CCNA 1 Chapter 4 v5 Exam Answers 2016
You can download fresh questions. Daily updated.
LAST UPDATE: TODAY
1
What are two reasons for physical layer protocols to use frame encoding techniques? (Choose two.)
to identify where the frame starts and ends*
to distinguish data bits from control bits*
to reduce the number of collisions on the media
to increase the media throughput
to provide better media error correction
2
Which statement is correct about multimode fiber?
Which statement is correct about multimode fiber?
Multimode fiber commonly uses a laser as a light source.
Multimode fiber cables carry signals from multiple connected sending devices.
SC-ST patch cords are used with multimode fiber cables.
SC-SC patch cords are used with multimode fiber cables.*
3
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
data link*
application
transport
physical
4
The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network?
The throughput of a FastEthernet network is 80 Mb/s. The traffic overhead for establishing sessions, acknowledgments, and encapsulation is 15 Mb/s for the same time period. What is the goodput for this network?
15 Mb/s
55 Mb/s
65 Mb/s*
95 Mb/s
80 Mb/s
5
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (Choose two.)
RFI *
signal attenuation
crosstalk
EMI *
extended length of cabling
6.
What is the purpose of the FCS field in a frame?
What is the purpose of the FCS field in a frame?
to obtain the MAC address of the sending node
to verify the logical address of the sending node
to compute the CRC header for the data field
to determine if errors occurred in the transmission and reception*
7.
As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?
As data travels on the media in a stream of 1s and 0s how does a receiving node identify the beginning and end of a frame?
The transmitting node sends an out-of-band signal to the receiver about the beginning of the frame.
The transmitting node sends a beacon to notify that a data frame is attached.
The receiving node identifies the beginning of a frame by seeing a physical address.
The transmitting node inserts start and stop bits into the frame.*
8.
Which statement describes signaling at the physical layer?
Which statement describes signaling at the physical layer?
Sending the signals asynchronously means that they are transmitted without a clock signal.*
Signaling is a method of converting a stream of data into a predefined code.
Wireless encoding includes sending a series of clicks to delimit the frames.
In signaling, a 1 always represents voltage and a 0 always represents the absence of voltage.
9.
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
A network administrator is designing the layout of a new wireless network. Which three areas of concern should be accounted for when building a wireless network? (Choose three.)
mobility options
extensive cabling
coverage area*
interference*
packet collision
security*
10.
What is one main characteristic of the data link layer?
What is one main characteristic of the data link layer?
It converts a stream of data bits into a predefined code.
It shields the upper layer protocol from being aware of the physical medium to be used in the communication.*
It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.
It generates the electrical or optical signals that represent the 1 and 0 on the media.
11.
What is one advantage of using fiber optic cabling rather than copper cabling?
What is one advantage of using fiber optic cabling rather than copper cabling?
It is easier to terminate and install than copper cabling.
It is able to be installed around sharp bends.
It is usually cheaper than copper cabling.
It is able to carry signals much farther than copper cabling.*
12.
Fill in the blank.
What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?
“LLC”
12.
Fill in the blank.
What acronym is used to reference the data link sublayer that identifies the network layer protocol encapsulated in the frame?
“LLC”
13.
Why are two strands of fiber used for a single fiber optic connection?
Why are two strands of fiber used for a single fiber optic connection?
They allow for full-duplex connectivity.*
They prevent crosstalk from causing interference on the connection.
They increase the speed at which the data can travel.
The two strands allow the data to travel for longer distances without degrading.
14.
14.
Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthernet links. Which types of UTP cables can be used to connect the devices?
1 – crossover, 2 – rollover, 3 – straight-through
1 – crossover, 2 – straight-through, 3 – rollover
1 – rollover, 2 – straight-through, 3 – crossover*
1 – rollover, 2 – crossover, 3 – straight-through
15.
What is true concerning physical and logical topologies?
15.
What is true concerning physical and logical topologies?
Physical topologies display the IP addressing scheme of each network.
Logical topologies determine the media access control method used.*
Physical topologies are concerned with how a network transfers frames.
The logical topology is always the same as the physical topology.
16.
Fill in the blank.
The term “Bandwidth” indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).
17.
Fill in the blank.
The term “Bandwidth” indicates the capacity of a medium to carry data and it is typically measured in kilobits per second (kb/s) or megabits per second (Mb/s).
17.
Refer to the exhibit. What is wrong with the displayed termination?
The untwisted length of each wire is too long.*
The wires are too thick for the connector that is used.
The jack used is an RJ-11 connector instead of an RJ-45 connector.
The cable is not shielded.
18.
Fill in the blank with a number.
10,000,000,000 b/s can also be written as “10” Gb/s.
19.
What are two characteristics of 802.11 wireless networks? (Choose two.)
Fill in the blank with a number.
10,000,000,000 b/s can also be written as “10” Gb/s.
19.
What are two characteristics of 802.11 wireless networks? (Choose two.)
Collisions can exist in the networks. *
They are collision-free networks.
They use CSMA/CD technology.
Stations can transmit at any time.
They use CSMA/CA technology.*
20.
A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?
A network administrator is required to upgrade wireless access to end users in a building. To provide data rates up to 1.3 Gb/s and still be backward compatible with older devices, which wireless standard should be implemented?
802.11n
802.11ac*
802.11g
802.11b
21.
How is the magnetic field cancellation effect enhanced in UTP cables?
21.
How is the magnetic field cancellation effect enhanced in UTP cables?
by decreasing the number of wires that are used to carry data
by increasing the thickness of the PVC sheath that encases all the wires
by increasing and varying the number of twists in each wire pair*
by increasing the thickness of the copper wires
22.
Match the steps to the physical layer operations that occur when data is sent from one node and received at another node.
Match the steps to the physical layer operations that occur when data is sent from one node and received at another node.
Sort elements
The physical layer encodes the frames -> Step 1
The physical layer creates the signals that represent the bits in each frame -> Step 2
The signals are sent on the media one at a time. -> Step 3
The physical layer retrieves the individual signals from the media -> Step 4
The physical layer restores the individual signals to their bit representations -> Step 5
The physical layer creates the signals that represent the bits in each frame -> Step 2
The signals are sent on the media one at a time. -> Step 3
The physical layer retrieves the individual signals from the media -> Step 4
The physical layer restores the individual signals to their bit representations -> Step 5
23. What is true concerning physical and logical topologies?
The logical topology is always the same as the physical topology.
Physical topologies are concerned with how a network transfers frames.
Physical topologies display the IP addressing scheme of each network.
Logical topologies refer to how a network transfers data between devices.*
UPDATE WITH QUESTIONS CCNA v5.1
24. What is indicated by the term throughput?
the guaranteed data transfer rate offered by an ISP
the capacity of a particular medium to carry data
the measure of the usable data transferred across the media
the measure of the bits transferred across the media over a given period of time*
the time it takes for a message to get from sender to receiver
25. Which characteristic describes crosstalk?
the capacity of a particular medium to carry data
the measure of the usable data transferred across the media
the measure of the bits transferred across the media over a given period of time*
the time it takes for a message to get from sender to receiver
25. Which characteristic describes crosstalk?
the distortion of the network signal from fluorescent lighting
the distortion of the transmitted messages from signals carried in adjacent wires*
the weakening of the network signal over long cable lengths
the loss of wireless signal over excessive distance from the access point
26. What technique is used with UTP cable to help protect against signal interference from crosstalk?
the distortion of the transmitted messages from signals carried in adjacent wires*
the weakening of the network signal over long cable lengths
the loss of wireless signal over excessive distance from the access point
26. What technique is used with UTP cable to help protect against signal interference from crosstalk?
twisting the wires together into pairs*
wrapping a foil shield around the wire pairs
encasing the cables within a flexible plastic sheath
terminating the cable with special grounded connectors
27. Which type of connector does a network interface card use?
wrapping a foil shield around the wire pairs
encasing the cables within a flexible plastic sheath
terminating the cable with special grounded connectors
27. Which type of connector does a network interface card use?
DIN
PS-2
RJ-11
RJ-45*
28. What are two services performed by the data link layer of the OSI model? (Choose two.)
PS-2
RJ-11
RJ-45*
28. What are two services performed by the data link layer of the OSI model? (Choose two.)
It encrypts data packets.
It determines the path to forward packets.
It accepts Layer 3 packets and encapsulates them into frames.*
It provides media access control and performs error detection.*
It monitors the Layer 2 communication by building a MAC address table.
It determines the path to forward packets.
It accepts Layer 3 packets and encapsulates them into frames.*
It provides media access control and performs error detection.*
It monitors the Layer 2 communication by building a MAC address table.
29. Which method of data transfer allows information to be sent and received at the same time?
full duplex*
half duplex
multiplex
simplex
half duplex
multiplex
simplex
30. Which statement describes an extended star topology?
End devices connect to a central intermediate device, which in turn connects to other central intermediate devices.*
End devices are connected together by a bus and each bus connects to a central intermediate device.
Each end system is connected to its respective neighbor via an intermediate device.
All end and intermediate devices are connected in a chain to each other.
31. Refer to the exhibit.
End devices are connected together by a bus and each bus connects to a central intermediate device.
Each end system is connected to its respective neighbor via an intermediate device.
All end and intermediate devices are connected in a chain to each other.
31. Refer to the exhibit.
Which statement describes the media access control methods that are used by the networks in the exhibit?
All three networks use CSMA/CA
None of the networks require media access control.
Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.*
Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.
None of the networks require media access control.
Network 1 uses CSMA/CD and Network 3 uses CSMA/CA.*
Network 1 uses CSMA/CA and Network 2 uses CSMA/CD.
Network 2 uses CSMA/CA and Network 3 uses CSMA/CD.
32. What is contained in the trailer of a data-link frame?
logical address
physical address
data
error detection*
physical address
data
error detection*
33. What is the function of the CRC value that is found in the FCS field of a frame?
to verify the integrity of the received frame*
to verify the physical address in the frame
to verify the logical address in the frame
to compute the checksum header for the data field in the frame
34. Match the characteristics to the correct type of fiber. (Not all options are used.)
to verify the physical address in the frame
to verify the logical address in the frame
to compute the checksum header for the data field in the frame
34. Match the characteristics to the correct type of fiber. (Not all options are used.)
Place de options in the following order.
Multimode Fiber
LED as light source
several paths of light into the fiber
generally used with LANs
several paths of light into the fiber
generally used with LANs
Single-mode Fiber
only one ray of light into the fiber
generally used for campus backbone
laser as light source
generally used for campus backbone
laser as light source
No comments:
Post a Comment