CCNA 1 v7

Modules 4 – 7: Ethernet Concepts Exam Answers

Modules 4 – 7: Ethernet Concepts Exam Answers Full
1. What will a host on an Ethernet network do if it receives a frame with a destination MAC address that does not match its own MAC address?

  • It will discard the frame.
  • It will forward the frame to the next host.
  • It will remove the frame from the media.
  • It will strip off the data-link frame to check the destination IP address.

2. What is auto-MDIX?

  • a type of Cisco switch
  • an Ethernet connector type
  • a type of port on a Cisco switch
  • a feature that detects Ethernet cable typ​e

3. Which two functions or operations are performed by the MAC sublayer? (Choose two.)

  • It is responsible for Media Access Control.
  • It performs the function of NIC driver software.
  • It adds a header and trailer to form an OSI Layer 2 PDU.
  • It handles communication between upper and lower layers.
  • It adds control information to network protocol layer data.

4. What type of address is 01-00-5E-0A-00-02?

  • an address that reaches every host inside a local subnet
  • an address that reaches one specific host
  • an address that reaches every host in the network
  • an address that reaches a specific group of hosts

5. Which type of UTP cable is used to connect a PC to a switch port?

  • console
  • rollover
  • crossover
  • straight-through

6. What is the definition of bandwidth?

  • the measure of the transfer of bits across the media over a given period of time
  • the speed at which bits travel on the network
  • the amount of data that can flow from one place to another in a given amount of time
  • the measure of usable data transferred over a given period of time

7. Which statement correctly describes frame encoding?

  • It uses the characteristic of one wave to modify another wave.
  • It transmits data signals along with a clock signal which occurs at evenly spaced time durations.
  • It generates the electrical, optical, or wireless signals that represent the binary numbers of the frame.
  • It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits.

8. What is a characteristic of UTP cabling?

  • cancellation
  • cladding
  • immunity to electrical hazards
  • woven copper braid or metallic foil

9. A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What are two possible causes of the signal distortion? (Choose two.)

  • the microwave oven
  • the large number of trees that surround the office
  • the cellular phones that are used by the employees
  • the elevated location where the wireless LAN was installed
  • the number of wireless devices that are used in the wireless LAN

10. What is indicated by the term throughput?

  • the guaranteed data transfer rate offered by an ISP
  • the capacity of a particular medium to carry data
  • the measure of the usable data transferred across the media
  • the measure of the bits transferred across the media over a given period of time
  • the time it takes for a message to get from sender to receiver

11. What is one advantage of using fiber optic cabling rather than copper cabling?

  • It is usually cheaper than copper cabling.
  • It is able to be installed around sharp bends.
  • It is easier to terminate and install than copper cabling.
  • It is able to carry signals much farther than copper cabling.

12. Which standards organization oversees development of wireless LAN standards?

  • IANA
  • IEEE
  • ISO
  • TIA

13. A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?

  • The end-user device only has an Ethernet NIC.
  • The end-user device requires a dedicated connection because of performance requirements.
  • The end-user device needs mobility when connecting to the network.
  • The end-user device area has a high concentration of RFI.

14. A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?

  • presentation layer
  • network layer
  • physical layer
  • data link layer

15. What type of cable is used to connect a workstation serial port to a Cisco router console port?

  • crossover
  • rollover
  • straight-through
  • coaxial

16. What is the binary representation for the decimal number 173?

  • 10100111
  • 10100101
  • 10101101
  • 10110101

17. Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format?

  • 234.17.10.9
  • 234.16.12.10
  • 236.17.12.6
  • 236.17.12.10

18. How many binary bits exist within an IPv6 address?

  • 32
  • 48
  • 64
  • 128
  • 256

19. What is the binary equivalent of the decimal number 232?

  • 11101000
  • 11000110
  • 10011000
  • 11110010

20. Which two statements are correct about IPv4 and IPv6 addresses? (Choose two.)

  • IPv6 addresses are represented by hexadecimal numbers.
  • IPv4 addresses are represented by hexadecimal numbers.
  • IPv6 addresses are 32 bits in length.
  • IPv4 addresses are 32 bits in length.
  • IPv4 addresses are 128 bits in length.
  • IPv6 addresses are 64 bits in length.

21. Which IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14?

  • binary
  • dotted decimal
  • hexadecimal
  • ASCII

22. What is the dotted decimal representation of the IPv4 address 11001011.00000000.01110001.11010011?

  • 192.0.2.199
  • 198.51.100.201
  • 203.0.113.211
  • 209.165.201.223

23. What is the decimal equivalent of the binary number 10010101?

  • 149
  • 157
  • 168
  • 192

24. What is the decimal equivalent of the hex number 0x3F?

  • 63
  • 77
  • 87
  • 93

25. What is the dotted decimal representation of the IPv4 address which is represented as the binary string 00001010.01100100.00010101.00000001?

  • 10.100.21.1
  • 10.10.20.1
  • 100.10.11.1
  • 100.21.10.1

26. What is the decimal equivalent of 0xC9?

  • 185
  • 200
  • 201
  • 199

27. Which is a valid hexadecimal number?

  • f
  • g
  • h
  • j

28. What is the binary representation of 0xCA?

  • 10111010
  • 11010101
  • 11001010
  • 11011010

29. How many bits are in an IPv4 address?

  • 32
  • 64
  • 128
  • 256

30. What identifier is used at the data link layer to uniquely identify an Ethernet device?

  • IP address
  • MAC address
  • sequence number
  • TCP port number
  • UDP port number

31. Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)

  • International Organization for Standardization (ISO)
  • Internet Assigned Numbers Authority (IANA)
  • International Telecommunication Union (ITU)
  • Electronic Industries Alliance (EIA)
  • Internet Society (ISOC)

32. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

  • application
  • transport
  • data link
  • physical

33. What is true concerning physical and logical topologies?

  • The logical topology is always the same as the physical topology.
  • Physical topologies are concerned with how a network transfers frames.
  • Physical topologies display the IP addressing scheme of each network.
  • Logical topologies refer to how a network transfers data between devices.

34. What type of physical topology can be created by connecting all Ethernet cables to a central device?

  • bus
  • ring
  • star
  • mesh

35. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

  • bus
  • hierarchical
  • mesh
  • ring
  • star

36. Which statement describes the half-duplex mode of data transmission?

  • Data that is transmitted over the network can only flow in one direction.
  • Data that is transmitted over the network flows in one direction at a time.
  • Data that is transmitted over the network flows in one direction to many different destinations simultaneously.
  • Data that is transmitted over the network flows in both directions at the same time.

37. Which is a function of the Logical Link Control (LLC) sublayer?

  • to define the media access processes that are performed by the hardware
  • to provide data link layer addressing
  • to identify which network layer protocol is being used
  • to accept segments and package them into data units that are called packets

38. Which data link layer media access control method does Ethernet use?

  • CSMA/CD
  • determinism
  • turn taking
  • token passing

39. What are the two sublayers of the OSI model data link layer? (Choose two.)

  • internet
  • physical
  • LLC
  • transport
  • MAC
  • network access

40. What method is used to manage contention-based access on a wireless network?

  • CSMA/CD
  • priority ordering
  • CSMA/CA
  • token passing

41. What are two services performed by the data link layer of the OSI model? (Choose two.)

  • It encrypts data packets.
  • It determines the path to forward packets.
  • It accepts Layer 3 packets and encapsulates them into frames.
  • It provides media access control and performs error detection.
  • It monitors the Layer 2 communication by building a MAC address table.

42. What does a router do after de-encapsulating a received frame?

  • determines the best path
  • de-encapsulates the frame
  • re-encapsulates the packet into a new frame
  • forwards the new frame onto the network medium

43. What attribute of a NIC would place it at the data link layer of the OSI model?

  • attached Ethernet cable
  • IP address
  • MAC address
  • RJ-45 port
  • TCP/IP protocol stack

44. Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?

  • the virtually unlimited availability of IPv6 addresses
  • the use of CSMA/CA
  • the use of full-duplex capable Layer 2 switches
  • the development of half-duplex switch operation
  • the use of Gigabit Ethernet speeds

45. Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?

  • repeater
  • hub
  • switch
  • router

46. Which network device has the primary function to send data to a specific destination based on the information found in the MAC address table?

  • hub
  • router
  • switch
  • modem

47. Which function or operation is performed by the LLC sublayer?

  • It performs data encapsulation.
  • It communicates with upper protocol layers.
  • It is responsible for media access control.
  • It adds a header and trailer to a packet to form an OSI Layer 2 PDU.

48. Which statement is true about MAC addresses?

  • MAC addresses are implemented by software.
  • A NIC only needs a MAC address if connected to a WAN.
  • The first three bytes are used by the vendor assigned OUI.
  • The ISO is responsible for MAC addresses regulations.

49. What happens to runt frames received by a Cisco Ethernet switch?

  • The frame is dropped.
  • The frame is returned to the originating network device.
  • The frame is broadcast to all other devices on the same network.
  • The frame is sent to the default gateway.

50. What are the two sizes (minimum and maximum) of an Ethernet frame? (Choose two.)

  • 56 bytes
  • 64 bytes
  • 128 bytes
  • 1024 bytes
  • 1518 bytes

51. What addressing information is recorded by a switch to build its MAC address table?

  • the destination Layer 3 address of incoming packets
  • the destination Layer 2 address of outgoing frames
  • the source Layer 3 address of outgoing packets
  • the source Layer 2 address of incoming frames

52. Which two characteristics describe Ethernet technology? (Choose two.)

  • It is supported by IEEE 802.3 standards.
  • It is supported by IEEE 802.5 standards.
  • It typically uses an average of 16 Mb/s for data transfer rates.
  • It uses the CSMA/CD access control method.
  • It uses a ring topology.

53. What statement describes a characteristic of MAC addresses?

  • They must be globally unique.
  • They are only routable within the private network.
  • They are added as part of a Layer 3 PDU.
  • They have a 32-bit binary value.

54. What is the special value assigned to the first 24 bits of a multicast MAC address?

  • 01-5E-00
  • FF-00-5E
  • FF-FF-FF
  • 01-00-5E

Related Articles

Leave a Reply

avatar
Photo and Image Files
 
 
 
Audio and Video Files
 
 
 
Other File Types
 
 
 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  Subscribe  
Notify of
Back to top button
Close

Send this to a friend