0% found this document useful (0 votes)
165 views10 pages

Examen 4-7

1. Modulation describes the process by which one wave modifies another wave. 2. Cordless phones and microwaves commonly affect wireless networks. 3. Network throughput can be influenced by traffic levels, encapsulation methods, traffic types, latency from devices, and WAN bandwidth.

Uploaded by

Jhon Rojas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views10 pages

Examen 4-7

1. Modulation describes the process by which one wave modifies another wave. 2. Cordless phones and microwaves commonly affect wireless networks. 3. Network throughput can be influenced by traffic levels, encapsulation methods, traffic types, latency from devices, and WAN bandwidth.

Uploaded by

Jhon Rojas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Examen cisco 2

1. What OSI physical layer term describes the process by which one wave modifies
another wave?

IEEE

EIA/TIA

air

modulation

2. Which two devices commonly affect wireless networks? (Choose two.)

external hard drives

microwaves

incandescent light bulbs

cordless phones

home theaters

Blu-ray players

3. A network administrator is measuring the transfer of bits across the company


backbone for a mission critical financial application. The administrator notices that
the network throughput appears lower than the bandwidth expected. Which three
factors could influence the differences in throughput? (Choose three.)

the amount of traffic that is currently crossing the network

the sophistication of the encapsulation method applied to the data

the type of traffic that is crossing the network

the latency that is created by the number of network devices that the data is crossing

the bandwidth of the WAN connection to the Internet

the reliability of the gigabit Ethernet infrastructure of the backbone


Examen cisco 2
4. What is a primary role of the Physical layer in transmitting data on the network?

control data access to the media

create the signals that represent the bits in each frame on to the media

determine the path packets take through the network

provide physical addressing to the devices

5. Refer to the graphic. What type of cabling is shown?

coax

fiber

UTP

STP

 Navigation Bar

6. Refer to the graphic. What type of cabling is shown?

fiber

UTP

STP

coax

7. What are two characteristics of fiber-optic


cable? (Choose two.)

It is not affected by EMI or RFI.

It is more expensive than UTP cabling is.

It combines the technique of cancellation, shielding, and twisting to protect data.

It typically contains 4 pairs of fiber-optic wires.

Each pair of cables is wrapped in metallic foil.

 Navigation Bar
8. What action will occur if a switch receives a frame and does have the source MAC
address in the MAC table?
Examen cisco 2

The switch does not forward the frame.

The switch shares the MAC address table entry with any connected switches.

The switch adds it to its MAC address table associated with the port number.

The switch refreshes the timer on that entry.

9. Which port does Switch0 use to send frames to the host with the IPv4 address
10.1.1.5?

 Fa0/1

 Fa0/5

 Fa0/9

 Fa0/11

10. Refer to the exhibit. What is wrong with the displayed termination?

The untwisted length of each wire is too long.

The wires are too thick for the connector that is used.

The woven copper braid should not have been removed.

The wrong type of connector is being used.

11. What does the term "attenuation" mean in data communication?

loss of signal strength as distance increases

leakage of signals from one cable pair to another

time for a signal to reach its destination

strengthening of a signal by a networking device

12. Refer to the exhibit. The PC is connected to the console port of the switch. All the
other connections are made through FastEthernet links. Which types of UTP cables
can be used to connect the devices?
Examen cisco 2

 1 - rollover, 2 - straight-through, 3 - crossover

 1 - crossover, 2 - rollover, 3 - straight-through

 1 - rollover, 2 - crossover, 3 - straight-through

 1 - crossover, 2 - straight-through, 3 – rollover

13. What makes fiber preferable to copper cabling for interconnecting buildings?
(Choose three.)

greater bandwidth potential

easily terminated

greater distances per cable run

limited susceptibility to EMI/RFI

lower installation cost

durable connections

 Navigation Bar

14. What is the function of the CRC value that is found in the FCS field of a frame?

to verify the logical address in the frame

to verify the physical address in the frame

to compute the checksum header for the data field in the frame

to verify the integrity of the received frame

 Navigation Bar

15. What is a characteristic of the LLC sublayer?

It defines software processes that provide services to the physical layer.


Examen cisco 2

It places information in the frame allowing multiple Layer 3 protocols to use the same
network interface and media.

It provides the logical addressing required that identifies the device.

It provides delimitation of data according to the physical signaling requirements of the


medium.

16. Which two fields or features does Ethernet examine to determine if a received frame
is passed to the data link layer or discarded by the NIC? (Choose two.)

auto-MDIX

minimum frame size

source MAC address

CEF

Frame Check Sequence

17. Which three basic parts are common to all frame types supported by the data link
layer? (Choose three.)

trailer

data

header

type field

MTU size

CRC value
Examen cisco 2
18. A network team is comparing physical WAN topologies for connecting remote sites
to a headquarters building. Which topology provides high availability and connects
some, but not all, remote sites?

hub and spoke

partial mesh

mesh

point-to-point

19. Which statement describes a characteristic of the frame header fields of the data link
layer?

They all include the flow control and logical connection fields.

Ethernet frame header fields contain Layer 3 source and destination addresses.

They include information on user applications.

They vary depending on protocols.

20. What are three ways that media access control is used in networking? (Choose
three.)

Media access control provides placement of data frames onto the media.

Networks with controlled access have reduced performance due to data collisions.

Ethernet utilizes CSMA/CD.

802.11 utilizes CSMA/CD.

Data link layer protocols define the rules for access to different media.

Contention-based access is also known as deterministic.


Examen cisco 2
21. What is contained in the trailer of a data-link frame?

data

physical address

logical address

error detection

22. What type of communication rule would best describe CSMA/CD?

message encapsulation

flow control

access method

message encoding

23. A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port
connected to a 100Base-T network. Which method of memory buffering would work
best for this task?

 port-based buffering

level 1 cache buffering

fixed configuration buffering

shared memory buffering

24. When the store-and-forward method of switching is in use, what part of the
Ethernet frame is used to perform an error check?

source MAC address in the header

CRC in the trailer

destination MAC address in the header

protocol type in the header


Examen cisco 2
25. Which switching method uses the CRC value in a frame?

cut-through

fragment-free

store-and-forward

fast-forward

26. Which advantage does the store-and-forward switching method have compared with
the cut-through switching method?

faster frame forwarding

frame error checking

collision detecting

frame forwarding using IPv4 Layer 3 and 4 information

27. A network administrator is connecting two modern switches using a straight-through


cable. The switches are new and have never been configured. Which three
statements are correct about the final result of the connection? (Choose three.)

The link between the switches will work at the fastest speed that is supported by both
switches.

The link between switches will work as full-duplex.

The connection will not be possible unless the administrator changes the cable to a
crossover cable.

The duplex capability has to be manually configured because it cannot be negotiated.

If both switches support different speeds, they will each work at their own fastest speed.

The auto-MDIX feature will configure the interfaces eliminating the need for a crossover
cable.
Examen cisco 2
28. What are two actions performed by a Cisco switch? (Choose two.)

examining the destination MAC address to add new entries to the MAC address table

forwarding frames with unknown destination IP addresses to the default gateway

building a routing table that is based on the first IP address in the frame header

using the source MAC addresses of frames to build and maintain a MAC address table

utilizing the MAC address table to forward frames via the destination MAC address

29. Which frame forwarding method receives the entire frame and performs a CRC check
to detect errors before forwarding the frame?

fragment-free switching

cut-through switching

fast-forward switching

store-and-forward switching

30. Which is a multicast MAC address?

FF-FF-FF-FF-FF-FF

00-26-0F-4B-00-3E

01-00-5E-00-00-03

5C-26-0A-4B-19-3E

31. What is the auto-MDIX feature on a switch?

the automatic configuration of full-duplex operation over a single Ethernet copper or


optical cable

the ability to turn a switch interface on or off accordingly if an active connection is


detected

the automatic configuration of an interface for a straight-through or a crossover Ethernet


cable connection

the automatic configuration of an interface for 10/100/1000 Mb/s operation


Examen cisco 2

32. Which two statements describe features or functions of the logical link control
sublayer in Ethernet standards? (Choose two.)

The LLC sublayer adds a header and a trailer to the data.

Logical link control is specified in the IEEE 802.3 standard.

Logical link control is implemented in software.

The LLC sublayer is responsible for the placement and retrieval of frames on and off the
media.

The data link layer uses LLC to communicate with the upper layers of the protocol suite.

33. What is one advantage of using the cut-through switching method instead of the
store-and-forward switching method?

has a lower latency appropriate for high-performance computing applications

provides the flexibility to support any mix of Ethernet speeds

makes a fast forwarding decision based on the source MAC address of the frame

has a positive impact on bandwidth by dropping most of the invalid frames

34. Which two functions are performed at the LLC sublayer of the OSI data link layer?
(Choose two.)

Integrates various physical technologies.

Implements a process to delimit fields within a Layer 2 frame.

Controls the NIC responsible for sending and receiving data on the physical medium.

Enables IPv4 and IPv6 to utilize the same network interface and media.

Places information in the frame that identifies which network layer protocol is being used
for the frame.

You might also like