplex operation over a single Ethernet copper or optical cable
the ability to turn a switch interface on or off accordingly if an active connection is detected

A

the automatic configuration of an interface for a straight-through or a crossover Ethernet cable connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

port-based buffering
level 1 cache buffering
shared memory buffering
fixed configuration buffering

A

shared memory buffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are two examples of the cut-through switching method? (Choose two.)
store-and-forward switching
fast-forward switching
CRC switching
fragment-free switching
QOS switching

A
  • fast-forward switching
  • fragment-free switching
29
Q

Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame?
cut-through switching
store-and-forward switching
fragment-free switching
fast-forward switching

A

store-and-forward switching

30
Q

What is the purpose of the FCS field in a frame?

to obtain the MAC address of the sending node
to verify the logical address of the sending node
to compute the CRC header for the data field
to determine if errors occurred in the transmission and reception

A

to determine if errors occurred in the transmission and reception

31
Q

Which switching method has the lowest level of latency?

cut-through
store-and-forward
fragment-free
fast-forward

A

fast-forward

32
Q

A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.)

The link between the switches will work at the fastest speed that is supported by both switches.
The link between switches will work as full-duplex.
If both switches support different speeds, they will each work at their own fastest speed.
The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.
The connection will not be possible unless the administrator changes the cable to a crossover cable.
The duplex capability has to be manually configured because it cannot be negotiated.

A
  • The link between the switches will work at the fastest speed that is supported by both switches.
  • The link between switches will work as full-duplex.
  • The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.
33
Q

Which advantage does the store-and-forward switching method have compared with the cut-through switching method?

collision detecting
frame error checking
faster frame forwarding
frame forwarding using IPv4 Layer 3 and 4 information

A

frame error checking

34
Q

When the store-and-forward method of switching is in use, what part of the Ethernet frame is used to perform an error check?

CRC in the trailer
source MAC address in the header
destination MAC address in the header
protocol type in the header

A

CRC in the trailer

35
Q

Which switching method uses the CRC value in a frame?
cut-through
fast-forward
fragment-free
store-and-forward

A

store-and-forward

36
Q

What are two actions performed by a Cisco switch? (Choose two.)

building a routing table that is based on the first IP address in the frame header
using the source MAC addresses of frames to build and maintain a MAC address table
forwarding frames with unknown destination IP addresses to the default gateway
utilizing the MAC address table to forward frames via the destination MAC address
examining the destination MAC address to add new entries to the MAC address table

A
  • using the source MAC addresses of frames to build and maintain a MAC address table
  • utilizing the MAC address table to forward frames via the destination MAC address
37
Q

Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)

Logical link control is implemented in software.
Logical link control is specified in the IEEE 802.3 standard.
The LLC sublayer adds a header and a trailer to the data.
The data link layer uses LLC to communicate with the upper layers of the protocol suite.
The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.

A
  • Logical link control is implemented in software.
  • The data link layer uses LLC to communicate with the upper layers of the protocol suite.
38
Q

What is the auto-MDIX feature?

It enables a device to automatically configure an interface to use a straight-through or a crossover cable.
It enables a device to automatically configure the duplex settings of a segment.
It enables a device to automatically configure the speed of its interface.
It enables a switch to dynamically select the forwarding method.

A

It enables a device to automatically configure an interface to use a straight-through or a crossover cable.

39
Q

What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?
has a positive impact on bandwidth by dropping most of the invalid frames
makes a fast forwarding decision based on the source MAC address of the frame
has a lower latency appropriate for high-performance computing applications​
provides the flexibility to support any mix of Ethernet speeds

A

has a lower latency appropriate for high-performance computing applications​

40
Q

Which is a multicast MAC address?

FF-FF-FF-FF-FF-FF
5C-26-0A-4B-19-3E
01-00-5E-00-00-03
00-26-0F-4B-00-3E

A

01-00-5E-00-00-03

41
Q

What does the term “attenuation” mean in data communication?

loss of signal strength as distance increases
time for a signal to reach its destination
leakage of signals from one cable pair to another
strengthening of a signal by a networking device

A

loss of signal strength as distance increases

42
Q

What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater distances per cable run
lower installation cost
limited susceptibility to EMI/RFI
durable connections
greater bandwidth potential
easily terminated

A
  • greater distances per cable run
  • greater bandwidth potential
  • limited susceptibility to EMI/RFI
43
Q

What OSI physical layer term describes the process by which one wave modifies another wave?

modulation
IEEE
EIA/TIA
air

A

modulation

44
Q

What OSI physical layer term describes the capacity at which a medium can carry data?

bandwidth
IEEE
EIA/TIA
air

A

bandwidth

45
Q

What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time?

throughput
bandwidth
latency
goodput

A

throughput

46
Q

What OSI physical layer term describes the amount of time, including delays, for data to travel from one point to another?

latency
bandwidth
throughput
goodput

A

latency

47
Q

What OSI physical layer term describes the amount of time, including delays, for data to travel from one point to another?

latency
fiber-optic cable
air
copper cable

A

latency

48
Q

What OSI physical layer term describes the measure of usable data transferred over a given period of time?

goodput
fiber-optic cable
air
copper cable

A

goodput

49
Q

What OSI physical layer term describes the physical medium which uses electrical pulses?

copper cable
fiber-optic cable
air
goodput

A

copper cable

50
Q

What OSI physical layer term describes the physical medium that uses the propagation of light?

fiber-optic cable
goodput
latency
throughput

A

fiber-optic cable

51
Q

What OSI physical layer term describes the physical medium for microwave transmissions?

air
goodput
latency
throughput

A

air

52
Q

Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is being used for the frame.
Controls the NIC responsible for sending and receiving data on the physical medium.
Implements a trailer to detect transmission errors.
Enables IPv4 and IPv6 to utilize the same network interface and media.

A
  • Controls the NIC responsible for sending and receiving data on the physical medium.
  • Implements a trailer to detect transmission errors.
53
Q

Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Provides synchronization between source and target nodes.
Integrates various physical technologies.
Communicates between the networking software at the upper layers and the device hardware at the lower layers.
Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.

A
  • Provides synchronization between source and target nodes.
  • Integrates various physical technologies.
54
Q

Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Enables IPv4 and IPv6 to utilize the same network interface and media.
Provides synchronization between source and target nodes.
Implements a trailer to detect transmission errors.
Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is being used for the frame.

A
  • Provides synchronization between source and target nodes.
  • Implements a trailer to detect transmission errors.
55
Q

Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.
Integrates various physical technologies.
Communicates between the networking software at the upper layers and the device hardware at the lower layers.
Provides synchronization between source and target nodes.

A
  • Integrates various physical technologies.
  • Provides synchronization between source and target nodes.
56
Q

Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Places information in the frame that identifies which network layer protocol is being used for the frame.
Integrates various physical technologies.
Adds Layer 2 control information to network protocol data.
Controls the NIC responsible for sending and receiving data on the physical medium.
Communicates between the networking software at the upper layers and the device hardware at the lower layers.

A
  • Integrates various physical technologies
  • Controls the NIC responsible for sending and receiving data on the physical medium.
57
Q

Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)
Controls the NIC responsible for sending and receiving data on the physical medium
Provides a mechanism to allow multiple devices to communicate over a shared medium.

A

Controls the NIC responsible for sending and receiving data on the physical medium
Provides a mechanism to allow multiple devices to communicate over a shared medium.

58
Q

Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)

Enables IPv4 and IPv6 to utilize the same network interface and media.
Places information in the frame that identifies which network layer protocol is being used for the frame.
Integrates various physical technologies.
Implements a process to delimit fields within a Layer 2 frame.
Controls the NIC responsible for sending and receiving data on the physical medium.

A
  • Enables IPv4 and IPv6 to utilize the same network interface and media.
  • Places information in the frame that identifies which network layer protocol is being used for the frame.
59
Q

Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)

Adds Layer 2 control information to network protocol data.
Places information in the frame that identifies which network layer protocol is being used for the frame.
Performs data encapsulation.
Controls the NIC responsible for sending and receiving data on the physical medium.
Integrates various physical technologies.

A
  • Adds Layer 2 control information to network protocol data.
  • Places information in the frame that identifies which network layer protocol is being used for the frame.
60
Q

Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)

Adds Layer 2 control information to network protocol data.
Enables IPv4 and IPv6 to utilize the same network interface and media.
Provides data link layer addressing.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.

A
  • Adds Layer 2 control information to network protocol data.
  • Enables IPv4 and IPv6 to utilize the same network interface and media.
61
Q

Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)

Enables IPv4 and IPv6 to utilize the same network interface and media.
Adds Layer 2 control information to network protocol data.
Integrates various physical technologies.
Implements a trailer to detect transmission errors.
Provides synchronization between source and target nodes.

A
  • Enables IPv4 and IPv6 to utilize the same network interface and media.
  • Adds Layer 2 control information to network protocol data.
62
Q

What action will occur if a switch receives a frame with the destination MAC address FF:FF:FF:FF:FF:FF?

The switch forwards it out all ports except the ingress port.
The switch shares the MAC address table entry with any connected switches.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC address is not local.

A

The switch forwards it out all ports except the ingress port.

63
Q

What action will occur if a switch receives a frame with the destination MAC address 01:00:5E:00:00:D9?

The switch forwards it out all ports except the ingress port.
The switch does not forward the frame.
The switch sends the frame to a connected router because the destination MAC address is not local.
The switch shares the MAC address table entry with any connected switches.

A

The switch forwards it out all ports except the ingress port.

64
Q

What action will occur if a host receives a frame with a destination MAC address of FF:FF:FF:FF:FF:FF?

The host will process the frame.
The host forwards the frame to the router.
The host sends the frame to the switch to update the MAC address table.
The host forwards the frame to all other hosts.

A

The host will process the frame.

65
Q

What action will occur if a switch receives a frame and does have the source MAC address in the MAC table?

The switch refreshes the timer on that entry.
The switch adds it to its MAC address table associated with the port number.
The switch forwards the frame to the associated port.
The switch sends the frame to a connected router because the destination MAC address is not local.

A

The switch refreshes the timer on that entry.

66
Q

What action will occur if a host receives a frame with a destination MAC address of FF:FF:FF:FF:FF:FF?

The host will process the frame.
The host returns the frame to the switch.
The host replies to the switch with its own IP address.
The host forwards the frame to all other hosts.

A

The host will process the frame.

67
Q

What action will occur if a host receives a frame with a destination MAC address it does not recognize?

The host will discard the frame.
The host replies to the switch with its own IP address.
The host forwards the frame to all other hosts.
The host returns the frame to the switch

A

The host will discard the frame.

68
Q

Which type of UTP cable is used to connect a PC to a switch port?

console
rollover
crossover
straight-through

A

straight-through