TAILIEUCHUNG - CCNA 1 and 2 Companion Guide, Revised (Cisco Networking Academy Program) part 35

Cisco Networking Academy Program CCNA 1 and 2 Companion Guide, Revised part 35 is the Cisco approved textbook to use alongside version of the Cisco Networking Academy Program CCNA 1 and CCNA 2 web-based courses. The topics covered provide you with the necessary knowledge to begin your preparation for the CCNA certification exam (640-801, or 640-821 and 640-811) and to enter the field of network administration. | Page 309 Tuesday May 20 2003 2 53 PM Check Your Understanding 309 Token Ring A token-passing LAN developed and supported by IBM. Token Ring runs at 4 or 16 Mbps over a ring topology. trailer Controls information appended to data when encapsulating the data for network transmission. Check Your Understanding Complete all the review questions to test your understanding of the topics and concepts in this chapter. Answers are listed in Appendix C Check Your Understanding Answer Key. 1. Which of the following is not one of the recognized IEEE sublayers A. Media Access Control B. Data Link Control C. Logical Link Control D. None of the above 2. The recognized IEEE sublayers are concerned with what layers of the OSI reference model A. 2 and 3 B. 1 and 2 C. 3 and 4 D. 1 and 3 3. The LLC as a sublayer participates in the process. A. Encryption B. Encapsulation C. Framing D. All of the above 4. The first six hexadecimal numbers in a MAC address represent an A. Interface serial number B. Organizationally unique identifier C. Interface unique identifier D. None of the above 4 iw Page 310 Tuesday May 20 2003 2 53 PM 310 Chapter 5 Ethernet Fundamentals 5. MAC addresses are bits in length. A. 12 B. 24 C. 48 D. 64 6. What is the name of the access method used in Ethernet that explains how Ethernet works A. TCP IP B. CSMA CD C. CMDA CS D. CSMA CA 7. Where does the MAC address reside A. Transceiver B. Computer BIOS C. NIC D. CMOS 8. Which of the following statements best describes communication between two devices on a LAN A. The source device encapsulates data in a frame with the MAC address of the destination device and then transmits it. Everyone on the LAN sees it but the devices with nonmatching addresses otherwise ignore the frame. B. The source encapsulates the data and places a destination MAC address in the frame. It puts the frame on the LAN where only the device with the matching address can check the address field. C. The destination device .

Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.