1. What are two types of token ring frames?

  2. A. BPU and ACK
    B. 802.2 and 802.5
    C. data/command and token
    D. NCP and LCP

  3. Which LAN technology uses CSMA/CD?

  4. A. Ethernet
    B. Token Ring
    C. FDDI
    D. All of the above.

  5. What is true of 10BaseT signals?

  6. A. They use Manchester encoding.
    B. They combine both clock and data information into a self-synchronizing stream of signals.
    C. They are designed to send and receive signals over a segment that consists of 4 wires.
    D. All of the above are true.

  7. Which of the following best describes a broadcast storm?

  8. A. A frame that will be sent to one node on a network
    B. When too many broadcasts are sent out over the network
    C. A section of a network that is bounded by bridges, routers, or switches
    D. The network areas within which frames that have collided are propagated

  9. Which best describes a network segment?

  10. A. section of a network containing a predetermined number of addressable services
    B. section of a network that is a logical grouping based on MAC addresses
    C. section of a network that contains Token Ring topology
    D. section of a network bounded by routers, switches, or bridges

  11. Which of the following is true concerning bridges?

  12. A. They forward all data packets to other segments of the network.
    B. They can restrict unauthorized access to files by reading the filename from the header.
    C. They forward packets based on IP addresses.
    D. They can improve network performance.

  13. Why is Ethernet known as a best-effort delivery system?

  14. A. If a destination device detects any errors, then the data packet is discarded and the sender notified.
    B. The destination device notifies the source only if it receives all of the data.
    C. The destination only notifies the source if the data was corrupted.
    D. If the destination must discard the data, then it does not notify the source.

  15. What are two token-ring frame fields, within the Access Control Byte, that control priority?

  16. A. reservation field and priority field
    B. relay field and priority field
    C. remote field and control field
    D. restriction field and placement field

  17. What device builds a MAC address table?

  18. A. passive hub
    B. bridge
    C. active hub
    D. transceiver

  19. Which of the 4 FDDI specifications defines how the medium is accessed?

  20. A. Media Access Control (MAC)
    B. Physical Layer Protocol (PHY)
    C. Physical Layer Medium (PMD)
    D. Station Management (SMT)

  21. What is the process of each port of a switch being its own small bridge?

  22. A. macrosegmentation
    B. microsegmentation
    C. port-centric
    D. none of the above

  23. Which of the following statements are true of routers?

  24. A. They are passive.
    B. They operate only at the data link layer.
    C. They base forwarding decisions on Layer 2 addresses.
    D. They base forwarding decisions on Layer 3 protocol addresses.

  25. How does a token-ring topology differ from an Ethernet topology?

  26. A. Token-ring is deterministic.
    B. Token-ring networks have increased collisions.
    C. Token-ring uses 802.3 and Ethernet uses 802.5.
    D. Token-ring operates at 10 Mbps and Ethernet at 16 Mbps.

  27. What is the most widely used local area network (LAN) technology?

  28. A. Token Ring
    B. Ethernet
    C. ArcNet
    D. FDDI

  29. Which fiber mode characteristic is recommended for inter-building connectivity?

  30. A. single-mode
    B. multi-mode
    C. intra-mode
    D. inter-mode

  31. FDDI and token-ring share which of the following features?

  32. A. operate at the same speed
    B. use a ring topology
    C. use CSMA/CD
    D. use of dual rings

  33. What private company created Ethernet?

  34. A. Apple
    B. IBM
    C. Xerox
    D. Cisco

  35. On a LAN, what part of a host connects to the media?

  36. A. media interface port
    B. serial port
    C. MAC card
    D. NIC card

  37. What is the relationship between an Ethernet version 2 header and the header of an 802.3 frame?

  38. A. The Ethernet version 2 header is much longer than the header of an 802.3 frame.
    B. The Ethernet version 2 header is much shorter than the header of an 802.3 frame.
    C. The two headers are the same length as each other.
    D. The two headers are completely different from each other.

  39. Which device can significantly reduce collisions?

  40. A. hub
    B. NIC
    C. switch
    D. transceiver

  41. What can be done if the area of the LAN is more than 200 meters in diameter?

  42. A. a repeater could be installed to extend the network
    B. another server could be used to extend the network
    C. special NICs can be purchased to extend the network
    D. all of the above