Skip to document

cisco quiz Module 4 - 7

web system cisco quiz Module 4,5,6,7
Course

Web Systems (031268 )

180 Documents
Students shared 180 documents in this course
Academic year: 2020/2021
Uploaded by:
Anonymous Student
This document has been uploaded by a student, just like you, who decided to remain anonymous.
University of Technology Sydney

Comments

Please sign in or register to post comments.

Related Studylists

module 4

Preview text

December 18, 2019

CCNA 1 v7 Modules 4 – 7: Ethernet Concepts Exam Answers

itexamanswers /ccna-1-v7-modules-4-7-ethernet-concepts-exam-answers

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

Introduction to Networks ( Version 7) – Modules 4 – 7: Ethernet

Concepts Exam

1. What is the purpose of the OSI physical layer?

controlling access to media transmitting bits across the local media performing error detection on received frames exchanging frames between nodes over physical network media

2. Why are two strands of fiber used for a single fiber optic connection?

The two strands allow the data to travel for longer distances without degrading. They prevent crosstalk from causing interference on the connection. They increase the speed at which the data can travel. They allow for full-duplex connectivity.

3. Which characteristic describes crosstalk?

the distortion of the network signal from fluorescent lighting the distortion of the transmitted messages from signals carried in adjacent wires the weakening of the network signal over long cable lengths the loss of wireless signal over excessive distance from the access point

4. Which procedure is used to reduce the effect of crosstalk in copper cables?

requiring proper grounding connections twisting opposing circuit wire pairs together wrapping the bundle of wires with metallic shielding designing a cable infrastructure to avoid crosstalk interference avoiding sharp bends during installation

5. Match the situation with the appropriate use of network media.

6. A network administrator is measuring the transfer of bits across the company backbone for a mission critical financial application. The administrator notices that the network throughput appears lower than the bandwidth expected. Which three factors could influence the differences in throughput? (Choose three.)

the amount of traffic that is currently crossing the network the sophistication of the encapsulation method applied to the data the type of traffic that is crossing the network the latency that is created by the number of network devices that the data is crossing the bandwidth of the WAN connection to the Internet the reliability of the gigabit Ethernet infrastructure of the backbone

Explanation: Throughput usually does not match the specified bandwidth of physical links due to multiple factors. These factors include, the amount of traffic, type of traffic, and latency created by the network devices the data has to cross.

7. What are two characteristics of fiber-optic cable? (Choose two.) It is not affected by EMI or RFI. Each pair of cables is wrapped in metallic foil. It combines the technique of cancellation, shielding, and twisting to protect data. It typically contains 4 pairs of fiber-optic wires. It is more expensive than UTP cabling is.

Fiber cable is a flexible, extremely thin, transparent strand of glass surrounded by plastic insulation.

11. In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

crosstalk bandwidth size of the network signal modulation technique electromagnetic interference

Explanation: Copper media is widely used in network communications. However, copper media is limited by distance and signal interference. Data is transmitted on copper cables as electrical pulses. The electrical pulses are susceptible to interference from two sources:

Electromagnetic interference (EMI) or radio frequency interference (RFI) – EMI and RFI signals can distort and corrupt the data signals being carried by copper media. Crosstalk – Crosstalk is a disturbance caused by the electric or magnetic fields of a signal on one wire interfering with the signal in an adjacent wire.

12. Refer to the graphic. What type of cabling is shown?

STP UTP coax fiber

13. Which two devices commonly affect wireless networks? (Choose two.)

Blu-ray players home theaters cordless phones microwaves incandescent light bulbs external hard drives

Explanation: Radio Frequency Interference (RFI) is the interference that is caused by radio transmitters and other devices that are transmitting in the same frequency.

14. Which two statements describe the services provided by the data link layer? (Choose two.)

It defines the end-to-end delivery addressing scheme.

It maintains the path between the source and destination devices during the data transmission. It manages the access of frames to the network media. It provides reliable delivery through link establishment and flow control. It ensures that application data will be transmitted according to the prioritization. It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.

Explanation: The data link layer is divided into two sub layers, namely Logical Link Control (LLC) and Media Access Control (MAC). LLC forms a frame from the network layer PDU into a format that conforms to the requirements of the network interface and media. A network layer PDU might be for IPv4 or IPv6. The MAC sub layer defines the media access processes performed by the hardware. It manages the frame access to the network media according to the physical signaling requirements (copper cable, fiber optic, wireless, etc.)

15. What is the function of the CRC value that is found in the FCS field of a frame?

to verify the integrity of the received frame to verify the physical address in the frame to verify the logical address in the frame to compute the checksum header for the data field in the frame

16. What is contained in the trailer of a data-link frame?

logical address physical address data error detection

17. Which statement describes a characteristic of the frame header fields of the data link layer?

They all include the flow control and logical connection fields. Ethernet frame header fields contain Layer 3 source and destination addresses. They vary depending on protocols. They include information on user applications.

Explanation: All data link layer protocols encapsulate the Layer 3 PDU within the data field of the frame. However, the structure of the frame and the fields that are contained in the header vary according to the protocol. Different data link layer protocols may use different fields, like priority/quality of service, logical connection control, physical link control, flow control, and congestion control.

Each end system is connected to its respective neighbor via an intermediate device. All end and intermediate devices are connected in a chain to each other.

Explanation: In an extended star topology, central intermediate devices interconnect other star topologies.

22. What is a characteristic of the LLC sublayer?

It provides the logical addressing required that identifies the device. It provides delimitation of data according to the physical signaling requirements of the medium. It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media. It defines software processes that provide services to the physical layer.

23. What are three ways that media access control is used in networking? (Choose three.)

Ethernet utilizes CSMA/CD. Media access control provides placement of data frames onto the media. Contention-based access is also known as deterministic. 802 utilizes CSMA/CD. Data link layer protocols define the rules for access to different media. Networks with controlled access have reduced performance due to data collisions.

24. During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network?

An IP address is added. The logical address is added. The physical address is added. The process port number is added.

Explanation: The Ethernet frame includes the source and destination physical address. The trailer includes a CRC value in the Frame Check Sequence field to allow the receiving device to determine if the frame has been changed (has errors) during the transmission.

25. What three items are contained in an Ethernet header and trailer? (Choose three.)

source IP address source MAC address destination IP address destination MAC address

error-checking information

Explanation: Layer 2 headers contain the following:

Frame start and stop indicator flags at the beginning and end of a frame Addressing – for Ethernet networks this part of the header contains source and destination MAC addresses Type field to indicate what Layer 3 protocol is being used Error detection to determine if the frame arrived without error

26. What type of communication rule would best describe CSMA/CD?

access method flow control message encapsulation message encoding

Explanation: Carrier sense multiple access collision detection (CSMA/CD) is the access method used with Ethernet. The access method rule of communication dictates how a network device is able to place a signal on the carrier. CSMA/CD dictates those rules on an Ethernet network and CSMA/CA dictates those rules on an 802 wireless LAN.

27. Which three basic parts are common to all frame types supported by the data link layer? (Choose three.)

header type field MTU size data trailer CRC value

Explanation: The data link protocol is responsible for NIC-to-NIC communications within the same network. Although there are many different data link layer protocols that describe data link layer frames, each frame type has three basic parts:

Header Data Trailer

28. Which statement is true about the CSMA/CD access method that is used in Ethernet?

When a device hears a carrier signal and transmits, a collision cannot occur. A jamming signal causes only devices that caused the collision to execute a backoff algorithm.

port-based buffering level 1 cache buffering shared memory buffering fixed configuration buffering

Explanation: With shared memory buffering, the number of frames stored in the buffer is restricted only by the of the entire memory buffer and not limited to a single port buffer. This permits larger frames to be transmitted with fewer dropped frames. This is important to asymmetric switching, which applies to this scenario, where frames are being exchanged between ports of different rates. With port-based memory buffering, frames are stored in queues that are linked to specific incoming and outgoing ports making it possible for a single frame to delay the transmission of all the frames in memory because of a busy destination port. Level 1 cache is memory used in a CPU. Fixed configuration refers to the port arrangement in switch hardware.

32. What are two examples of the cut-through switching method? (Choose two.) store-and-forward switching fast-forward switching CRC switching fragment-free switching QOS switching

Explanation: Store-and forward switching accepts the entire frame and performs error checking using CRC before forwarding the frame. Store-and-forward is often required for QOS analysis. Fast-forward and fragment-free are both variations of the cut-through switching method where only part of the frame is received before the switch begins to forward it.

33. Which frame forwarding method receives the entire frame and performs a CRC check to detect errors before forwarding the frame? cut-through switching store-and-forward switching fragment-free switching fast-forward switching

Explanation: Fast-forward and fragment-free switching are variations of cut-through switching, which begins to forward the frame before the entire frame is received.

34. What is the purpose of the FCS field in a frame?

to obtain the MAC address of the sending node to verify the logical address of the sending node to compute the CRC header for the data field

to determine if errors occurred in the transmission and reception

Explanation: The FCS field in a frame is used to detect any errors in the transmission and receipt of a frame. This is done by comparing the CRC value within the frame against a computed CRC value of the frame. If the two values do not match, then the frame is discarded.

35. Which switching method has the lowest level of latency?

cut-through store-and-forward fragment-free fast-forward

Explanation: Fast-forward switching begins to forward a frame after reading the destination MAC address, resulting in the lowest latency. Fragment-free reads the first 64 bytes before forwarding. Store-and-forward has the highest latency because it reads the entire frame before beginning to forward it. Both fragment-free and fast-forward are types of cut-through switching.

36. A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.)

The link between the switches will work at the fastest speed that is supported by both switches. The link between switches will work as full-duplex. If both switches support different speeds, they will each work at their own fastest speed. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable. The connection will not be possible unless the administrator changes the cable to a crossover cable. The duplex capability has to be manually configured because it cannot be negotiated.

Explanation: Modern switches can negotiate to work in full-duplex mode if both switches are capable. They will negotiate to work using the fastest possible speed and the auto-MDIX feature is enabled by default, so a cable change is not needed.

37. Which advantage does the store-and-forward switching method have compared with the cut-through switching method?

collision detecting frame error checking faster frame forwarding

utilizing the MAC address table to forward frames via the destination MAC address examining the destination MAC address to add new entries to the MAC address table

Explanation: Important actions that a switch performs are as follows:

When a frame comes in, the switch examines the Layer 2 source address to build and maintain the Layer 2 MAC address table. It examines the Layer 2 destination address to determine how to forward the frame. When the destination address is in the MAC address table, then the frame is sent out a particular port. When the address is unknown, the frame is sent to all ports that have devices connected to that network.

41. Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.)

Logical link control is implemented in software. Logical link control is specified in the IEEE 802 standard. The LLC sublayer adds a header and a trailer to the data. The data link layer uses LLC to communicate with the upper layers of the protocol suite. The LLC sublayer is responsible for the placement and retrieval of frames on and off the media.

Explanation: Logical link control is implemented in software and enables the data link layer to communicate with the upper layers of the protocol suite. Logical link control is specified in the IEEE 802 standard. IEEE 802 is a suite of standards that define the different Ethernet types. The MAC (Media Access Control) sublayer is responsible for the placement and retrieval of frames on and off the media. The MAC sublayer is also responsible for adding a header and a trailer to the network layer protocol data unit (PDU).

42. What is the auto-MDIX feature?

It enables a device to automatically configure an interface to use a straight-through or a crossover cable. It enables a device to automatically configure the duplex settings of a segment. It enables a device to automatically configure the speed of its interface. It enables a switch to dynamically select the forwarding method.

Explanation: The auto-MDIX feature allows the device to configure its network port according to the cable type that is used (straight-through or crossover) and the type of device that is connected to that port. When a port of a switch is configured with auto- MDIX, this switch can be connected to another switch by the use of either a straight- through cable or a crossover cable.

43. What is one advantage of using the cut-through switching method instead of the store-and-forward switching method? has a positive impact on bandwidth by dropping most of the invalid frames makes a fast forwarding decision based on the source MAC address of the frame has a lower latency appropriate for high-performance computing applications​ provides the flexibility to support any mix of Ethernet speeds

Explanation: Cut-through switching provides lower latency switching for high- performance computing (HPC) applications. Cut-through switching allows more invalid frames to cross the network than store-and-forward switching. The cut-through switching method can make a forwarding decision as soon as it looks up the destination MAC address of the frame.

44. Which is a multicast MAC address?

FF-FF-FF-FF-FF-FF 5C-26-0A-4B-19-3E 01-00-5E-00-00- 00-26-0F-4B-00-3E

45. Refer to the exhibit. What is wrong with the displayed termination?

The woven copper braid should not have been removed. The wrong type of connector is being used. The untwisted length of each wire is too long. The wires are too thick for the connector that is used.

Explanation: When a cable to an RJ- connector is terminated, it is important to ensure that the untwisted wires are not too long and that the flexible plastic sheath surrounding the wires is crimped down and not the bare wires. None of the colored wires should be visible from the bottom of the jack.

46. Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?​

Download

Download Packet Tracer Activity File This content is locked! use one of the buttons below to unlock the content.

tweet share follow us error share or wait 599s

Which port does Switch0 use to send frames to the host with the IPv address 10.1.1? Fa0/ Fa0/ Fa0/ Fa0/

Explanation: Issuing the command ipconfig /all from the PC0 command prompt displays the IPv4 address and MAC address. When the IPv4 address 10.1.1 is pinged from PC0, the switch stores the source MAC address (from PC0) along with the port to which PC0 is connected. When the destination reply is received, the switch takes the destination MAC address and compares to MAC addresses stored in the MAC address table. Issuing the show mac-address-table on the PC0 Terminal application displays two dynamic MAC address entries. The MAC address and port entry that does not belong to PC0 must be the MAC address and port of the destination with the IPv address 10.1.1.

48. What does the term “attenuation” mean in data communication?

loss of signal strength as distance increases time for a signal to reach its destination leakage of signals from one cable pair to another strengthening of a signal by a networking device

Explanation: Data is transmitted on copper cables as electrical pulses. A detector in the network interface of a destination device must receive a signal that can be successfully decoded to match the signal sent. However, the farther the signal travels, the more it deteriorates. This is referred to as signal attenuation.

49. What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.)

greater distances per cable run lower installation cost limited susceptibility to EMI/RFI

durable connections greater bandwidth potential easily terminated

Explanation: Optical fiber cable transmits data over longer distances and at higher bandwidths than any other networking media. Unlike copper wires, fiber-optic cable can transmit signals with less attenuation and is completely immune to EMI and RFI.

50. What OSI physical layer term describes the process by which one wave modifies another wave?

modulation IEEE EIA/TIA air

51. What OSI physical layer term describes the capacity at which a medium can carry data?

bandwidth IEEE EIA/TIA air

52. What OSI physical layer term describes the capacity at which a medium can carry data?

bandwidth throughput latency goodput

53. What OSI physical layer term describes the measure of the transfer of bits across a medium over a given period of time?

throughput bandwidth latency goodput

54. What OSI physical layer term describes the amount of time, including delays, for data to travel from one point to another?

latency bandwidth throughput goodput

Places information in the frame that identifies which network layer protocol is being used for the frame. Adds Layer 2 control information to network protocol data. Enables IPv4 and IPv6 to utilize the same network interface and media.

61. Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)

Enables IPv4 and IPv6 to utilize the same network interface and media. Places information in the frame that identifies which network layer protocol is being used for the frame. Integrates various physical technologies. Implements a process to delimit fields within a Layer 2 frame. Controls the NIC responsible for sending and receiving data on the physical medium.

62. Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Provides a mechanism to allow multiple devices to communicate over a shared medium. Controls the NIC responsible for sending and receiving data on the physical medium. Places information in the frame that identifies which network layer protocol is being used for the frame. Adds Layer 2 control information to network protocol data. Communicates between the networking software at the upper layers and the device hardware at the lower layers.

63. Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Controls the NIC responsible for sending and receiving data on the physical medium. Integrates various physical technologies. Communicates between the networking software at the upper layers and the device hardware at the lower layers. Adds Layer 2 control information to network protocol data. Places information in the frame that identifies which network layer protocol is being used for the frame.

64. Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)

Adds Layer 2 control information to network protocol data.

Places information in the frame that identifies which network layer protocol is being used for the frame. Performs data encapsulation. Controls the NIC responsible for sending and receiving data on the physical medium. Integrates various physical technologies.

65. Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Provides synchronization between source and target nodes. Integrates various physical technologies. Communicates between the networking software at the upper layers and the device hardware at the lower layers. Adds Layer 2 control information to network protocol data. Enables IPv4 and IPv6 to utilize the same network interface and media.

66. Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)

Adds Layer 2 control information to network protocol data. Enables IPv4 and IPv6 to utilize the same network interface and media. Provides data link layer addressing. Implements a trailer to detect transmission errors. Provides synchronization between source and target nodes.

67. Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.)

Implements a trailer to detect transmission errors. Provides synchronization between source and target nodes. Places information in the frame that identifies which network layer protocol is being used for the frame. Enables IPv4 and IPv6 to utilize the same network interface and media. Adds Layer 2 control information to network protocol data.

68. Which two functions are performed at the LLC sublayer of the OSI data link layer? (Choose two.)

Enables IPv4 and IPv6 to utilize the same network interface and media. Adds Layer 2 control information to network protocol data. Integrates various physical technologies. Implements a trailer to detect transmission errors. Provides synchronization between source and target nodes.

Was this document helpful?

cisco quiz Module 4 - 7

Course: Web Systems (031268 )

180 Documents
Students shared 180 documents in this course
Was this document helpful?
December 18, 2019
CCNA 1 v7 Modules 4 7: Ethernet Concepts Exam Answers
itexamanswers.net/ccna-1-v7-modules-4-7-ethernet-concepts-exam-answers.html
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer.
NOTE: If you have the new question on this test, please comment Question
and Multiple-Choice list in form below this article. We will update answers
for you in the shortest time. Thank you! We truly value your contribution to
the website.
Introduction to Networks ( Version 7.00) – Modules 4 – 7: Ethernet
Concepts Exam
1. What is the purpose of the OSI physical layer?
controlling access to media
transmitting bits across the local media
performing error detection on received frames
exchanging frames between nodes over physical network media
2. Why are two strands of fiber used for a single fiber optic connection?
The two strands allow the data to travel for longer distances without degrading.
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
They allow for full-duplex connectivity.
3. Which characteristic describes crosstalk?
the distortion of the network signal from fluorescent lighting
the distortion of the transmitted messages from signals carried in
adjacent wires
the weakening of the network signal over long cable lengths
the loss of wireless signal over excessive distance from the access point
4. Which procedure is used to reduce the effect of crosstalk in copper
cables?
requiring proper grounding connections
twisting opposing circuit wire pairs together
wrapping the bundle of wires with metallic shielding
designing a cable infrastructure to avoid crosstalk interference
avoiding sharp bends during installation
1/23
CCNA 1 v7 Modules 4 – 7: Ethernet
Concepts Exam Answers