3.1 CCNA 1 - Module 6/7

1
Which of the following are specified by IEEE standards as sublayers
of the OSI data link layer? (Choose two.)
Logical Link Control
Logical Layer Control
Media Access Control
Logical Link Communication
Media Access Communication
Physical Access Communication

2
In an Ethernet LAN, how does the NIC know when it can transmit data?
An Ethernet NIC transmits data as soon as the frame is received.
An Ethernet NIC transmits data as soon as the NIC receives a token.
An Ethernet NIC transmits data when it senses a collision.
An Ethernet NIC transmits data after listening for the absence of a signal on the media.

3

Refer to the exhibit. Host A is communicating with host F.
What happens to a frame sent from host A to host F as it
travels over the Ethernet segments?
The frame format is modified as it passes through each switch.
The frame format remains the same across each Ethernet segment.
The frame format is modified as the media speed changed at
switch B and switch E.
The frame format is modified as the media material changes
between copper and fiber at switch C and switch D.

4
Which of the following are Fast Ethernet technologies? (Choose two.)
100BASE-5
100BASE2
1000BASE-F
100BASE-FX
100BASE-TX

5

Refer to the exhibit. The small office network shown in the exhibit
consists of four computers connected through a hub.
Which configuration would cause collisions and errors on the network?
autonegotiation
FastEthernet
peer-to-peer shared resources
administratively configured full duplex

6
A router has an Ethernet, Token Ring, serial, and ISDN interface.
Which interfaces will have a MAC address?
serial and ISDN interfaces
Ethernet and Token Ring interfaces
Ethernet and ISDN interfaces
Token Ring and serial interfaces

7

Refer to the exhibit. All hosts are in listen mode. Host 1 and
Host 4 both transmit data at the same time. How do the hosts
respond on the network? (Choose two.)
Hosts 1 and 4 may be operating full duplex so no collision will exist.
The hub will block the port connected to Host 4 to prevent a collision.
After the end of the jam signal, a backoff algorithm is invoked.
Hosts 1 and 4 are assigned shorter backoff values to provide
them priority to access the media.
If a host has data to transmit after the backoff period of that host,
the host checks to determine if the line is idle, before transmitting.

8
Which statements describe Gigabit Ethernet technology?
(Choose two.)
operates at 100 Mbps
typically used for backbone cabling
requires shielded twisted-pair cabling
can be implemented over copper and fiber
primarily used between workstations option

9
Which media types can be used in an implementation of a
10BASE-T network? (Choose three.)
Category 5 UTP
Category 5e UTP
Category 3 UTP
coaxial cable
multi-mode fiber
single mode fiber

10
What are three functions of a NIC in a PC? (Choose three.)
A NIC connects the PC to the network media.
A NIC detects collisions on the Ethernet segment.
A NIC checks the formatting of data before it is transmitted.
A NIC passes the contents of selected frames to the upper
OSI layers.
A NIC acknowledges and retransmits data that was not received
properly.
A NIC discards frames when the destination IP address does
not match the local host.

11
Where does the MAC address originate?
DHCP server database
configured by the administrator
burned into ROM on the NIC card
network configuration on the computer
included in the creation of the processor chip

12

Refer to the exhibit. The switch and workstation are
administratively configured for full-duplex operation.
Which statement accurately
reflects the operation of this link?
No collisions will occur on this link.
Only one of the devices can transmit at a time.
The switch will have priority for transmitting data.
The devices will default back to half duplex if excessive collisions occur.

13
Which two devices can provide full-duplex Ethernet connections?
(Choose two.)
hub
modem
repeater
NIC
Layer 2 switch

14
What is the maximum distance that 10BASE-T will transmit
data before signal attenuation affects the data delivery?
100 meters
185 meters
300 meters
500 meters

15
In which two layers of the OSI model does Ethernet function?
(Choose two.)
application
session
transport
network
data link
physical

16
At which OSI layer do the differences between standard Ethernet,
Fast Ethernet and Gigabit Ethernet occur?
physical layer
data link layer
network layer
transport layer

17
At what layer of the OSI model does a MAC address reside?
1
2
3
4
7

18
Which of the following Ethernet technologies are considered
legacy Ethernet? (Choose three.)
10BASE2
10BASE5
10BASE-T
100BASE-T
100BASE-FX
100BASE-TX

19
Which statement describes how CSMA/CD on an Ethernet segment
manages the retransmission of frames after a collision occurs?
The first device to detect the collision has the priority for
retransmission.
The device with the lowest MAC address determines the
retransmission priority.
The devices on the network segment hold an election for priority to retransmit data
The devices transmitting when the collision occurs DO NOT
have priority for retransmission.

20
How does 1000BASE-T use the UTP wire pairs to accomplish
transmission?
two pairs are used to transmit and two pairs are used to receive
one pair is used to transmit, one pair is used to receive, one pair is
used for clocking, and one pair is used for error correction
all four pairs are used in parallel by both hosts to transmit and receive simultaneously
two pairs of wires are used as in 10BASE-T and 100BASE-TX

0 comments: