SlideShare uma empresa Scribd logo
1 de 9
Chapter 12

           True/False
           Indicate whether the statement is true or false.

____    1. Routers, switches, bridges, and gateways segment networks and thus create separate collision domains.

____    2. When a segment has too much broadcast traffic, utilization increases and network performance in general
           benefits.

____    3. IEEE 802.3u specifies two types of repeaters: Class I and Class II. Class II repeaters have higher latency than
           Class I repeaters.

____    4. The main difference between a switch and a bridge is that the switch typically connects multiple stations indi-
           vidually, thereby segmenting a LAN into multiple collision domains.

____    5. You cannot actually configure a router until you get to enable mode.


           Multiple Choice
           Identify the choice that best completes the statement or answers the question.

____    6. A(n) ____ is the physical area in which a packet collision might occur.
           a. backoff domain                               c. IPG domain
           b. collision domain                             d. jam domain
____    7. Stations on a network ____ packets to other stations to make their presence known on the network and to car-
           ry out normal network tasks such as IP address-to-MAC address resolution.
           a. broadcast                                    c. multicast
           b. unicast                                      d. anycast
____    8. ____ refers to the amount of time required to transmit one data bit on a network.
           a. Transmission time                             c. Latency
           b. Slot time                                     d. Bit time
____    9. ____ specifies that all collisions should be detected from anywhere in a network in less time than is required
           to place a 64-byte frame on the network.
           a. Latency                                        c. Slot time
           b. Transmission time                              d. Bit time
____ 10. A ____ error indicates that bits of a frame were corrupted during transmission,
         a. frame check sequence (FCS)                    c. long frame
         b. jabber                                        d. short frame
____ 11. A(n) ____ occurs when two stations transmit more than 64 bytes of data frames before detecting a collision.
         a. jabber                                    c. late collision
         b. NIC error                                 d. alignment error
____ 12. A bridge maintains a ____ that maps the MAC addresses on each segment to the corresponding port on the
         bridge to which each segment is connected.
         a. multicast table                           c. bandwidth table
         b. map table                                 d. bridging table
____ 13. A ____ operates at layer 3 of the OSI reference model. It interprets the Network layer protocol and makes for-
         warding decisions based on the layer 3 address.
         a. switch                                       c. bridge
         b. router                                       d. hub
____ 14. In ____ memory buffering, each port has a certain amount of memory that it can use to store frames.
         a. exclusive                                   c. port-based
         b. shared                                      d. content-addressable
____ 15. With ____ memory buffering, any port can store frames in the shared memory buffer.
         a. content-addressable                        c. port-based
         b. shared                                     d. exclusive
____ 16. Some switches can interconnect network interfaces of different speeds. These switches use ____ switching
         and, typically, a shared memory buffer.
         a. symmetric                                  c. virtual
         b. shared                                     d. asymmetric
____ 17. Switches that use ____ forwarding start sending a frame immediately after reading the destination MAC ad-
         dress into their buffers.
         a. cut-through                                 c. fragment-free
         b. store-and-forward                           d. adaptive cut-through forwarding
____ 18. ____ switches read the entire frame, no matter how large, into their buffers before forwarding.
         a. Fast-forward                                 c. fragment-free
         b. Store-and-forward                            d. cut-through
____ 19. ____ represents an effort to provide more error-reducing benefits than cut-through switching, while keeping
         latency lower than does store-and-forward switching.
         a. Fragment-free forwarding                     c. Adaptive cut-through forwarding
         b. Fast forwarding                              d. Adaptive fast forwarding
____ 20. Fragment-free switches are also known as ____ switches.
         a. fast forwarding                            c. cut-through
         b. error sensing                              d. modified cut-through
____ 21. Two types of operating systems are in use on Cisco switches: IOS-based and ____.
         a. terminal-based                              c. set-based
         b. command-based                               d. prompt-based
____ 22. To enter enable mode, type ____ at the command-line prompt and then press Enter.
         a. enable                                    c. enable on
         b. mode -enable                              d. set enable
____ 23. To start configuration mode, first type ____ at the command prompt.
         a. cfg trmnl                                     c. config t
         b. config tty                                    d. cfg t
____ 24. Generally speaking, a switch does not require an IP address, because switches operate mainly on Layer 2
         (____ addresses).
         a. IP                                           c. IPX
         b. TCP                                          d. MAC
____ 25. To view the configuration of a port, use the ____ command.
         a. display                                      c. interface
         b.  show                                        d. port
____ 26. Cisco uses the term ____ to refer to the process by which a switch learns addresses on its own.
         a. ipg learn                                     c. sticky learn
         b. switch learn                                  d. sticky memory


            Completion
            Complete each statement.

      27. ____________________ is a network access method (or media access method) originated by the University
          of Hawaii, later adopted by Xerox Corporation, and standardized as IEEE 802.3 in the early 1980s.

      28. The amount of time it takes for a packet to be sent from one device to another is called the
          ____________________.

      29. In ____________________ communications, devices can send and receive signals, but not at the same time.

      30. In ____________________ communications, devices can send and receive signals simultaneously.

      31. The MAC-to-switch-port mapping is stored in the switch’s ______________________________.


            Matching

            Match each item with a statement below:
            a. CSMA/CD                                     f.   Bridge
            b. Broadcast storm                             g.   Symmetric switching
            c. Latency                                     h.   Adaptive cut-through forwarding
            d. 5-4-3 rule                                  i.   VLAN
            e. Alignment error
____ 32. a frame with an FCS error and an octet missing
____ 33. virtual local area network that allows you to logically segment a network
____ 34. switches that require all attached network interface devices to use the same transmit/receive speed
____ 35. a sudden rush of network transmissions that causes all other network communications to slow down due to
         the volume of data competing for access to the same bandwidth on the communications medium
____ 36. segments a network by filtering traffic at the Data Link layer
____ 37. the length of time that is required to forward, send, or otherwise propagate a data frame
____ 38. also known as error sensing
____ 39. limits collision domains to five segments of wire, four repeaters and/or hubs, and three populated hubs be-
         tween any two stations on a 10-Mbps network
____ 40. Ethernet contention method
Short Answer

41. How are collisions handled by CSMA/CD?

42. Describe a simple way to reduce broadcast traffic.

43. What are some of the frame size errors that occur on Ethernet networks?

44. What are the three defined implementations of Fast Ethernet?

45. What are the Gigabit Ethernet specifications and the governing IEEE standards?

46. What are the benefits of using full-duplex?

47. What are the benefits provided by switches?

48. Describe cut-through forwarding switching.

49. How can you set the host name on a Cisco Catalyst switch?
50. Describe the violation command for configuring port security.
      Chapter 12
      Answer Section

      TRUE/FALSE

 1.   ANS:   T          PTS:   1            REF:   338
 2.   ANS:   F          PTS:   1            REF:   339
 3.   ANS:   F          PTS:   1            REF:   342
 4.   ANS:   T          PTS:   1            REF:   346
 5.   ANS:   T          PTS:   1            REF:   351


      MULTIPLE CHOICE

 6.   ANS:   B          PTS:   1            REF:   338
 7.   ANS:   A          PTS:   1            REF:   339
 8.   ANS:   D          PTS:   1            REF:   340
 9.   ANS:   C          PTS:   1            REF:   340
10.   ANS:   A          PTS:   1            REF:   341
11.   ANS:   C          PTS:   1            REF:   341
12.   ANS:   D          PTS:   1            REF:   345
13.   ANS:   B          PTS:   1            REF:   345
14.   ANS:   C          PTS:   1            REF:   348
15.   ANS:   B          PTS:   1            REF:   348
16.   ANS:   D          PTS:   1            REF:   348
17.   ANS:   A          PTS:   1            REF:   349
18.   ANS:   B          PTS:   1            REF:   350
19.   ANS:   A          PTS:   1            REF:   350
20.   ANS:   D          PTS:   1            REF:   351
21.   ANS:   C          PTS:   1            REF:   351
22.   ANS:   A          PTS:   1            REF:   351
23.   ANS:   C          PTS:   1            REF:   351
24.   ANS:   D          PTS:   1            REF:   352
25.   ANS:   B          PTS:   1            REF:   353
26.   ANS:   C          PTS:   1            REF:   354


      COMPLETION

27. ANS: Ethernet

    PTS: 1              REF: 338
28. ANS: transmission time

    PTS: 1              REF: 340
29. ANS: half-duplex
PTS: 1                   REF: 343
30. ANS:
    full-duplex
    duplex

    PTS: 1               REF: 343
31. ANS:
    content-addressable memory (CAM)
    content-addressable memory
    CAM

      PTS: 1                 REF: 348


      MATCHING

32.   ANS:   E               PTS:    1               REF:   341
33.   ANS:   I               PTS:    1               REF:   352
34.   ANS:   G               PTS:    1               REF:   348
35.   ANS:   B               PTS:    1               REF:   339
36.   ANS:   F               PTS:    1               REF:   344
37.   ANS:   C               PTS:    1               REF:   340
38.   ANS:   H               PTS:    1               REF:   351
39.   ANS:   D               PTS:    1               REF:   340
40.   ANS:   A               PTS:    1               REF:   338


      SHORT ANSWER

41. ANS:
    Even though stations must listen to the wire before sending a transmission, two stations could listen to the
    wire simultaneously and not sense a carrier signal. In such a case, both stations might begin to transmit their
    data simultaneously. Shortly after the simultaneous transmissions, a collision would occur on the network
    wire. The stations would detect the collision as their transmitted signals collided with one another.

      Once a collision is detected, the first station to detect the collision transmits a 32-bit jam signal that tells all
      other stations not to transmit for a brief period (9.6 microseconds or slightly more). The jam signal is used to
      ensure that all stations are aware that a collision has occurred. After the jam signal is transmitted, the two sta-
      tions that caused the collision use an algorithm to enter a backoff period, which causes them not to transmit
      for a random interval. The backoff period is an attempt to ensure that the two stations do not immediately
      cause another collision.

    PTS: 1                   REF: 338
42. ANS:
One simple way to reduce broadcast traffic is to reduce the number of services that servers provide on your
     network and to limit the number of protocols in use on your network. Limiting the number of services will
     help because each computer that provides a service, such as file sharing, broadcasts its service at a periodic
     interval over each protocol it has configured. Many operating systems allow you to bind the service selective-
     ly to only a specific protocol, which will reduce broadcast traffic on the network. You can also eliminate un-
     necessary protocols to eliminate broadcast traffic on the network. An example of an unnecessary protocol is
     the IPX protocol on a server in an IP-only network. In this case, services would be advertised on both IP and
     IPX, when other stations would only be communicating via IP. IPX advertisements and the use of the IPX
     protocol is unnecessary in this case because no other stations on the network would be using IPX.

    PTS: 1                  REF: 339
43. ANS:
    An Ethernet packet sent between two stations should be between 64 bytes and 1518 bytes. According to Eth-
    ernet specifications, shorter or longer frames are errors. Frame size errors that occur on Ethernet networks in-
    clude:
    • Short frame or runt—A frame that is shorter than 64 bytes. A collision, a faulty network adapter, corrupt
    NIC software drivers, or a repeater fault can cause this error.
    • Long frame or giant—A frame that is larger than 1518 bytes. Because 1518 is the largest legal frame size, a
    long frame is too large to be valid. A collision, faulty network adapter, illegal hardware configuration,
    transceiver or cable fault, termination problem, corrupt NIC software drivers, repeater fault, or noise can
    cause this error.
    • Jabber—This is another classification for giant or long frames. This frame is longer than Ethernet standards
    allow (1518 bytes) and has an incorrect frame check sequence (FCS).

    PTS: 1                 REF: 341
44. ANS:
    Fast Ethernet, which is defined under the IEEE 802.3u standard, has three defined implementations:
    • 100Base-TX—Uses two pairs of either Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair
    (STP); one pair is used for transmit (TX), and the other is used for receive (RX). The maximum segment
    length is 100 meters; two Class II repeaters and a five-meter patch cable can be used to create a maximum
    distance of 205 meters between stations for each collision domain.
    • 100Base-T4—Uses four pairs of either Category 3, 4, or 5 UTP cable; one pair is used for TX, one pair for
    RX, and two pairs are used as bidirectional data pairs. The maximum segment length is 100 meters; as with
    100Base-TX, two Class II repeaters and a five-meter patch cable can be used to create a maximum distance of
    205 meters between stations for each collision domain. Because all four pairs are used, the T4 specification
    does not support full-duplexing, which is discussed in the next section.
    • 100Base-FX—Uses multimode fiber-optic (MMF) cable with one TX and one RX strand per link. The max-
    imum segment length is 412 meters.

    PTS: 1                 REF: 342
45. ANS:
    The Gigabit Ethernet specifications and the governing IEEE standards are:
    • 1000Base-TX (802.3ab)—Uses four pairs of Category 5 unshielded twisted-pair cable. The maximum seg-
    ment length is 100 meters.
    • 1000Base-SX (802.3z)—Uses multimode fiber. The maximum segment length varies based on what type of
    fiber is being used. For example, using a 62.5 micron core, the maximum length is 220 meters. When using a
    50 micron core, the maximum length is 550 meters.
    • 1000Base-LX (802.3z)—Uses single-mode fiber. The maximum distance for this standard is 10 kilometers.
    • 1000Base-CX (802.3z)—Uses shielded twisted-pair copper cabling. The maximum segment length is 25 me-
    ters.
PTS: 1                 REF: 343
46. ANS:
    The benefits of using full-duplex are:
    • Time is not wasted retransmitting frames because collisions do not occur.
    • The full bandwidth is available in both directions because the send and receive functions are separate.
    • Stations do not have to wait until other stations complete their transmissions because only one transmitter is
    used for each twisted pair.

    PTS: 1                  REF: 344
47. ANS:
    Switches provide the following benefits:
    • Reduction in network traffic and collisions
    • Increase in available bandwidth per station, because stations can communicate in parallel
    • Increase in the effective distance of a LAN by dividing it into multiple collision domains
    • Increased security, because unicast traffic is sent directly to its destination and not to all other stations on the
    collision domain

    PTS: 1                 REF: 347
48. ANS:
    Switches that use cut-through forwarding start sending a frame immediately after reading the destination
    MAC address into their buffers. The main benefit of cut-through forwarding is a reduction in latency, because
    the forwarding decision is made almost immediately after the frame is received. For example, the switching
    decision is made after receiving 14 bytes of a standard Ethernet frame.

     The drawback to forwarding the frame immediately is the potential for errors in the frame that the switch
     would be unable to detect because the switch only reads a small portion of the frame into its buffer. Of course,
     any errors that occur in the preamble, start frame delimiter (SFD), or destination address fields will not be
     propagated by the switch, unless they are corrupted in such a way as to appear valid, which is highly unlikely.

    PTS: 1                  REF: 349-350
49. ANS:
    The actual task of setting the host name on the Cisco Catalyst switch is identical to setting the host name on a
    Cisco router. As with the router, the host name is only locally significant—that is, the function of the name is
    to identify the switch, not to provide any sort of Internet name resolution. It is best to select a name that clear-
    ly identifies the location of the switch. For example, if you worked for a company named HudLogic, Inc. and
    its switch was on the fourth floor of Room 410, you might name the switch Rm410HL. To configure this
    name, you would type:
    Switch(config)#hostname Rm410HL

     Once the host name is set, the prompt will change to reflect the name of the switch. Continuing our example,
     the prompt would change to:
     Rm410HL(config)#

    PTS: 1                  REF: 352
50. ANS:
The violation command dictates what happens when a switch encounters a violation of the configured
switchport security. The default is to shut down the interface. You can also define the action with one of the
following three options: protect, restrict, and shutdown. The protect option stops forwarding of
traffic from any host that connects after the maximum number of MAC addresses has been learned. In our ex-
ample, the maximum number of MAC addresses is 10. If the protect option was selected, the 11th address
and any subsequent new MAC addresses on the port would be prevented from communicating. The restrict
option also stops all traffic above the number of defined MAC addresses. In addition, it sends an alert that a
security violation has occurred. The final option, shutdown, shuts the port down if a security violation oc-
curs.

PTS: 1                REF: 354

Mais conteúdo relacionado

Mais procurados

CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1Irsandi Hasan
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetVuz Dở Hơi
 
Exercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With SolutionsExercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With SolutionsFelipe Suarez
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01Irsandi Hasan
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02Irsandi Hasan
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6sandeepjain
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING AYESHA JAVED
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)Respa Peter
 
Ipv6 the next generation protocol
Ipv6 the next generation protocolIpv6 the next generation protocol
Ipv6 the next generation protocolPRADEEP Cheekatla
 
SCSI(small computer system interface)
SCSI(small computer system interface)SCSI(small computer system interface)
SCSI(small computer system interface)Niraj Lamichhane
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
Bgp multihoming
Bgp multihomingBgp multihoming
Bgp multihomingee38sp
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4Nil Menon
 

Mais procurados (20)

CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
CCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - EthernetCCNAv5 - S1: Chapter 5 - Ethernet
CCNAv5 - S1: Chapter 5 - Ethernet
 
Exercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With SolutionsExercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With Solutions
 
CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01CCNA v6.0 ITN - Chapter 01
CCNA v6.0 ITN - Chapter 01
 
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 02
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Dhcp
DhcpDhcp
Dhcp
 
Internet Protocol Version 6
Internet Protocol Version 6Internet Protocol Version 6
Internet Protocol Version 6
 
DHCP
DHCPDHCP
DHCP
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING IP NETWORKING AND IP SUBNET MASKING
IP NETWORKING AND IP SUBNET MASKING
 
Open shortest path first (ospf)
Open shortest path first (ospf)Open shortest path first (ospf)
Open shortest path first (ospf)
 
Ipv6 the next generation protocol
Ipv6 the next generation protocolIpv6 the next generation protocol
Ipv6 the next generation protocol
 
PCI BUS
PCI BUSPCI BUS
PCI BUS
 
SCSI(small computer system interface)
SCSI(small computer system interface)SCSI(small computer system interface)
SCSI(small computer system interface)
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Bgp multihoming
Bgp multihomingBgp multihoming
Bgp multihoming
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4CCNA 1 Routing and Switching v5.0 Chapter 4
CCNA 1 Routing and Switching v5.0 Chapter 4
 

Destaque

CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Digital Transmission Fundamentals
Digital Transmission FundamentalsDigital Transmission Fundamentals
Digital Transmission FundamentalsAisu
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkVuz Dở Hơi
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksVuz Dở Hơi
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationVuz Dở Hơi
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSAshita Agrawal
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 

Destaque (20)

CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
Digital Transmission Fundamentals
Digital Transmission FundamentalsDigital Transmission Fundamentals
Digital Transmission Fundamentals
 
CCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The NetworkCCNAv5 - S1: Chapter 1 Exploring The Network
CCNAv5 - S1: Chapter 1 Exploring The Network
 
CCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networksCCNAv5 - S2: Chapter1 Introsuction to switched networks
CCNAv5 - S2: Chapter1 Introsuction to switched networks
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
INTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMSINTRODUCTION TO UML DIAGRAMS
INTRODUCTION TO UML DIAGRAMS
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 

Semelhante a Chapter 12 True/False and Multiple Choice Questions

CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices QuestionsDsunte Wilson
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsDsunte Wilson
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsDsunte Wilson
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsDsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsDsunte Wilson
 
100 objective question eis
100 objective question eis100 objective question eis
100 objective question eisgajani121
 
352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGNKylieJonathan
 
640 802 exam
640 802 exam640 802 exam
640 802 examliemgpc2
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsDsunte Wilson
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communicationsHarishKumar2054
 
Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full nataliej4
 

Semelhante a Chapter 12 True/False and Multiple Choice Questions (20)

CCNA Network Devices Questions
CCNA Network Devices QuestionsCCNA Network Devices Questions
CCNA Network Devices Questions
 
CCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay QuestionsCCNA PPP and Frame Relay Questions
CCNA PPP and Frame Relay Questions
 
CCNA Routing Protocols Questions
CCNA Routing Protocols QuestionsCCNA Routing Protocols Questions
CCNA Routing Protocols Questions
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols QuestionsCCNA Advanced Routing Protocols Questions
CCNA Advanced Routing Protocols Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
CCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration QuestionsCCNA Router Startup and Configuration Questions
CCNA Router Startup and Configuration Questions
 
100 objective question eis
100 objective question eis100 objective question eis
100 objective question eis
 
Networking
NetworkingNetworking
Networking
 
exam2
exam2exam2
exam2
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
Prb#5
Prb#5Prb#5
Prb#5
 
352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN
 
CCNA DUMPS 640-802
CCNA DUMPS 640-802CCNA DUMPS 640-802
CCNA DUMPS 640-802
 
640 802 exam
640 802 exam640 802 exam
640 802 exam
 
CCNA Router and IOS Basics Questions
CCNA Router and IOS Basics QuestionsCCNA Router and IOS Basics Questions
CCNA Router and IOS Basics Questions
 
Solution manual for_data_communications
Solution manual for_data_communicationsSolution manual for_data_communications
Solution manual for_data_communications
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full Đề Thi Trắc Nghiệm CCNA Full
Đề Thi Trắc Nghiệm CCNA Full
 

Mais de Dsunte Wilson

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Dsunte Wilson
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists QuestionsDsunte Wilson
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services QuestionsDsunte Wilson
 

Mais de Dsunte Wilson (9)

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
CCNA Access Lists Questions
CCNA Access Lists QuestionsCCNA Access Lists Questions
CCNA Access Lists Questions
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Chapter 12 True/False and Multiple Choice Questions

  • 1. Chapter 12 True/False Indicate whether the statement is true or false. ____ 1. Routers, switches, bridges, and gateways segment networks and thus create separate collision domains. ____ 2. When a segment has too much broadcast traffic, utilization increases and network performance in general benefits. ____ 3. IEEE 802.3u specifies two types of repeaters: Class I and Class II. Class II repeaters have higher latency than Class I repeaters. ____ 4. The main difference between a switch and a bridge is that the switch typically connects multiple stations indi- vidually, thereby segmenting a LAN into multiple collision domains. ____ 5. You cannot actually configure a router until you get to enable mode. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. A(n) ____ is the physical area in which a packet collision might occur. a. backoff domain c. IPG domain b. collision domain d. jam domain ____ 7. Stations on a network ____ packets to other stations to make their presence known on the network and to car- ry out normal network tasks such as IP address-to-MAC address resolution. a. broadcast c. multicast b. unicast d. anycast ____ 8. ____ refers to the amount of time required to transmit one data bit on a network. a. Transmission time c. Latency b. Slot time d. Bit time ____ 9. ____ specifies that all collisions should be detected from anywhere in a network in less time than is required to place a 64-byte frame on the network. a. Latency c. Slot time b. Transmission time d. Bit time ____ 10. A ____ error indicates that bits of a frame were corrupted during transmission, a. frame check sequence (FCS) c. long frame b. jabber d. short frame ____ 11. A(n) ____ occurs when two stations transmit more than 64 bytes of data frames before detecting a collision. a. jabber c. late collision b. NIC error d. alignment error ____ 12. A bridge maintains a ____ that maps the MAC addresses on each segment to the corresponding port on the bridge to which each segment is connected. a. multicast table c. bandwidth table b. map table d. bridging table
  • 2. ____ 13. A ____ operates at layer 3 of the OSI reference model. It interprets the Network layer protocol and makes for- warding decisions based on the layer 3 address. a. switch c. bridge b. router d. hub ____ 14. In ____ memory buffering, each port has a certain amount of memory that it can use to store frames. a. exclusive c. port-based b. shared d. content-addressable ____ 15. With ____ memory buffering, any port can store frames in the shared memory buffer. a. content-addressable c. port-based b. shared d. exclusive ____ 16. Some switches can interconnect network interfaces of different speeds. These switches use ____ switching and, typically, a shared memory buffer. a. symmetric c. virtual b. shared d. asymmetric ____ 17. Switches that use ____ forwarding start sending a frame immediately after reading the destination MAC ad- dress into their buffers. a. cut-through c. fragment-free b. store-and-forward d. adaptive cut-through forwarding ____ 18. ____ switches read the entire frame, no matter how large, into their buffers before forwarding. a. Fast-forward c. fragment-free b. Store-and-forward d. cut-through ____ 19. ____ represents an effort to provide more error-reducing benefits than cut-through switching, while keeping latency lower than does store-and-forward switching. a. Fragment-free forwarding c. Adaptive cut-through forwarding b. Fast forwarding d. Adaptive fast forwarding ____ 20. Fragment-free switches are also known as ____ switches. a. fast forwarding c. cut-through b. error sensing d. modified cut-through ____ 21. Two types of operating systems are in use on Cisco switches: IOS-based and ____. a. terminal-based c. set-based b. command-based d. prompt-based ____ 22. To enter enable mode, type ____ at the command-line prompt and then press Enter. a. enable c. enable on b. mode -enable d. set enable ____ 23. To start configuration mode, first type ____ at the command prompt. a. cfg trmnl c. config t b. config tty d. cfg t ____ 24. Generally speaking, a switch does not require an IP address, because switches operate mainly on Layer 2 (____ addresses). a. IP c. IPX b. TCP d. MAC
  • 3. ____ 25. To view the configuration of a port, use the ____ command. a. display c. interface b. show d. port ____ 26. Cisco uses the term ____ to refer to the process by which a switch learns addresses on its own. a. ipg learn c. sticky learn b. switch learn d. sticky memory Completion Complete each statement. 27. ____________________ is a network access method (or media access method) originated by the University of Hawaii, later adopted by Xerox Corporation, and standardized as IEEE 802.3 in the early 1980s. 28. The amount of time it takes for a packet to be sent from one device to another is called the ____________________. 29. In ____________________ communications, devices can send and receive signals, but not at the same time. 30. In ____________________ communications, devices can send and receive signals simultaneously. 31. The MAC-to-switch-port mapping is stored in the switch’s ______________________________. Matching Match each item with a statement below: a. CSMA/CD f. Bridge b. Broadcast storm g. Symmetric switching c. Latency h. Adaptive cut-through forwarding d. 5-4-3 rule i. VLAN e. Alignment error ____ 32. a frame with an FCS error and an octet missing ____ 33. virtual local area network that allows you to logically segment a network ____ 34. switches that require all attached network interface devices to use the same transmit/receive speed ____ 35. a sudden rush of network transmissions that causes all other network communications to slow down due to the volume of data competing for access to the same bandwidth on the communications medium ____ 36. segments a network by filtering traffic at the Data Link layer ____ 37. the length of time that is required to forward, send, or otherwise propagate a data frame ____ 38. also known as error sensing ____ 39. limits collision domains to five segments of wire, four repeaters and/or hubs, and three populated hubs be- tween any two stations on a 10-Mbps network ____ 40. Ethernet contention method
  • 4. Short Answer 41. How are collisions handled by CSMA/CD? 42. Describe a simple way to reduce broadcast traffic. 43. What are some of the frame size errors that occur on Ethernet networks? 44. What are the three defined implementations of Fast Ethernet? 45. What are the Gigabit Ethernet specifications and the governing IEEE standards? 46. What are the benefits of using full-duplex? 47. What are the benefits provided by switches? 48. Describe cut-through forwarding switching. 49. How can you set the host name on a Cisco Catalyst switch?
  • 5. 50. Describe the violation command for configuring port security. Chapter 12 Answer Section TRUE/FALSE 1. ANS: T PTS: 1 REF: 338 2. ANS: F PTS: 1 REF: 339 3. ANS: F PTS: 1 REF: 342 4. ANS: T PTS: 1 REF: 346 5. ANS: T PTS: 1 REF: 351 MULTIPLE CHOICE 6. ANS: B PTS: 1 REF: 338 7. ANS: A PTS: 1 REF: 339 8. ANS: D PTS: 1 REF: 340 9. ANS: C PTS: 1 REF: 340 10. ANS: A PTS: 1 REF: 341 11. ANS: C PTS: 1 REF: 341 12. ANS: D PTS: 1 REF: 345 13. ANS: B PTS: 1 REF: 345 14. ANS: C PTS: 1 REF: 348 15. ANS: B PTS: 1 REF: 348 16. ANS: D PTS: 1 REF: 348 17. ANS: A PTS: 1 REF: 349 18. ANS: B PTS: 1 REF: 350 19. ANS: A PTS: 1 REF: 350 20. ANS: D PTS: 1 REF: 351 21. ANS: C PTS: 1 REF: 351 22. ANS: A PTS: 1 REF: 351 23. ANS: C PTS: 1 REF: 351 24. ANS: D PTS: 1 REF: 352 25. ANS: B PTS: 1 REF: 353 26. ANS: C PTS: 1 REF: 354 COMPLETION 27. ANS: Ethernet PTS: 1 REF: 338 28. ANS: transmission time PTS: 1 REF: 340 29. ANS: half-duplex
  • 6. PTS: 1 REF: 343 30. ANS: full-duplex duplex PTS: 1 REF: 343 31. ANS: content-addressable memory (CAM) content-addressable memory CAM PTS: 1 REF: 348 MATCHING 32. ANS: E PTS: 1 REF: 341 33. ANS: I PTS: 1 REF: 352 34. ANS: G PTS: 1 REF: 348 35. ANS: B PTS: 1 REF: 339 36. ANS: F PTS: 1 REF: 344 37. ANS: C PTS: 1 REF: 340 38. ANS: H PTS: 1 REF: 351 39. ANS: D PTS: 1 REF: 340 40. ANS: A PTS: 1 REF: 338 SHORT ANSWER 41. ANS: Even though stations must listen to the wire before sending a transmission, two stations could listen to the wire simultaneously and not sense a carrier signal. In such a case, both stations might begin to transmit their data simultaneously. Shortly after the simultaneous transmissions, a collision would occur on the network wire. The stations would detect the collision as their transmitted signals collided with one another. Once a collision is detected, the first station to detect the collision transmits a 32-bit jam signal that tells all other stations not to transmit for a brief period (9.6 microseconds or slightly more). The jam signal is used to ensure that all stations are aware that a collision has occurred. After the jam signal is transmitted, the two sta- tions that caused the collision use an algorithm to enter a backoff period, which causes them not to transmit for a random interval. The backoff period is an attempt to ensure that the two stations do not immediately cause another collision. PTS: 1 REF: 338 42. ANS:
  • 7. One simple way to reduce broadcast traffic is to reduce the number of services that servers provide on your network and to limit the number of protocols in use on your network. Limiting the number of services will help because each computer that provides a service, such as file sharing, broadcasts its service at a periodic interval over each protocol it has configured. Many operating systems allow you to bind the service selective- ly to only a specific protocol, which will reduce broadcast traffic on the network. You can also eliminate un- necessary protocols to eliminate broadcast traffic on the network. An example of an unnecessary protocol is the IPX protocol on a server in an IP-only network. In this case, services would be advertised on both IP and IPX, when other stations would only be communicating via IP. IPX advertisements and the use of the IPX protocol is unnecessary in this case because no other stations on the network would be using IPX. PTS: 1 REF: 339 43. ANS: An Ethernet packet sent between two stations should be between 64 bytes and 1518 bytes. According to Eth- ernet specifications, shorter or longer frames are errors. Frame size errors that occur on Ethernet networks in- clude: • Short frame or runt—A frame that is shorter than 64 bytes. A collision, a faulty network adapter, corrupt NIC software drivers, or a repeater fault can cause this error. • Long frame or giant—A frame that is larger than 1518 bytes. Because 1518 is the largest legal frame size, a long frame is too large to be valid. A collision, faulty network adapter, illegal hardware configuration, transceiver or cable fault, termination problem, corrupt NIC software drivers, repeater fault, or noise can cause this error. • Jabber—This is another classification for giant or long frames. This frame is longer than Ethernet standards allow (1518 bytes) and has an incorrect frame check sequence (FCS). PTS: 1 REF: 341 44. ANS: Fast Ethernet, which is defined under the IEEE 802.3u standard, has three defined implementations: • 100Base-TX—Uses two pairs of either Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair (STP); one pair is used for transmit (TX), and the other is used for receive (RX). The maximum segment length is 100 meters; two Class II repeaters and a five-meter patch cable can be used to create a maximum distance of 205 meters between stations for each collision domain. • 100Base-T4—Uses four pairs of either Category 3, 4, or 5 UTP cable; one pair is used for TX, one pair for RX, and two pairs are used as bidirectional data pairs. The maximum segment length is 100 meters; as with 100Base-TX, two Class II repeaters and a five-meter patch cable can be used to create a maximum distance of 205 meters between stations for each collision domain. Because all four pairs are used, the T4 specification does not support full-duplexing, which is discussed in the next section. • 100Base-FX—Uses multimode fiber-optic (MMF) cable with one TX and one RX strand per link. The max- imum segment length is 412 meters. PTS: 1 REF: 342 45. ANS: The Gigabit Ethernet specifications and the governing IEEE standards are: • 1000Base-TX (802.3ab)—Uses four pairs of Category 5 unshielded twisted-pair cable. The maximum seg- ment length is 100 meters. • 1000Base-SX (802.3z)—Uses multimode fiber. The maximum segment length varies based on what type of fiber is being used. For example, using a 62.5 micron core, the maximum length is 220 meters. When using a 50 micron core, the maximum length is 550 meters. • 1000Base-LX (802.3z)—Uses single-mode fiber. The maximum distance for this standard is 10 kilometers. • 1000Base-CX (802.3z)—Uses shielded twisted-pair copper cabling. The maximum segment length is 25 me- ters.
  • 8. PTS: 1 REF: 343 46. ANS: The benefits of using full-duplex are: • Time is not wasted retransmitting frames because collisions do not occur. • The full bandwidth is available in both directions because the send and receive functions are separate. • Stations do not have to wait until other stations complete their transmissions because only one transmitter is used for each twisted pair. PTS: 1 REF: 344 47. ANS: Switches provide the following benefits: • Reduction in network traffic and collisions • Increase in available bandwidth per station, because stations can communicate in parallel • Increase in the effective distance of a LAN by dividing it into multiple collision domains • Increased security, because unicast traffic is sent directly to its destination and not to all other stations on the collision domain PTS: 1 REF: 347 48. ANS: Switches that use cut-through forwarding start sending a frame immediately after reading the destination MAC address into their buffers. The main benefit of cut-through forwarding is a reduction in latency, because the forwarding decision is made almost immediately after the frame is received. For example, the switching decision is made after receiving 14 bytes of a standard Ethernet frame. The drawback to forwarding the frame immediately is the potential for errors in the frame that the switch would be unable to detect because the switch only reads a small portion of the frame into its buffer. Of course, any errors that occur in the preamble, start frame delimiter (SFD), or destination address fields will not be propagated by the switch, unless they are corrupted in such a way as to appear valid, which is highly unlikely. PTS: 1 REF: 349-350 49. ANS: The actual task of setting the host name on the Cisco Catalyst switch is identical to setting the host name on a Cisco router. As with the router, the host name is only locally significant—that is, the function of the name is to identify the switch, not to provide any sort of Internet name resolution. It is best to select a name that clear- ly identifies the location of the switch. For example, if you worked for a company named HudLogic, Inc. and its switch was on the fourth floor of Room 410, you might name the switch Rm410HL. To configure this name, you would type: Switch(config)#hostname Rm410HL Once the host name is set, the prompt will change to reflect the name of the switch. Continuing our example, the prompt would change to: Rm410HL(config)# PTS: 1 REF: 352 50. ANS:
  • 9. The violation command dictates what happens when a switch encounters a violation of the configured switchport security. The default is to shut down the interface. You can also define the action with one of the following three options: protect, restrict, and shutdown. The protect option stops forwarding of traffic from any host that connects after the maximum number of MAC addresses has been learned. In our ex- ample, the maximum number of MAC addresses is 10. If the protect option was selected, the 11th address and any subsequent new MAC addresses on the port would be prevented from communicating. The restrict option also stops all traffic above the number of defined MAC addresses. In addition, it sends an alert that a security violation has occurred. The final option, shutdown, shuts the port down if a security violation oc- curs. PTS: 1 REF: 354