1. Trang chủ
  2. » Công Nghệ Thông Tin

CCNA 1 and 2 Companion Guide, Revised (Cisco Networking Academy Program) part 105 potx

10 343 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 10
Dung lượng 159,94 KB

Nội dung

Appendix C Check Your Understanding Answer Key This appendix contains the answers to the Check Your Understanding review questions at the end of each chapter. Chapter 1 1. The connection to the Internet can be broken down into which of the following? D. All of the above 2. What is the main circuit board of a computer? B. Motherboard 3. What are PCMCIA slots? A. Slots used in laptops 4. What is a NIC? B. A printed circuit board that provides network communication 5. Which of the following is/are the resource(s) you need before you install a NIC? D. All of the above 6. Which number system is based on powers of 2? C. Binary 1102.book Page 1009 Tuesday, May 20, 2003 2:53 PM 1010 Appendix C: Check Your Understanding Answer Key 7. Match the following terms with their definitions: 1. Bit 2. Byte 3. kbps 4. MHz A. The smallest unit of data in a computer B. A standard measurement of the rate at which data is transferred over a network connection C. A unit of frequency; the rate of change in the state or cycle in a sound wave, alternating current, or another cyclical waveform D. A unit of measure that describes the size of a data file, the amount of space on a disk or another storage medium, or the amount of data being trans- ferred over a network Answers: 1-A, 2-D, 3-B, 4-C 8. What is the largest decimal value that can be stored in 1 byte? C. 255 9. What is the decimal number 151 in binary? B. 10010111 10. What is the binary number 11011010 in decimal? C. 218 11. What is the binary number 0010000100000000 in hexadecimal? A. 0x2100 12. What is the hexadecimal number 0x2101 in binary? A. 0010 0001 0000 0001 13. Which of the following statements is true of ping? D. All of the above 1102.book Page 1010 Tuesday, May 20, 2003 2:53 PM Chapter 2 1011 Chapter 2 1. What was the first type of microcomputer network to be implemented? C. LAN 2. Using modem connections, how many modems would it take to allow connections from ten computers? C. Ten 3. What is a code that is “burned in” to a network interface card? B. MAC address 4. Which topology has all its nodes connected directly to one center point and has no other connections between nodes? C. Star 5. What do TIA and EIA stand for? B. Telecommunications Industry Association, Electronic Industries Alliance 6. LANs are designed to do which of the following? (Select all that apply.) A. Operate within a limited geographic area B. Allow many users to access high-bandwidth media D. Provide full-time connectivity to local services 7. Which of the following statements best describes a WAN? A. It connects LANs that are separated by a large geographic area. 8. Which of the following statements correctly describes a MAN? C. A MAN is a network that spans a metropolitan area such as a city or suburban area. 9. Which of the following is not one of the features of a SAN? D. SANs minimize system and data availability. 10. What service offers secure, reliable connectivity over a shared public network infrastructure? B. Virtual private network 1102.book Page 1011 Tuesday, May 20, 2003 2:53 PM 1012 Appendix C: Check Your Understanding Answer Key 11. What links enterprise customer headquarters, remote offices, and branch offices to an internal network over a shared infrastructure? B. Intranet VPN 12. What is the name of the part of a company’s LAN that is made available to select parties such as employees, customers, and partners? B. The extranet 13. What is the movement of objects through layers? B. Flow 14. The OSI model has how many layers? D. Seven 15. What is the OSI model? D. All of the above 16. Which of the following is the correct order of the network layers? B. 1: Physical 2: Data link 3: Network 4: Transport 5: Session 6: Presentation 7: Application 17. Which layer of the OSI model handles physical addressing, network topology, network access, and flow control? B. The data link layer 18. Which of the following best defines encapsulation? D. Wrapping data in a particular protocol header 1102.book Page 1012 Tuesday, May 20, 2003 2:53 PM Chapter 2 1013 19. An e-mail message is sent from Host A to Host B on a LAN. Before this message can be sent, the data must be encapsulated. Which of the following best describes what happens after a packet is constructed? B. The packet is put into a frame. 20. In the TCP/IP model, which layer deals with reliability, flow control, and error correction? B. Transport 21. Repeaters can provide a simple solution for what problem? D. Too many nodes or not enough cable 22. Which of the following is true of a bridge and its forwarding decisions? C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions. 23. Which of the following is true of a switch’s function? B. Switches combine the connectivity of a hub with the traffic regulation of a bridge. 24. What does a router route? C. Layer 3 packets 25. Which of the following statements is true? C. A DSLAM serves as the interface point of between a number of subscriber premises and the carrier network. 26. What is/are the function(s) of an AAA server? (Select all that apply.) D. All of the above 27. What is/are the function(s) of a firewall? (Select all that apply.) A. Software-based B. Hardware-based C. Filter traffic 1102.book Page 1013 Tuesday, May 20, 2003 2:53 PM 1014 Appendix C: Check Your Understanding Answer Key Chapter 3 1. Match the columns: 1) Neutrons A) Particles that have a negative charge 2) Protons B) Particles that have no charge (neutral) 3) Electrons C) Particles that have a positive charge C. 1-B, 2-C, 3-A 2. Which of the following regarding electricity is untrue? D. None of the above. 3. Match the following to their respective units of measurement: 1) Voltage A) Ohm 2) Current B) Ampere 3) Resistance C) Volt D. 1-C, 2-B, 3-A 4. Electrons flow in loops called . D. Closed, circuits 5. What is the maximum cable length for STP? C. 100 meters 6. How many pairs of wires make up a UTP cable? B. 4 7. Which connector does UTP use? C. RJ-45 8. What is an advantage that coaxial cable has over STP or UTP? C. It can run for a longer distance unboosted. 9. What does the twisting of the wires do in a twisted-pair cable? C. It reduces noise problems. 10. What is the importance of the EIA/TIA standards? Select all that apply. B. They provide guidelines for manufacturers to follow to ensure compatibility. C. They provide the minimum media requirements for multiproduct and multi- vendor environment. 1102.book Page 1014 Tuesday, May 20, 2003 2:53 PM Chapter 4 1015 11. A fiber-optic cable transmits multiple streams of LED-generated light. A. Multimode 12. What is one advantage of using fiber-optic cable in networks? D. It is capable of higher data rates than either coaxial or twisted-pair cable. 13. Which fiber-optic cable type is typically used for outside installations? D. Loose-tube 14. What is the light source typically used in single-mode fiber optics? B. Laser 15. Which term describes the angle at which a ray hits a glass surface? C. Angle of incidence 16. Modulation is a process of changing amplitude, frequency, or phase. Which acronym does not represent a type of modulation? D. RM 17. Which range does not correctly identify an unlicensed wireless frequency? C. 9 GHz 18. Which statement does not describe a benefit of spread spectrum? A. Spread-spectrum transmissions are transmitted at high speeds. 19. Which statement does not describe the features of direct-sequence spread spectrum (DSSS)? C. DSSS technology has low throughput of data and short-range access. 20. Which of the following is not a feature of wired equivalent privacy (WEP)? C. WEP is a security mechanism defined within in the 802.3 standards. Chapter 4 1. Which of the following is an 802.3u specification? C. 100BASE-TX 2. Which of the following is the most appropriate choice for Ethernet connectivity? C. Use Fast Ethernet as a link between the user level and network devices to support the aggregate traffic from each Ethernet segment on the access link. 1102.book Page 1015 Tuesday, May 20, 2003 2:53 PM 1016 Appendix C: Check Your Understanding Answer Key 3. Which standards body created the cables and connector specification used to support Ethernet implementation? C. TIA/EIA 4. Which of the following statements does not correctly describe a media connector? A. An RJ-45 connector is an 8-pin connector used mainly for terminating coax- ial cable. 5. For which of the following would you not need to provide a crossover cable? B. Connecting routers to switches 6. Which technology is not a type of wireless communication? B. Wideband 7. Which of the following is not a feature of wired equivalent privacy (WEP)? B. WEP is a security mechanism defined within in the 802.3 standards. 8. Which of the following is not a WAN implementation? D. Ethernet 9. What type of data-transmission method is used by a WAN? B. Serial 10. What best describes a DCE? D. Devices that make up the network end of the user-to-network interface 11. Which of the following media is used to interconnect the ISDN BRI port to the service-provider device? A. CAT 5 UTP straight-through 12. What type of connector is used for DSL connection? B. RJ-11 13. What type of connector is used to connect a router and a cable system? C. F 14. What type of cable is used to connect a terminal and a console port? B. Rollover 1102.book Page 1016 Tuesday, May 20, 2003 2:53 PM Chapter 5 1017 Chapter 5 1. Which of the following is not one of the recognized IEEE sublayers? B. Data Link Control 2. The recognized IEEE sublayers are concerned with what layers of the OSI reference model? B. 1 and 2 3. The LLC, as a sublayer, participates in the process. B. Encapsulation 4. The first six hexadecimal numbers in a MAC address represent an ? B. Organizationally unique identifier 5. MAC addresses are bits in length. C. 48 6. What is the name of the access method used in Ethernet that explains how Ethernet works? B. CSMA/CD 7. Where does the MAC address reside? C. NIC 8. Which of the following statements best describes communication between two devices on a LAN? A. The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it, but the devices with nonmatching addresses otherwise ignore the frame. 9. Which functions are associated with framing? D. All of the above 10. How does a computer on a LAN detect an error in a frame? C. It compares an FCS in the frame to one that the computer calculates from the contents of the frame. 11. Media Access Control refers to what? C. Protocols that determine which computer on a shared-medium environment is allowed to transmit the data 1102.book Page 1017 Tuesday, May 20, 2003 2:53 PM 1018 Appendix C: Check Your Understanding Answer Key 12. Which best describes a CSMA/CD network? A. One node’s transmission traverses the entire network and is received and examined by every node. 13. In an Ethernet or IEEE 802.3 LAN, when do collisions occur? B. When two stations listen for a traffic, hear none, and transmit simultaneously 14. Which is an important Layer 2 data link layer function? D. All of the above 15. Which of the following is an Ethernet frame error type? D. All of the above 16. Which protocol is a nondeterministic protocol? B. CSMA/CD 17. Which is true of a deterministic MAC protocol? C. It allows hosts to “take turns” sending data. 18. The network area within which data packets originated and collide is called a ? A. Collision domain 19. Which best describes broadcasting? A. Sending a single frame to many stations at the same time 20. Using repeaters the collision domain. C. Extends 21. The process of using the complex networking devices, such as bridges, switches, and routers, to break up the collision domains is known as: B. Segmentation Chapter 6 1. What is the name of the method used in Ethernet that explains how Ethernet works? B. CSMA/CD 1102.book Page 1018 Tuesday, May 20, 2003 2:53 PM . network Answers: 1- A, 2- D, 3-B, 4-C 8. What is the largest decimal value that can be stored in 1 byte? C. 25 5 9. What is the decimal number 15 1 in binary? B. 10 010 111 10 . What is the binary number 11 011 010 . 11 011 010 in decimal? C. 21 8 11 . What is the binary number 0 010 00 010 0000000 in hexadecimal? A. 0x 21 0 0 12 . What is the hexadecimal number 0x 21 0 1 in binary? A. 0 010 00 01 0000 00 01 13. Which of the following. ping? D. All of the above 11 02. book Page 10 10 Tuesday, May 20 , 20 03 2: 53 PM Chapter 2 10 11 Chapter 2 1. What was the first type of microcomputer network to be implemented? C. LAN 2. Using modem connections,

Ngày đăng: 04/07/2014, 18:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN