• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back
Which of the following is NOT one of the recognized IEEE sublayers?

A. Media Access Control
B. Data Link Control
C. Logical Link Control
D. None of the above
B. Data Link Control
The recognized IEEE 802.3 sublayers are concerned with what layers of the OSI reference model?

A. 2 and 3
B. 1 and 2
C. 3 and 4
D. 1 and 3
B. 1 and 2
The LLC, as a sublayer, participates in which process?

A. Encryption
B. Encapsulation
C. Framing
D. All of the above
B. Encapsulation
What do the first six hexadecimal numbers in a MAC address represent?

A. Interface serial number
B. Organizationally unique identifier
C. Interface unique identifier
D. None of the above
B. Organizationally unique identifier
MAC addresses are how many bits in length?

A. 12
B. 24
C. 48
D. 64
C. 48
What is the name of the access method used in Ethernet that expains how Ethernet works?

A. TCP/IP
B. CSMA/CD
C. CMDA/CS
D. CSMA/CA
B. CSMA/CD
Where does the MAC address reside?

A. Transceiver
B. Computer BIOS
C. NIC
D. CMOS
C. NIC
Which of the following statements best describes communication between two devices on a LAN?

A. The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it, but the devices with nonmatching addresses otherwise ignore the frame.

B. The source encapsulates the data and places a destination MAC address in the frame. It puts the frame on the LAN, where only the device with the matching address can check the address field.

C. The destination device encapsulates data in a frame with the MAC address of the source device and puts it on the LAN. The device with the matching address removes the frame.

D. Each device on the LAN receives the frame and passes it up to the computer, where software decides whether to keep or to discard the frame.
A. The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it, but the devices with nonmatching addresses otherwise ignore the frame.
Which functions are associated with framing?

A. Identifies which computers are communicating with one another

B. Signals when communication between individual computers begins and when it ends

C. Flags corrupted frames

D. All of the above
D. All of the above

A. Identifies which computers are communicating with one another

B. Signals when communication between individual computers begins and when it ends

C. Flags corrupted frames
Media Access Control refers to what?

A. The state in which a NIC has captured the networking medium and is ready to transmit

B. Rules that govern media capture and release

C. Rules that determine which computer on a shared-medium environment is allowed to transmit the data

D. A formal byte sequence that has been transmitted
C. Rules that determine which computer on a shared-medium environment is allowed to transmit the data
Which best describes a CSMA/CD network?

A. One node's transmission traverses the entire network and is received and examined by evry node.

B. Signals are sent directly to the destination if the source knows both the MAC and IP addresses.

C. One node's transmission goes to the enarest router, which sends it directly to the destination.

D. Signals always are sent in broadcast mode.
A. One node's transmission traverses the entire network and is received and examined by evry node.
In an Ethernet or IEEE 802.3 LAN, when do collisions occur?

A. When one node places a packet on a network without informing the other nodes

B. When two stations listen for traffic, hear none, and transmit simultaneously

C. When two network nodes send packets to a node that no longer is broadcasting

D. When jitter is detected and traffic is disrupted during normal transmission
B. When two stations listen for traffic, hear none, and transmit simultaneously
Which is an important Layer 2 data link layer function?

A. Logical link control
B. Addressing
C. Media access control
D. All of the above
D. All of the above

A. Logical link control
B. Addressing
C. Media access control
Which is true of a deterministic MAC protocol?

A. It defines collisions and specifies what to do about them.

B. It allows the hub to determine the number of users active at any one time.

C. It allows bosts to "take turns" sending data.

D. It allows the use of a "take stick" by network administrators to control the media access of any users considered "troublemaker."
C. It allows bosts to "take turns" sending data.