SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Chapter 2

True/False
Indicate whether the statement is true or false.

____    1. The number of nodes on a network and the length of cable used influence the quality of communication on the
           network.

____    2. Repeaters and hubs reformat data structures, so they can connect networks that require different types of
           frames.

____    3. The IEEE standards for WLANs use unlicensed, but not unregulated, radio frequencies.

____    4. Bridges operate at the Network layer of the OSI model.

____    5. Like bridges, switches operate at the Network layer of the OSI model.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. On analog networks, devices that boost the signal are called ____.
           a. routers                                     c. hubs
           b. amplifiers                                  d. repeaters

____    7. Devices that “see” the traffic of other devices are said to be on the same ____ as those devices.
           a. ring                                           c. level
           b. block                                          d. collision domain
____    8. If a single access point is available in infrastructure mode, then the mode is said to be a(n) ____.
           a. Virtual Service Set (VSS)                        c. Basic Service Set (BSS)
           b. Extended Service Set (ESS)                       d. Logical Service Set (LSS)
____    9. Typically WLANs involve multiple access points connected to various switches in the network. This type of
           infrastructure mode is known as a(n) ____.
           a. Extended Service Set (ESS)               c. Virtual Service Set (VSS)
           b. Basic Service Set (BSS)                  d. Logical Service Set (LSS)
____ 10. A ____ filters traffic between network segments by examining the destination MAC address.
         a. hub                                         c. router
         b. repeater                                    d. bridge
____ 11. ____ increase network performance by reducing the number of frames transmitted to the rest of the network.
         a. Switches                                  c. Hubs
         b. Gateways                                  d. Amplifiers

____ 12. Switches filter based on ____ addresses.
         a. logical                                          c. MAC
         b. IP                                               d. TCP/IP
____ 13. ____ provide filtering and network traffic control on LANs and WANs. These devices can connect multiple
         segments and multiple networks.
a. Hubs                                        c. Switches
            b. Routers                                     d. Bridges
____ 14. Routers operate at the ____ layer of the OSI model.
         a. Network                                     c. Data Link
         b. Transport                                   d. Physical
____ 15. When TCP/IP is used on an internetwork, the logical address is known as a(n) ____ address.
         a. MAC                                        c. physical
         b. IP                                         d. domain
____ 16. ____ are commonly used to connect networks to the Internet.
         a. Bridges                                   c. Routers
         b. Switches                                  d. Hubs

____ 17. A(n) ____ functions as both a bridge for nonroutable protocols and a router for routable protocols.
         a. switch                                      c. amplifier
         b. hub                                         d. brouter
____ 18. A(n) ____ is usually a combination of hardware and software. Its purpose is to translate between different
         protocol suites.
         a. amplifier                                  c. hub
         b. gateway                                    d. router
____ 19. ____ have the most negative effect on network performance.
         a. Routers                                     c. Switches
         b. Bridges                                     d. Gateways
____ 20. ____ is a network access method (or media access method) originated by the University of Hawaii.
         a. FDDI                                       c. Ethernet
         b. AppleTalk                                  d. Token Ring
____ 21. Ethernet uses ____ to prevent data packets from colliding on the network.
         a. CSMA/CD                                     c. AppleTalk
         b. CSMA/CA                                     d. LPC

____ 22. A ____ is the physical area in which a frame collision might occur.
         a. signal domain                                c. jam domain
         b. jam area                                     d. collision domain
____ 23. ____ Ethernet uses the same network access method (CSMA/CD) as common 10BaseT Ethernet, but provides
         10 times the data transmission rate.
         a. Fast                                      c. 10 Gigabit
         b. Gigabit                                   d. Terabit
____ 24. Fast Ethernet is defined under the IEEE ____ standard.
         a. 802.3b                                       c. 802.3u
         b. 802.3f                                       d. 802.3z
____ 25. In ____ communications, devices can send and receive signals, but not at the same time.
         a. full-duplex                               c. duplex
         b. half-duplex                               d. wire-duplex
____ 26. In ____ communications, devices can send and receive signals simultaneously.
a. full-duplex                                  c. half-duplex
            b. mutex                                        d. single-duplex


Completion
Complete each statement.

       27. ____________________ usually refers to the physical layout of network cable and devices.

       28. ____________________ provide cell-based areas where wireless clients such as laptops and PDAs can
           connect to the network by associating with the access point.

       29. ____________________ is the breaking down of a single heavily populated network segment into smaller
           segments, or collision domains, populated by fewer nodes.

       30. A switch opens a(n) ____________________ between the source and the destination. This prevents
           communications between just two computers from being broadcast to every computer on the network or
           segment.

       31. When machines must share a wire and compete for available bandwidth with other machines, they experience
           ____________________.


Matching

            Match each item with a statement below:
            a. Attenuation                                  f.   Broadcast storm
            b. Hub                                          g.   Microsegmentation
            c. Service Set Identifier (SSID)                h.   Internetworks
            d. Segment                                      i.   Broadcast domain
            e. Broadcast frame
____ 32. a group of network devices that will receive LAN broadcast traffic from each other
____ 33. a generic connection device used to tie several networking cables together to create a link between different
         stations on a network
____ 34. preventing communications between just two computers from being broadcast to every computer on the
         network or segment
____ 35. when two or more stations engage in the transmission of excessive broadcast traffic
____ 36. networks connected by multiple routers
____ 37. a part of a network that is divided logically or physically from the rest of the network
____ 38. wireless network name
____ 39. a frame destined for all computers on the network
____ 40. degradation of signal clarity


Short Answer
41. Describe active and passive hubs.

42. What are the advantages of using repeaters and hubs?

43. Briefly describe the components of a wireless network.

44. What are the steps for adding a WLAN to a LAN?

45. Briefly describe transparent bridges.

46. What are the advantages of using a bridge?

47. What are the advantages of using switches?

48. What are the disadvantages of using routers on the network?

49. Briefly describe Gigabit Ethernet.

50. What are the benefits of using full-duplex?

Mais conteúdo relacionado

Mais procurados

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Treegopi1985
 
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCSMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCVLSICS Design
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...vtunotesbysree
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commandsAniket Thakur
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 

Mais procurados (20)

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOCSMART MULTICROSSBAR ROUTER DESIGN IN NOC
SMART MULTICROSSBAR ROUTER DESIGN IN NOC
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
Ch22
Ch22Ch22
Ch22
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Networks notes
Networks notesNetworks notes
Networks notes
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 
Networking
NetworkingNetworking
Networking
 
Inter quiz
Inter quizInter quiz
Inter quiz
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Presentation on copy
Presentation  on   copyPresentation  on   copy
Presentation on copy
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 

Semelhante a CCNA Network Devices Questions

[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2raghad mejeed
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Vishal kakade
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxbunyansaturnina
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communicationsHarishKumar2054
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networksIT2Alcorn
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456manishazapclub111
 
Computer Network Theory Part 4
Computer Network Theory Part 4Computer Network Theory Part 4
Computer Network Theory Part 4NishatTasnimAli
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsAbhishek Jaguessar
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdfVUPHUONGTHAO9
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2Anandpudur
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questionsCarmenLamdegil
 
1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docx1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docxpandoragardner78605
 

Semelhante a CCNA Network Devices Questions (20)

[Mcq] computer communication networks lmt2
[Mcq] computer communication networks   lmt2[Mcq] computer communication networks   lmt2
[Mcq] computer communication networks lmt2
 
Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...Ccn(Data communication and networking) edited solution-manual suitable to be ...
Ccn(Data communication and networking) edited solution-manual suitable to be ...
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Eidws 108 networks
Eidws 108 networksEidws 108 networks
Eidws 108 networks
 
computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456computer pdf revision for all aspirants123456
computer pdf revision for all aspirants123456
 
Computer Network Theory Part 4
Computer Network Theory Part 4Computer Network Theory Part 4
Computer Network Theory Part 4
 
CCNA DUMPS 640-802
CCNA DUMPS 640-802CCNA DUMPS 640-802
CCNA DUMPS 640-802
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Ans.tutorial#2
Ans.tutorial#2Ans.tutorial#2
Ans.tutorial#2
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-css
 
Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01
 
1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docx1- which oh the following might be used by a company to satisfy its gr.docx
1- which oh the following might be used by a company to satisfy its gr.docx
 
exam2
exam2exam2
exam2
 
12.7.2018
12.7.201812.7.2018
12.7.2018
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 

Mais de Dsunte Wilson

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 

Mais de Dsunte Wilson (19)

Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

CCNA Network Devices Questions

  • 1. Chapter 2 True/False Indicate whether the statement is true or false. ____ 1. The number of nodes on a network and the length of cable used influence the quality of communication on the network. ____ 2. Repeaters and hubs reformat data structures, so they can connect networks that require different types of frames. ____ 3. The IEEE standards for WLANs use unlicensed, but not unregulated, radio frequencies. ____ 4. Bridges operate at the Network layer of the OSI model. ____ 5. Like bridges, switches operate at the Network layer of the OSI model. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. On analog networks, devices that boost the signal are called ____. a. routers c. hubs b. amplifiers d. repeaters ____ 7. Devices that “see” the traffic of other devices are said to be on the same ____ as those devices. a. ring c. level b. block d. collision domain ____ 8. If a single access point is available in infrastructure mode, then the mode is said to be a(n) ____. a. Virtual Service Set (VSS) c. Basic Service Set (BSS) b. Extended Service Set (ESS) d. Logical Service Set (LSS) ____ 9. Typically WLANs involve multiple access points connected to various switches in the network. This type of infrastructure mode is known as a(n) ____. a. Extended Service Set (ESS) c. Virtual Service Set (VSS) b. Basic Service Set (BSS) d. Logical Service Set (LSS) ____ 10. A ____ filters traffic between network segments by examining the destination MAC address. a. hub c. router b. repeater d. bridge ____ 11. ____ increase network performance by reducing the number of frames transmitted to the rest of the network. a. Switches c. Hubs b. Gateways d. Amplifiers ____ 12. Switches filter based on ____ addresses. a. logical c. MAC b. IP d. TCP/IP ____ 13. ____ provide filtering and network traffic control on LANs and WANs. These devices can connect multiple segments and multiple networks.
  • 2. a. Hubs c. Switches b. Routers d. Bridges ____ 14. Routers operate at the ____ layer of the OSI model. a. Network c. Data Link b. Transport d. Physical ____ 15. When TCP/IP is used on an internetwork, the logical address is known as a(n) ____ address. a. MAC c. physical b. IP d. domain ____ 16. ____ are commonly used to connect networks to the Internet. a. Bridges c. Routers b. Switches d. Hubs ____ 17. A(n) ____ functions as both a bridge for nonroutable protocols and a router for routable protocols. a. switch c. amplifier b. hub d. brouter ____ 18. A(n) ____ is usually a combination of hardware and software. Its purpose is to translate between different protocol suites. a. amplifier c. hub b. gateway d. router ____ 19. ____ have the most negative effect on network performance. a. Routers c. Switches b. Bridges d. Gateways ____ 20. ____ is a network access method (or media access method) originated by the University of Hawaii. a. FDDI c. Ethernet b. AppleTalk d. Token Ring ____ 21. Ethernet uses ____ to prevent data packets from colliding on the network. a. CSMA/CD c. AppleTalk b. CSMA/CA d. LPC ____ 22. A ____ is the physical area in which a frame collision might occur. a. signal domain c. jam domain b. jam area d. collision domain ____ 23. ____ Ethernet uses the same network access method (CSMA/CD) as common 10BaseT Ethernet, but provides 10 times the data transmission rate. a. Fast c. 10 Gigabit b. Gigabit d. Terabit ____ 24. Fast Ethernet is defined under the IEEE ____ standard. a. 802.3b c. 802.3u b. 802.3f d. 802.3z ____ 25. In ____ communications, devices can send and receive signals, but not at the same time. a. full-duplex c. duplex b. half-duplex d. wire-duplex ____ 26. In ____ communications, devices can send and receive signals simultaneously.
  • 3. a. full-duplex c. half-duplex b. mutex d. single-duplex Completion Complete each statement. 27. ____________________ usually refers to the physical layout of network cable and devices. 28. ____________________ provide cell-based areas where wireless clients such as laptops and PDAs can connect to the network by associating with the access point. 29. ____________________ is the breaking down of a single heavily populated network segment into smaller segments, or collision domains, populated by fewer nodes. 30. A switch opens a(n) ____________________ between the source and the destination. This prevents communications between just two computers from being broadcast to every computer on the network or segment. 31. When machines must share a wire and compete for available bandwidth with other machines, they experience ____________________. Matching Match each item with a statement below: a. Attenuation f. Broadcast storm b. Hub g. Microsegmentation c. Service Set Identifier (SSID) h. Internetworks d. Segment i. Broadcast domain e. Broadcast frame ____ 32. a group of network devices that will receive LAN broadcast traffic from each other ____ 33. a generic connection device used to tie several networking cables together to create a link between different stations on a network ____ 34. preventing communications between just two computers from being broadcast to every computer on the network or segment ____ 35. when two or more stations engage in the transmission of excessive broadcast traffic ____ 36. networks connected by multiple routers ____ 37. a part of a network that is divided logically or physically from the rest of the network ____ 38. wireless network name ____ 39. a frame destined for all computers on the network ____ 40. degradation of signal clarity Short Answer
  • 4. 41. Describe active and passive hubs. 42. What are the advantages of using repeaters and hubs? 43. Briefly describe the components of a wireless network. 44. What are the steps for adding a WLAN to a LAN? 45. Briefly describe transparent bridges. 46. What are the advantages of using a bridge? 47. What are the advantages of using switches? 48. What are the disadvantages of using routers on the network? 49. Briefly describe Gigabit Ethernet. 50. What are the benefits of using full-duplex?