SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Chapter 2

True/False
Indicate whether the statement is true or false.

____    1. The number of nodes on a network and the length of cable used influence the quality of communication on the
           network.

____    2. Repeaters and hubs reformat data structures, so they can connect networks that require different types of
           frames.

____    3. The IEEE standards for WLANs use unlicensed, but not unregulated, radio frequencies.

____    4. Bridges operate at the Network layer of the OSI model.

____    5. Like bridges, switches operate at the Network layer of the OSI model.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. On analog networks, devices that boost the signal are called ____.
           a. routers                                     c. hubs
           b. amplifiers                                  d. repeaters

____    7. Devices that “see” the traffic of other devices are said to be on the same ____ as those devices.
           a. ring                                           c. level
           b. block                                          d. collision domain
____    8. If a single access point is available in infrastructure mode, then the mode is said to be a(n) ____.
           a. Virtual Service Set (VSS)                        c. Basic Service Set (BSS)
           b. Extended Service Set (ESS)                       d. Logical Service Set (LSS)
____    9. Typically WLANs involve multiple access points connected to various switches in the network. This type of
           infrastructure mode is known as a(n) ____.
           a. Extended Service Set (ESS)               c. Virtual Service Set (VSS)
           b. Basic Service Set (BSS)                  d. Logical Service Set (LSS)
____ 10. A ____ filters traffic between network segments by examining the destination MAC address.
         a. hub                                         c. router
         b. repeater                                    d. bridge
____ 11. ____ increase network performance by reducing the number of frames transmitted to the rest of the network.
         a. Switches                                  c. Hubs
         b. Gateways                                  d. Amplifiers

____ 12. Switches filter based on ____ addresses.
         a. logical                                          c. MAC
         b. IP                                               d. TCP/IP
____ 13. ____ provide filtering and network traffic control on LANs and WANs. These devices can connect multiple
         segments and multiple networks.
a. Hubs                                        c. Switches
            b. Routers                                     d. Bridges
____ 14. Routers operate at the ____ layer of the OSI model.
         a. Network                                     c. Data Link
         b. Transport                                   d. Physical
____ 15. When TCP/IP is used on an internetwork, the logical address is known as a(n) ____ address.
         a. MAC                                        c. physical
         b. IP                                         d. domain
____ 16. ____ are commonly used to connect networks to the Internet.
         a. Bridges                                   c. Routers
         b. Switches                                  d. Hubs

____ 17. A(n) ____ functions as both a bridge for nonroutable protocols and a router for routable protocols.
         a. switch                                      c. amplifier
         b. hub                                         d. brouter
____ 18. A(n) ____ is usually a combination of hardware and software. Its purpose is to translate between different
         protocol suites.
         a. amplifier                                  c. hub
         b. gateway                                    d. router
____ 19. ____ have the most negative effect on network performance.
         a. Routers                                     c. Switches
         b. Bridges                                     d. Gateways
____ 20. ____ is a network access method (or media access method) originated by the University of Hawaii.
         a. FDDI                                       c. Ethernet
         b. AppleTalk                                  d. Token Ring
____ 21. Ethernet uses ____ to prevent data packets from colliding on the network.
         a. CSMA/CD                                     c. AppleTalk
         b. CSMA/CA                                     d. LPC

____ 22. A ____ is the physical area in which a frame collision might occur.
         a. signal domain                                c. jam domain
         b. jam area                                     d. collision domain
____ 23. ____ Ethernet uses the same network access method (CSMA/CD) as common 10BaseT Ethernet, but provides
         10 times the data transmission rate.
         a. Fast                                      c. 10 Gigabit
         b. Gigabit                                   d. Terabit
____ 24. Fast Ethernet is defined under the IEEE ____ standard.
         a. 802.3b                                       c. 802.3u
         b. 802.3f                                       d. 802.3z
____ 25. In ____ communications, devices can send and receive signals, but not at the same time.
         a. full-duplex                               c. duplex
         b. half-duplex                               d. wire-duplex
____ 26. In ____ communications, devices can send and receive signals simultaneously.
a. full-duplex                                  c. half-duplex
            b. mutex                                        d. single-duplex


Completion
Complete each statement.

       27. ____________________ usually refers to the physical layout of network cable and devices.

       28. ____________________ provide cell-based areas where wireless clients such as laptops and PDAs can
           connect to the network by associating with the access point.

       29. ____________________ is the breaking down of a single heavily populated network segment into smaller
           segments, or collision domains, populated by fewer nodes.

       30. A switch opens a(n) ____________________ between the source and the destination. This prevents
           communications between just two computers from being broadcast to every computer on the network or
           segment.

       31. When machines must share a wire and compete for available bandwidth with other machines, they experience
           ____________________.


Matching

            Match each item with a statement below:
            a. Attenuation                                  f.   Broadcast storm
            b. Hub                                          g.   Microsegmentation
            c. Service Set Identifier (SSID)                h.   Internetworks
            d. Segment                                      i.   Broadcast domain
            e. Broadcast frame
____ 32. a group of network devices that will receive LAN broadcast traffic from each other
____ 33. a generic connection device used to tie several networking cables together to create a link between different
         stations on a network
____ 34. preventing communications between just two computers from being broadcast to every computer on the
         network or segment
____ 35. when two or more stations engage in the transmission of excessive broadcast traffic
____ 36. networks connected by multiple routers
____ 37. a part of a network that is divided logically or physically from the rest of the network
____ 38. wireless network name
____ 39. a frame destined for all computers on the network
____ 40. degradation of signal clarity


Short Answer
41. Describe active and passive hubs.

42. What are the advantages of using repeaters and hubs?

43. Briefly describe the components of a wireless network.

44. What are the steps for adding a WLAN to a LAN?

45. Briefly describe transparent bridges.

46. What are the advantages of using a bridge?

47. What are the advantages of using switches?

48. What are the disadvantages of using routers on the network?

49. Briefly describe Gigabit Ethernet.

50. What are the benefits of using full-duplex?

Weitere Àhnliche Inhalte

Was ist angesagt?

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
Chapter 10
Chapter 10Chapter 10
Chapter 10guest35417d
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Treegopi1985
 
Chapter 08
Chapter 08Chapter 08
Chapter 08guest35417d
 
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCSMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCVLSICS Design
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsEng. Emad Al-Atoum
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...vtunotesbysree
 
Networking
NetworkingNetworking
NetworkingBecky Becky
 
Inter quiz
Inter quizInter quiz
Inter quizkmanishuli
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commandsAniket Thakur
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 

Was ist angesagt? (20)

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCSMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
Ch22
Ch22Ch22
Ch22
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Networks notes
Networks notesNetworks notes
Networks notes
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 
Networking
NetworkingNetworking
Networking
 
Inter quiz
Inter quizInter quiz
Inter quiz
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Presentation on copy
Presentation  on   copyPresentation  on   copy
Presentation on copy
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 

Ähnlich wie Chapter 2 True/False and Multiple Choice Questions

[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2raghad mejeed
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxbunyansaturnina
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communicationsHarishKumar2054
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networksIT2Alcorn
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456manishazapclub111
 
Computer Network Theory Part 4
Computer Network Theory Part 4Computer Network Theory Part 4
Computer Network Theory Part 4NishatTasnimAli
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsAbhishek Jaguessar
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdfVUPHUONGTHAO9
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2Anandpudur
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questionsCarmenLamdegil
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-cssAdrian Buban
 
Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01Md. Abdur Rahim Khan
 
1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docx1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docxpandoragardner78605
 
exam2
exam2exam2
exam2EMChief
 
12.7.2018
12.7.201812.7.2018
12.7.2018Rajes Wari
 

Ähnlich wie Chapter 2 True/False and Multiple Choice Questions (20)

[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networks
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456
 
Computer Network Theory Part 4
Computer Network Theory Part 4Computer Network Theory Part 4
Computer Network Theory Part 4
 
CCNA DUMPS 640-802
CCNA DUMPS 640-802CCNA DUMPS 640-802
CCNA DUMPS 640-802
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-css
 
Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01
 
1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docx1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docx
 
exam2
exam2exam2
exam2
 
12.7.2018
12.7.201812.7.2018
12.7.2018
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 

Mehr von Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access ListsDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP AddressingDsunte Wilson
 

Mehr von Dsunte Wilson (19)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 

KĂŒrzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

KĂŒrzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Chapter 2 True/False and Multiple Choice Questions

  • 1. Chapter 2 True/False Indicate whether the statement is true or false. ____ 1. The number of nodes on a network and the length of cable used influence the quality of communication on the network. ____ 2. Repeaters and hubs reformat data structures, so they can connect networks that require different types of frames. ____ 3. The IEEE standards for WLANs use unlicensed, but not unregulated, radio frequencies. ____ 4. Bridges operate at the Network layer of the OSI model. ____ 5. Like bridges, switches operate at the Network layer of the OSI model. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. On analog networks, devices that boost the signal are called ____. a. routers c. hubs b. amplifiers d. repeaters ____ 7. Devices that “see” the traffic of other devices are said to be on the same ____ as those devices. a. ring c. level b. block d. collision domain ____ 8. If a single access point is available in infrastructure mode, then the mode is said to be a(n) ____. a. Virtual Service Set (VSS) c. Basic Service Set (BSS) b. Extended Service Set (ESS) d. Logical Service Set (LSS) ____ 9. Typically WLANs involve multiple access points connected to various switches in the network. This type of infrastructure mode is known as a(n) ____. a. Extended Service Set (ESS) c. Virtual Service Set (VSS) b. Basic Service Set (BSS) d. Logical Service Set (LSS) ____ 10. A ____ filters traffic between network segments by examining the destination MAC address. a. hub c. router b. repeater d. bridge ____ 11. ____ increase network performance by reducing the number of frames transmitted to the rest of the network. a. Switches c. Hubs b. Gateways d. Amplifiers ____ 12. Switches filter based on ____ addresses. a. logical c. MAC b. IP d. TCP/IP ____ 13. ____ provide filtering and network traffic control on LANs and WANs. These devices can connect multiple segments and multiple networks.
  • 2. a. Hubs c. Switches b. Routers d. Bridges ____ 14. Routers operate at the ____ layer of the OSI model. a. Network c. Data Link b. Transport d. Physical ____ 15. When TCP/IP is used on an internetwork, the logical address is known as a(n) ____ address. a. MAC c. physical b. IP d. domain ____ 16. ____ are commonly used to connect networks to the Internet. a. Bridges c. Routers b. Switches d. Hubs ____ 17. A(n) ____ functions as both a bridge for nonroutable protocols and a router for routable protocols. a. switch c. amplifier b. hub d. brouter ____ 18. A(n) ____ is usually a combination of hardware and software. Its purpose is to translate between different protocol suites. a. amplifier c. hub b. gateway d. router ____ 19. ____ have the most negative effect on network performance. a. Routers c. Switches b. Bridges d. Gateways ____ 20. ____ is a network access method (or media access method) originated by the University of Hawaii. a. FDDI c. Ethernet b. AppleTalk d. Token Ring ____ 21. Ethernet uses ____ to prevent data packets from colliding on the network. a. CSMA/CD c. AppleTalk b. CSMA/CA d. LPC ____ 22. A ____ is the physical area in which a frame collision might occur. a. signal domain c. jam domain b. jam area d. collision domain ____ 23. ____ Ethernet uses the same network access method (CSMA/CD) as common 10BaseT Ethernet, but provides 10 times the data transmission rate. a. Fast c. 10 Gigabit b. Gigabit d. Terabit ____ 24. Fast Ethernet is defined under the IEEE ____ standard. a. 802.3b c. 802.3u b. 802.3f d. 802.3z ____ 25. In ____ communications, devices can send and receive signals, but not at the same time. a. full-duplex c. duplex b. half-duplex d. wire-duplex ____ 26. In ____ communications, devices can send and receive signals simultaneously.
  • 3. a. full-duplex c. half-duplex b. mutex d. single-duplex Completion Complete each statement. 27. ____________________ usually refers to the physical layout of network cable and devices. 28. ____________________ provide cell-based areas where wireless clients such as laptops and PDAs can connect to the network by associating with the access point. 29. ____________________ is the breaking down of a single heavily populated network segment into smaller segments, or collision domains, populated by fewer nodes. 30. A switch opens a(n) ____________________ between the source and the destination. This prevents communications between just two computers from being broadcast to every computer on the network or segment. 31. When machines must share a wire and compete for available bandwidth with other machines, they experience ____________________. Matching Match each item with a statement below: a. Attenuation f. Broadcast storm b. Hub g. Microsegmentation c. Service Set Identifier (SSID) h. Internetworks d. Segment i. Broadcast domain e. Broadcast frame ____ 32. a group of network devices that will receive LAN broadcast traffic from each other ____ 33. a generic connection device used to tie several networking cables together to create a link between different stations on a network ____ 34. preventing communications between just two computers from being broadcast to every computer on the network or segment ____ 35. when two or more stations engage in the transmission of excessive broadcast traffic ____ 36. networks connected by multiple routers ____ 37. a part of a network that is divided logically or physically from the rest of the network ____ 38. wireless network name ____ 39. a frame destined for all computers on the network ____ 40. degradation of signal clarity Short Answer
  • 4. 41. Describe active and passive hubs. 42. What are the advantages of using repeaters and hubs? 43. Briefly describe the components of a wireless network. 44. What are the steps for adding a WLAN to a LAN? 45. Briefly describe transparent bridges. 46. What are the advantages of using a bridge? 47. What are the advantages of using switches? 48. What are the disadvantages of using routers on the network? 49. Briefly describe Gigabit Ethernet. 50. What are the benefits of using full-duplex?