1.
Match the situation with the appropriate use
of network media.
2.
A network administrator is measuring the
transfer of bits across the company backbone for a mission critical financial
application. The administrator notices that the network throughput appears
lower than the bandwidth expected. Which three factors could influence the
differences in throughput? (Choose three.)
·
the amount of traffic that is currently
crossing the network
·
the sophistication of the
encapsulation method applied to the data
·
the type of traffic that is crossing the
network
·
the latency that is created by the number
of network devices that the data is crossing
·
the bandwidth of the WAN connection
to the Internet
·
the reliability of the gigabit
Ethernet infrastructure of the backbone
3.
What are two characteristics of fiber-optic
cable? (Choose two.)
·
It is not affected by EMI or RFI.
·
Each pair of cables is wrapped in
metallic foil.
·
It combines the technique of
cancellation, shielding, and twisting to protect data.
·
It typically contains 4 pairs of
fiber-optic wires.
·
It is more expensive than UTP cabling is.
4.
What is a primary role of the Physical layer
in transmitting data on the network?
·
create the signals that represent the
bits in each frame on to the media
·
provide physical addressing to the
devices
·
determine the path packets take
through the network
·
control data access to the media
5.
With the use of unshielded twisted-pair copper
wire in a network, what causes crosstalk within the cable pairs?
·
the magnetic field around the adjacent
pairs of wire
·
the use of braided wire to shield the
adjacent wire pairs
·
the reflection of the electrical wave
back from the far end of the cable
·
the collision caused by two nodes
trying to use the media simultaneously
6.
Refer to the graphic. What type of cabling is
shown?
CCNA1 v7 ITN – Ethernet Concepts Exam Answers 04
·
STP
·
UTP
·
coax
·
fiber
7.
In addition to the cable length, what two
factors could interfere with the communication carried over UTP cables? (Choose
two.)
·
crosstalk
·
bandwidth
·
size of the network
·
signal modulation technique
·
electromagnetic interference
8.
Refer to the graphic. What type of cabling is
shown?
CCNA1 v7 ITN – Ethernet Concepts Exam Answers 05
·
STP
·
UTP
·
coax
·
fiber
9.
Which two devices commonly affect wireless
networks? (Choose two.)
·
Blu-ray players
·
home theaters
·
cordless phones
·
microwaves
·
incandescent light bulbs
·
external hard drives
10.
Which two statements describe the services
provided by the data link layer? (Choose two.)
·
It defines the end-to-end delivery
addressing scheme.
·
It maintains the path between the
source and destination devices during the data transmission.
·
It manages the access of frames to the
network media.
·
It provides reliable delivery through
link establishment and flow control.
·
It ensures that application data will
be transmitted according to the prioritization.
·
It packages various Layer 3 PDUs into a frame
format that is compatible with the network interface.
11.
What is the function of the CRC value that is
found in the FCS field of a frame?
·
to verify the integrity of the received
frame
·
to verify the physical address in the
frame
·
to verify the logical address in the
frame
·
to compute the checksum header for
the data field in the frame
12.
What is contained in the trailer of a
data-link frame?
·
logical address
·
physical address
·
data
·
error detection
13.
Which statement describes a characteristic of
the frame header fields of the data link layer?
·
They all include the flow control and
logical connection fields.
·
Ethernet frame header fields contain
Layer 3 source and destination addresses.
·
They vary depending on protocols.
·
They include information on user
applications.
14.
A network team is comparing physical WAN
topologies for connecting remote sites to a headquarters building. Which
topology provides high availability and connects some, but not all, remote
sites?
·
mesh
·
partial mesh
·
hub and spoke
·
point-to-point
15.
Which two fields or features does Ethernet
examine to determine if a received frame is passed to the data link layer or
discarded by the NIC? (Choose two.)
·
auto-MDIX
·
CEF
·
Frame Check Sequence
·
minimum frame size
·
source MAC address
16.
Which media communication type does not
require media arbitration in the data link layer?
·
deterministic
·
half-duplex
·
full-duplex
·
controlled access
17.
Which statement describes an extended star
topology?
·
End devices connect to a central
intermediate device, which in turn connects to other central intermediate
devices.
·
End devices are connected together by
a bus and each bus connects to a central intermediate device.
·
Each end system is connected to its
respective neighbor via an intermediate device.
·
All end and intermediate devices are
connected in a chain to each other.
18.
What is a characteristic of the LLC sublayer?
·
It provides the logical addressing
required that identifies the device.
·
It provides delimitation of data
according to the physical signaling requirements of the medium.
·
It places information in the frame
allowing multiple Layer 3 protocols to use the same network interface and
media.
·
It defines software processes that
provide services to the physical layer.
19.
What are three ways that media access control
is used in networking? (Choose three.)
·
Ethernet utilizes CSMA/CD.
·
Media access control provides placement
of data frames onto the media.
·
Contention-based access is also known
as deterministic.
·
802.11 utilizes CSMA/CD.
·
Data link layer protocols define the
rules for access to different media.
·
Networks with controlled access have
reduced performance due to data collisions.
20.
During the encapsulation process, what occurs
at the data link layer for a PC connected to an Ethernet network?
·
An IP address is added.
·
The logical address is added.
·
The physical address is added.
·
The process port number is added.
21.
What three items are contained in an Ethernet
header and trailer? (Choose three.)
·
source IP address
·
source MAC address
·
destination IP address
·
destination MAC address
·
error-checking information
22.
What type of communication rule would best
describe CSMA/CD?
·
access method
·
flow control
·
message encapsulation
·
message encoding
23.
Which three basic parts are common to all
frame types supported by the data link layer? (Choose three.)
·
header
·
type field
·
MTU size
·
data
·
trailer
·
CRC value
24.
Which statement is true about the CSMA/CD
access method that is used in Ethernet?
·
When a device hears a carrier signal
and transmits, a collision cannot occur.
·
A jamming signal causes only devices
that caused the collision to execute a backoff algorithm.
·
All network devices must listen before
transmitting.
·
Devices involved in a collision get
priority to transmit after the backoff period.
25.
What is the auto-MDIX feature on a switch?
·
the automatic configuration of an
interface for 10/100/1000 Mb/s operation
·
the automatic configuration of an
interface for a straight-through or a crossover Ethernet cable connection
·
the automatic configuration of
full-duplex operation over a single Ethernet copper or optical cable
·
the ability to turn a switch
interface on or off accordingly if an active connection is detected
26.
Refer to the exhibit. What is the destination
MAC address of the Ethernet frame as it leaves the web server if the final
destination is PC1?
CCNA1 v7 ITN – Ethernet Concepts Exam Answers 03
·
00-60-2F-3A-07-AA
·
00-60-2F-3A-07-BB
·
00-60-2F-3A-07-CC
·
00-60-2F-3A-07-DD
27.
A Layer 2 switch is used to switch incoming
frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which
method of memory buffering would work best for this task?
·
port-based buffering
·
level 1 cache buffering
·
shared memory buffering
·
fixed configuration buffering
28.
What are two examples of the cut-through
switching method? (Choose two.)
·
store-and-forward switching
·
fast-forward switching
·
CRC switching
·
fragment-free switching
·
QOS switching
29.
Which frame forwarding method receives the
entire frame and performs a CRC check to detect errors before forwarding the
frame?
·
cut-through switching
·
store-and-forward switching
·
fragment-free switching
·
fast-forward switching
30.
What is the purpose of the FCS field in a
frame?
·
to obtain the MAC address of the
sending node
·
to verify the logical address of the
sending node
·
to compute the CRC header for the
data field
·
to determine if errors occurred in the
transmission and reception
31.
Which switching method has the lowest level of
latency?
·
cut-through
·
store-and-forward
·
fragment-free
·
fast-forward
32.
A network administrator is connecting two
modern switches using a straight-through cable. The switches are new and have
never been configured. Which three statements are correct about the final
result of the connection? (Choose three.)
·
The link between the switches will work
at the fastest speed that is supported by both switches.
·
The link between switches will work as
full-duplex.
·
If both switches support different
speeds, they will each work at their own fastest speed.
·
The auto-MDIX feature will configure the
interfaces eliminating the need for a crossover cable.
·
The connection will not be possible
unless the administrator changes the cable to a crossover cable.
·
The duplex capability has to be
manually configured because it cannot be negotiated.
33.
Which advantage does the store-and-forward
switching method have compared with the cut-through switching method?
·
collision detecting
·
frame error checking
·
faster frame forwarding
·
frame forwarding using IPv4 Layer 3
and 4 information
34.
When the store-and-forward method of switching
is in use, what part of the Ethernet frame is used to perform an error check?
·
CRC in the trailer
·
source MAC address in the header
·
destination MAC address in the header
·
protocol type in the header
35.
Which switching method uses the CRC value in a
frame?
·
cut-through
·
fast-forward
·
fragment-free
·
store-and-forward
36.
What are two actions performed by a Cisco
switch? (Choose two.)
·
building a routing table that is
based on the first IP address in the frame header
·
using the source MAC addresses of frames
to build and maintain a MAC address table
·
forwarding frames with unknown
destination IP addresses to the default gateway
·
utilizing the MAC address table to
forward frames via the destination MAC address
·
examining the destination MAC address
to add new entries to the MAC address table
37.
Which two statements describe features or
functions of the logical link control sublayer in Ethernet standards? (Choose
two.)
·
Logical link control is implemented in
software.
·
Logical link control is specified in
the IEEE 802.3 standard.
·
The LLC sublayer adds a header
and a trailer to the data.
·
The data link layer uses LLC to
communicate with the upper layers of the protocol suite.
·
The LLC sublayer is responsible for
the placement and retrieval of frames on and off the media.
38.
What is the auto-MDIX feature?
·
It enables a device to automatically
configure an interface to use a straight-through or a crossover cable.
·
It enables a device to automatically
configure the duplex settings of a segment.
·
It enables a device to automatically
configure the speed of its interface.
·
It enables a switch to dynamically
select the forwarding method.
39.
What is one advantage of using the cut-through
switching method instead of the store-and-forward switching method?
·
has a positive impact on bandwidth by
dropping most of the invalid frames
·
makes a fast forwarding decision
based on the source MAC address of the frame
·
has a lower latency appropriate for
high-performance computing applications
·
provides the flexibility to support
any mix of Ethernet speeds
40.
Which is a multicast MAC address?
·
FF-FF-FF-FF-FF-FF
·
5C-26-0A-4B-19-3E
·
01-00-5E-00-00-03
·
00-26-0F-4B-00-3E
41.
Refer to the exhibit. What is wrong with the
displayed termination?
CCNA1 v7 ITN – Ethernet Concepts Exam Answers 02
·
The woven copper braid should not
have been removed.
·
The wrong type of connector is being
used.
·
The untwisted length of each wire is too
long.
·
The wires are too thick for the
connector that is used.
42.
Refer to the exhibit. The PC is connected to
the console port of the switch. All the other connections are made through
FastEthernet links. Which types of UTP cables can be used to connect the
devices?
CCNA1 v7 ITN – Ethernet Concepts Exam Answers 01
·
1 – rollover, 2 – crossover, 3 –
straight-through
·
1 – rollover, 2 – straight-through, 3
– crossover
·
1 – crossover, 2 – straight-through,
3 – rollover
·
1 – crossover, 2 – rollover, 3 –
straight-through
43.
Open the PT Activity. Perform the tasks in the
activity instructions and then answer the question.
Which port does Switch0 use to send frames to the host with the
IPv4 address 10.1.1.5?
·
Fa0/1
·
Fa0/5
·
Fa0/9
·
Fa0/11
44.
What does the term “attenuation” mean in data
communication?
·
loss of signal strength as distance
increases
·
time for a signal to reach its destination
·
leakage of signals from one cable
pair to another
·
strengthening of a signal by a
networking device
45.
What makes fiber preferable to copper cabling
for interconnecting buildings? (Choose three.)
·
greater distances per cable run
·
lower installation cost
·
limited susceptibility to EMI/RFI
·
durable connections
·
greater bandwidth potential
·
easily terminated
46.
What OSI physical layer term describes the
process by which one wave modifies another wave?
·
modulation
·
IEEE
·
EIA/TIA
·
air
47.
What OSI physical layer term describes the
capacity at which a medium can carry data?
·
bandwidth
·
IEEE
·
EIA/TIA
·
air
48.
What OSI physical layer term describes the
capacity at which a medium can carry data?
·
bandwidth
·
throughput
·
latency
·
goodput
49.
What OSI physical layer term describes the
measure of the transfer of bits across a medium over a given period of time?
·
throughput
·
bandwidth
·
latency
·
goodput
50.
What OSI physical layer term describes the
amount of time, including delays, for data to travel from one point to another?
·
latency
·
bandwidth
·
throughput
·
goodput
51.
What OSI physical layer term describes the
amount of time, including delays, for data to travel from one point to another?
·
latency
·
fiber-optic cable
·
air
·
copper cable
52.
What OSI physical layer term describes the
measure of usable data transferred over a given period of time?
·
goodput
·
fiber-optic cable
·
air
·
copper cable
53.
What OSI physical layer term describes the
physical medium which uses electrical pulses?
·
copper cable
·
fiber-optic cable
·
air
·
goodput
54.
What OSI physical layer term describes the
physical medium that uses the propagation of light?
·
fiber-optic cable
·
goodput
·
latency
·
throughput
55.
What OSI physical layer term describes the
physical medium for microwave transmissions?
·
air
·
goodput
·
latency
·
throughput
56.
Which two functions are performed at the MAC
sublayer of the OSI data link layer? (Choose two.)
·
Implements a trailer to detect
transmission errors.
·
Controls the NIC responsible for sending
and receiving data on the physical medium.
·
Places information in the frame that
identifies which network layer protocol is being used for the frame.
·
Adds Layer 2 control information to
network protocol data.
·
Enables IPv4 and IPv6 to utilize the
same network interface and media.
57.
Which two functions are performed at the LLC
sublayer of the OSI data link layer? (Choose two.)
·
Enables IPv4 and IPv6 to utilize the same
network interface and media.
·
Places information in the frame that
identifies which network layer protocol is being used for the frame.
·
Integrates various physical
technologies.
·
Implements a process to delimit
fields within a Layer 2 frame.
·
Controls the NIC responsible for
sending and receiving data on the physical medium.
58.
Which two functions are performed at the MAC
sublayer of the OSI data link layer? (Choose two.)
·
Provides a mechanism to allow multiple
devices to communicate over a shared medium.
·
Controls the NIC responsible for sending
and receiving data on the physical medium.
·
Places information in the frame that
identifies which network layer protocol is being used for the frame.
·
Adds Layer 2 control information to
network protocol data.
·
Communicates between the networking
software at the upper layers and the device hardware at the lower layers.
59.
Which two functions are performed at the MAC
sublayer of the OSI data link layer? (Choose two.)
·
Controls the NIC responsible for sending
and receiving data on the physical medium.
·
Integrates various physical technologies.
·
Communicates between the networking
software at the upper layers and the device hardware at the lower layers.
·
Adds Layer 2 control information to
network protocol data.
·
Places information in the frame that
identifies which network layer protocol is being used for the frame.
60.
Which two functions are performed at the LLC
sublayer of the OSI data link layer? (Choose two.)
·
Adds Layer 2 control information to
network protocol data.
·
Places information in the frame that
identifies which network layer protocol is being used for the frame.
·
Performs data encapsulation.
·
Controls the NIC responsible for
sending and receiving data on the physical medium.
·
Integrates various physical technologies.
61.
Which two functions are performed at the MAC
sublayer of the OSI data link layer? (Choose two.)
·
Provides synchronization between source
and target nodes.
·
Integrates various physical technologies.
·
Communicates between the networking
software at the upper layers and the device hardware at the lower layers.
·
Adds Layer 2 control information to
network protocol data.
·
Enables IPv4 and IPv6 to utilize the
same network interface and media.
62.
Which two functions are performed at the LLC
sublayer of the OSI data link layer? (Choose two.)
·
Adds Layer 2 control information to
network protocol data.
·
Enables IPv4 and IPv6 to utilize the same
network interface and media.
·
Provides data link layer addressing.
·
Implements a trailer to detect
transmission errors.
·
Provides synchronization between
source and target nodes.
63.
Which two functions are performed at the MAC
sublayer of the OSI data link layer? (Choose two.)
·
Implements a trailer to detect
transmission errors.
·
Provides synchronization between source
and target nodes.
·
Places information in the frame that
identifies which network layer protocol is being used for the frame.
·
Enables IPv4 and IPv6 to utilize the
same network interface and media.
·
Adds Layer 2 control information to
network protocol data.
64.
Which two functions are performed at the LLC
sublayer of the OSI data link layer? (Choose two.)
·
Enables IPv4 and IPv6 to utilize the same
network interface and media.
·
Adds Layer 2 control information to
network protocol data.
·
Integrates various physical technologies.
·
Implements a trailer to detect
transmission errors.
·
Provides synchronization between
source and target nodes.
65.
Which two functions are performed at the MAC
sublayer of the OSI data link layer? (Choose two.)
·
Provides a mechanism to allow multiple
devices to communicate over a shared medium.
·
Controls the NIC responsible for sending
and receiving data on the physical medium.
·
Places information in the frame that
identifies which network layer protocol is being used for the frame.
·
Adds Layer 2 control information to
network protocol data.
·
Enables IPv4 and IPv6 to utilize the
same network interface and media.
66.
What action will occur if a switch receives a
frame and does have the source MAC address in the MAC table?
·
The switch refreshes the timer on that entry.
·
The switch shares the MAC address
table entry with any connected switches.
·
The switch does not forward the
frame.
·
The switch sends the frame to a
connected router because the destination MAC address is not local.
67.
What action will occur if a switch receives a
frame with the destination MAC address FF:FF:FF:FF:FF:FF?
·
The switch forwards it out all ports
except the ingress port.
·
The switch shares the MAC address
table entry with any connected switches.
·
The switch does not forward the
frame.
·
The switch sends the frame to a
connected router because the destination MAC address is not local.
68.
What action will occur if a host receives a
frame with a destination MAC address it does not recognize?
·
The host will discard the frame.
·
The host sends the frame to the
switch to update the MAC address table.
·
The host forwards the frame to the
router.
·
The host forwards the frame to all
other hosts.
69.
What action will occur if a switch receives a
frame with the destination MAC address 01:00:5E:00:00:D9?
·
The switch forwards it out all ports
except the ingress port.
·
The switch does not forward the
frame.
·
The switch sends the frame to a
connected router because the destination MAC address is not local.
·
The switch shares the MAC address
table entry with any connected switches.
70.
What action will occur if a host receives a
frame with a destination MAC address of FF:FF:FF:FF:FF:FF?
·
The host will process the frame.
·
The host forwards the frame to the
router.
·
The host sends the frame to the
switch to update the MAC address table.
·
The host forwards the frame to all
other hosts.
71.
What action will occur if a switch receives a
frame and does have the source MAC address in the MAC table?
·
The switch refreshes the timer on that
entry.
·
The switch adds it to its MAC address
table associated with the port number.
·
The switch forwards the frame to the
associated port.
·
The switch sends the frame to a
connected router because the destination MAC address is not local.
72.
What action will occur if a host receives a
frame with a destination MAC address of FF:FF:FF:FF:FF:FF?
·
The host will process the frame.
·
The host returns the frame to the
switch.
·
The host replies to the switch with
its own IP address.
·
The host forwards the frame to all
other hosts.
73.
What action will occur if a switch receives a
frame and does have the source MAC address in the MAC table?
·
The switch refreshes the timer on that
entry.
·
The switch shares the MAC address
table entry with any connected switches.
·
The switch does not forward the
frame.
·
The switch adds it to its MAC address
table associated with the port number.
74.
What action will occur if a host receives a
frame with a destination MAC address it does not recognize?
·
The host will discard the frame.
·
The host replies to the switch with
its own IP address.
·
The host forwards the frame to all
other hosts.
·
The host returns the frame to the
switch.
75.
What action will occur if a switch receives a
frame with the destination MAC address FF:FF:FF:FF:FF:FF?
·
The switch forwards it out all ports
except the ingress port.
·
The switch does not forward the
frame.
·
The switch sends the frame to a
connected router because the destination MAC address is not local.