Networking Essentials - Chapter 1 Exam

What is the most common network topology today?
a. Star
b. Hub
c. Ring
d. Mesh

a. Star

A hub is also called a multiport repeater.
a. True
b. False

a. True

The term deterministic means
a. Access to the network is provided at random time intervals.
b. Access to the network is provided using CSMA/CD.
c. Access to the network is provided at fixed time intervals.
d. None of these answers is correct

c. Access to the network is provided at fixed time intervals.

A protocol defines the network architecture used to interconnect the networking
equipment.
a. True
b. False

b. False

TCP functions at which layer of the OSI model?
a. Layer 4
b. Layer 2
c. Layer 3
d. Layer 5
e. Layer 7

a. Layer 4

HTTP functions at which layer of the OSI model?
a. Layer 6
b. Layer 5
c. Layer 4
d. Layer 7
e. All of these answers are correct.

d. Layer 7

IP is an example of a protocol that operates in which layer of the OSI model?
a. Layer 7
b. Layer 6
c. Layer 5
d. Layer 2
e. None of these answers is correct.

e. None of these answers is correct.

The NIC operates at which layer of the OSI model?
a. Layer 1
b. Layer 3
c. Layer 5
d. Layer 7
e. All of these answers are correct.

a. Layer 1

The network address is another name for a layer 4 address.
a. True
b. False

b. False

Which of the following issues should be considered when planning for a
home network?
a. Data speed
b. Public access
c. Cost
d. All of these answers are correct.

d. All of these answers are correct.

How does MAC address filtering help to secure a wireless network?
a. This is used to help prevent the theft of network interface cards.
b. This requires an additional login step requiring the user to enter his
MAC address.
c. MAC address filtering is seld

d. This can be used to select which networking devices can be allowed access to the network.

Which of the following are examples of wireless technologies?
a. 802.11a
b. 802.11g
c. 802.11n
d. All of these answers are correct.

d. All of these answers are correct.

What is NAT?
a. Network Asynchronous Transfer
b. Network Address Translation
c. Network Address Transfer
d. None of these answers is correct

b. Network Address Translation

The "X" on the input to a switch represents a router-only port.
a. True
b. False

b. False

A cross-connected input port indicates that
a. The transmit and receive pairs are crossed.
b. Is only used on connections to routers.
c. The cable is wired incorrectly.
d. Must be avoided on hub and switch port inputs.

a. The transmit and receive pairs are crossed.

A lit link light indicates that (select all that apply)
a. The Link Integrity Test is operational.
b. Link pulses are being shared by all devices in the LAN.
c. A 10Mbps data link has been established.
d. A 100Mbps data link has been established.
e. All o

a. The Link Integrity Test is operational.

The network administrator needs to verify a network connection. Which of the following steps should be taken? (Select two.)
a. Verify the link lights.
b. Use the ping command to verify network connectivity.
c. Perform an ARP request.
d. Ping the MAC addre

a. Verify the link lights.
b. Use the ping command to verify network connectivity.

The ping -t ip address command (select all that apply)
a. Pings the host at the specified IP address until it is stopped.
b. Pings the MAC address of the host at the specified IP address.
c. Allows the ping to pass through routers.
d. Allows the ping comm

*
a. Pings the host at the specified IP address until it is stopped.

State whether the following network descriptions are describing a MAN, WAN, or LAN:
a. A network of users that share computer resources in a limited area
b. A network of users that share computer resources across a metropolitan area
c. A network that conn

a. LAN
b. MAN
c. WAN

Expand the acronym NIC.

NIC (Network Interface Card)

Expand the acronym MAC.

MAC (Media Access Control)

Expand the acronym LAN.

LAN (Local Area Network)

Expand the acronym WAN.

WAN (Wide Area Network)

Define the term protocol

Protocol: Set of rules established for users to gain control of the network to exchange information

Define the term topology

Topology: The architecture of a network

Define the term deterministic

Deterministic: A way of providing access to a network by giving each network device a fixed time interval to access the network

A disadvantage of the Token Ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding which of the following?
a. Router
b. Multiport repeater
c. Token passer
d. Token Ring hub

d. Token Ring hub

State the network topology being used in Figure 1-32 (Bus, Star, Ring, or Mesh).

a. Mesh
b. Bus
c. Ring
d. Star

What is the difference between a hub and a switch?

A hub replicates the data it receives to all devices connected to its ports.
A switch forwards the data it receives directly to its destination address when its associated port is known.

What are the seven layers of the OSI model?

1. Physical
2. Data link
3. Network
4. Transport
5. Session
6. Presentation
7. Application

Which OSI layer is responsible for adding a header that includes routing information?

Network Layer

Which OSI layer is considered the media access control layer?

Data Link Layer

Which OSI layer combines messages or segments into packets?

Network Layer

What layer does a router work at?

Layer 3

Which OSI layer is responsible for the mechanical connection to the network?

Physical

The OSI layer responsible for data compression and encryption is which layer?

Presentation

TCP functions at what layer of the OSI model?

Layer 4: Transport

HTTP functions at what layer of the OSI model?

Layer 7: Application

IP and IPX are examples of protocols that operate in what layer of the OSI model?

Layer 3: Network

The network interface card operates at what layer of the OSI model?

Layer 1: Physical

Why are the layers of the OSI model important to the network administrator?

Knowledge of the OSI layers is used to help isolate a network problem.

Define the acronym CSMA/CD and the protocol that uses CSMA/CD.

CSMA/CD: Carrier Sense Multiple Access / Collision Detection, Ethernet

What information is not included in an Ethernet frame?
a. Frame size
b. Source MAC address
c. Pad
d. Frame check sequence

a. Frame size

What is the minimum size of the data payload in an Ethernet frame?

46 bytes

What is the minimum and maximum size of an Ethernet frame?

Minimum: 64 bytes
Maximum: 1518 bytes

Define the acronym OUI. Where is the OUI used?

OUI: Organizationally Unique Identifier. The OUI is found in the first 3 bytes of the MAC address.

What does the OUI represent?

The OUI identifies the manufacturer of the network device.

In Windows Vista or Windows XP, how would you find the Ethernet (MAC)
address?

At the command line, type ipconfig /all

State the class of address (A, B, or C) for the following IP addresses:
a. 46.39.42.05
b. 220.244.38.168
c. 198.1.0.4
d. 126.87.12.34
e. 99.150.200.251
f. 128.64.32.16

a. A
b. C
c. C
d. A
e. A
f. B

Expand the acronym TCP/IP.

TCP/IP: Transmission Control Protocol / Internet Protocol

Cite the three advantages of a wired network.

1. Faster network data transfer speeds within the LAN
2. Relatively inexpensive to set up
3. Network is not susceptible to outside interference

Cite three advantages of a wireless network.

1. User mobility
2. Simple installations
3. No cables

What does it mean for a wireless networking device to be Wi-Fi compliant?

This means the wireless equipment is compliant with the 802.11x standards.

What are the most common types of equipment that are used to establish abroadband connection to the ISP?

Cable and DSL modems

Name six issues that should be considered when planning a home network?

Data speed, cost, ease of implementation, appearance, home access, and public access

Why is checking the lights of the networking device that connects to the ISP important?

Incorrect lights can indicate a connection problem with your cable modem, DSL modem, or your phone connection, or your ISP could be experiencing technical difficulties.

What is the purpose of a range expander?

This device relays the wireless signal from an access point or wireless router into areas with a weak signal or no signal at all

What is a hotspot?

Limited geographic area that provides wireless access for the public

List five steps that can be used to protect the home network.

Change the default factory passwords.
2. Change the default SSID.
3. Turn on encryption.
4. Turn off the SSID broadcast.
5. Enable MAC address filtering.

You have the choice of selecting a networking device with WEP and another with WPA. Which offers better security and why?

WPA offers stronger encryption and is supported with most new Wi-Fi systems

What are the potential problems of using the default factory passwords?

Wireless equipment is shipped with default passwords that are set at the factory.
These default settings are known by the public, including people who would like to gain access into your network and possibly change your settings.

What is the purpose of the SSID, and what can the network administrator do to
protect the network from hackers who might have learned the SSID?

The SSID is the name used to identify your network and is used by your access point or wireless router to establish an association.
Establishing an association means that a wireless client can join the network.
The SSID can be up to 32 characters and shou

What is the purpose of MAC filtering on a wireless network?

This can be used to select what devices can be allowed access to the network.
When MAC address filtering is turned on, only wireless devices that have allowed MAC addresses will be granted access to the network.

How does NAT (Network Address Translation) help protect outsider access to computers in the home network?

The bad guy only sees the router because the IP addresses of the internal networking devices are not provided on the Internet. Only the IP address of the router is provided.
The home network typically uses private address space that is not routable on the

What is Stateful Packet Inspection?

This type of firewall inspects incoming data packets to make sure they correspond to an outgoing request. Data packets that are not requested are rejected.

What is a VPN, and how does it protect the data transferred over a wireless network?

VPN is virtual private networking. A VPN connection enables a remote or mobile user to access the network as if they were actually physically at the network.
Additionally, the VPN connection is encrypted providing privacy for the data packets being transm

How is IP addressing typically handled in a home network?

IP addressing for the home network is managed by the router or wireless router that connects to the ISP.
The ISP will issue an IP address to the router from an available pool of IP addresses managed by the ISP.
The computers in the home network are issued

What is Port Address Translation (PAT)?

PAT is a form of NAT that allows a single address to represent many inside hosts.
A port number is attached to the network connection. This port number Identifies the device that is establishing a connection to the Internet.
This number is used when a dat

A router on a home network is assigned an IP address of 128.123.45.67.
A computer in the home network is assigned a private IP address of 192.168.10.62. This computer is assigned the public IP address 128.123.45.67:1922.
Which IP address is used for routi

The IP address 128.123.45.67:1922 will be used for routing the data packets on the Internet.
Yes, overloading is being used because one routable IP address is being shared by the home network.

Which of the following is not a step in building an office LAN?
a. Obtaining proper government permits
b. Configuring the network settings
c. Connecting the devices together
d. Network documentation

a. Obtaining proper government permits

What does RJ-45 represent?
a. A 45-pin connector for CAT6
b. An IEEE standard for data speed
c. An 8-pin modular connector for twisted pair Ethernet
d. Protocol used to verify a communications link

c. An 8-pin modular connector for twisted pair Ethernet

What is an uplink port?

An uplink port is a port on a hub or switch that can be used as either a cross-connected or straight-through input. This is used to connect multiple hubs/switches together.

What is the maximum speed and length for Category 6 cabling?

CAT6 cable is capable of supporting a data rate of 1000 Mbps (or greater) over a distance of 100 meters.

What do the link lights on a hub represent?

The link lights indicate that the transmit and receive pairs of the cable are properly aligned.

What do the link lights on a hub represent?

The link lights indicate that the transmit and receive pairs of the cable are properly aligned.

What does cross-connected mean?

When the transmit and receive pairs on the CAT5 cable are crossed to properly align each for data communication, they are said to be cross-connected

What command would you use to ping 10.3.9.42 indefinitely?

ping -t 10.3.9.42

What command would you use to ping 192.168.5.36 20 times with 1024 bytes of data?

ping -n 20 -1 1024 192.168.5.36

Expand the acronym TTL

TTL: Time To Live

In terms of computer security, a switch offers better security than a hub. Why is this?
a. A hub requires a special pin to activate the connection.
b. A hub forwards the data it receives to every device connected to the hub. It is possible for network dev

b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possib

What networking protocol does Ethernet use?
a. Ethernet uses a token ring passing scheme. The computer devices must
possess the ring to be able to pass a token.
b. Ethernet uses Carrier Access - Multiple Sensing / Collision Detection
c. Ethernet uses Carr

c. Ethernet uses Carrier Sense - Multiple Access / Collision Detection

Network interface card has a MAC address of 00-00-86-15-7A. From this information,
specify the OUI.
a. There is not sufficient information to specify the OUI.
b. The OUI is 86-15-7A.
c. The OUI is 86-00-00
d. The OUI is 00-00-86

d. The OUI is 00-00-86

An IP address for an internal computer is assigned by
a. the Internet Assigned Numbers Authority
b. the local network administrator
c. the user of the computer
d. Internet Address Numbers Authority

b. the local network administrator

The pad field in an Ethernet packet
a. is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes.
b. is used to bring the total number of bytes up to 64 if the data file is less
than 64 bytes.
c. is not required with CSMA/

a. is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes.

The IP address 10.10.20.250 is an example of (select all that apply)
a. class A address.
b. class B address.
c. a private IP address.
d. a routable IP address.
e. a nonroutable Internet IP address

a. class A address.
c. a private IP address.
e. a nonroutable Internet IP address

An Intranet is (select all that apply)
a. uses class E addressing.
b. used in high speed (gigabit) Ethernet.
c. an internal network that provides file and resource sharing.
d. enables Fast Ethernet connections.
e. not typically accessed from the Internet

c. an internal network that provides file and resource sharing.
e. not typically accessed from the Internet

What is the most common network topology today?
a. Star
b. Hub
c. Ring
d. Mesh

a. Star

A hub is also called a multiport repeater.
a. True
b. False

a. True

The term deterministic means
a. Access to the network is provided at random time intervals.
b. Access to the network is provided using CSMA/CD.
c. Access to the network is provided at fixed time intervals.
d. None of these answers is correct

c. Access to the network is provided at fixed time intervals.

A protocol defines the network architecture used to interconnect the networking
equipment.
a. True
b. False

b. False

TCP functions at which layer of the OSI model?
a. Layer 4
b. Layer 2
c. Layer 3
d. Layer 5
e. Layer 7

a. Layer 4

HTTP functions at which layer of the OSI model?
a. Layer 6
b. Layer 5
c. Layer 4
d. Layer 7
e. All of these answers are correct.

d. Layer 7

IP is an example of a protocol that operates in which layer of the OSI model?
a. Layer 7
b. Layer 6
c. Layer 5
d. Layer 2
e. None of these answers is correct.

e. None of these answers is correct.

The NIC operates at which layer of the OSI model?
a. Layer 1
b. Layer 3
c. Layer 5
d. Layer 7
e. All of these answers are correct.

a. Layer 1

The network address is another name for a layer 4 address.
a. True
b. False

b. False

Which of the following issues should be considered when planning for a
home network?
a. Data speed
b. Public access
c. Cost
d. All of these answers are correct.

d. All of these answers are correct.

How does MAC address filtering help to secure a wireless network?
a. This is used to help prevent the theft of network interface cards.
b. This requires an additional login step requiring the user to enter his
MAC address.
c. MAC address filtering is seld

d. This can be used to select which networking devices can be allowed access to the network.

Which of the following are examples of wireless technologies?
a. 802.11a
b. 802.11g
c. 802.11n
d. All of these answers are correct.

d. All of these answers are correct.

What is NAT?
a. Network Asynchronous Transfer
b. Network Address Translation
c. Network Address Transfer
d. None of these answers is correct

b. Network Address Translation

The "X" on the input to a switch represents a router-only port.
a. True
b. False

b. False

A cross-connected input port indicates that
a. The transmit and receive pairs are crossed.
b. Is only used on connections to routers.
c. The cable is wired incorrectly.
d. Must be avoided on hub and switch port inputs.

a. The transmit and receive pairs are crossed.

A lit link light indicates that (select all that apply)
a. The Link Integrity Test is operational.
b. Link pulses are being shared by all devices in the LAN.
c. A 10Mbps data link has been established.
d. A 100Mbps data link has been established.
e. All o

a. The Link Integrity Test is operational.

The network administrator needs to verify a network connection. Which of the following steps should be taken? (Select two.)
a. Verify the link lights.
b. Use the ping command to verify network connectivity.
c. Perform an ARP request.
d. Ping the MAC addre

a. Verify the link lights.
b. Use the ping command to verify network connectivity.

The ping -t ip address command (select all that apply)
a. Pings the host at the specified IP address until it is stopped.
b. Pings the MAC address of the host at the specified IP address.
c. Allows the ping to pass through routers.
d. Allows the ping comm

*
a. Pings the host at the specified IP address until it is stopped.

State whether the following network descriptions are describing a MAN, WAN, or LAN:
a. A network of users that share computer resources in a limited area
b. A network of users that share computer resources across a metropolitan area
c. A network that conn

a. LAN
b. MAN
c. WAN

Expand the acronym NIC.

NIC (Network Interface Card)

Expand the acronym MAC.

MAC (Media Access Control)

Expand the acronym LAN.

LAN (Local Area Network)

Expand the acronym WAN.

WAN (Wide Area Network)

Define the term protocol

Protocol: Set of rules established for users to gain control of the network to exchange information

Define the term topology

Topology: The architecture of a network

Define the term deterministic

Deterministic: A way of providing access to a network by giving each network device a fixed time interval to access the network

A disadvantage of the Token Ring system is that if an error changes the token pattern, it can cause the token to stop circulating. This can be eliminated by adding which of the following?
a. Router
b. Multiport repeater
c. Token passer
d. Token Ring hub

d. Token Ring hub

State the network topology being used in Figure 1-32 (Bus, Star, Ring, or Mesh).

a. Mesh
b. Bus
c. Ring
d. Star

What is the difference between a hub and a switch?

A hub replicates the data it receives to all devices connected to its ports.
A switch forwards the data it receives directly to its destination address when its associated port is known.

What are the seven layers of the OSI model?

1. Physical
2. Data link
3. Network
4. Transport
5. Session
6. Presentation
7. Application

Which OSI layer is responsible for adding a header that includes routing information?

Network Layer

Which OSI layer is considered the media access control layer?

Data Link Layer

Which OSI layer combines messages or segments into packets?

Network Layer

What layer does a router work at?

Layer 3

Which OSI layer is responsible for the mechanical connection to the network?

Physical

The OSI layer responsible for data compression and encryption is which layer?

Presentation

TCP functions at what layer of the OSI model?

Layer 4: Transport

HTTP functions at what layer of the OSI model?

Layer 7: Application

IP and IPX are examples of protocols that operate in what layer of the OSI model?

Layer 3: Network

The network interface card operates at what layer of the OSI model?

Layer 1: Physical

Why are the layers of the OSI model important to the network administrator?

Knowledge of the OSI layers is used to help isolate a network problem.

Define the acronym CSMA/CD and the protocol that uses CSMA/CD.

CSMA/CD: Carrier Sense Multiple Access / Collision Detection, Ethernet

What information is not included in an Ethernet frame?
a. Frame size
b. Source MAC address
c. Pad
d. Frame check sequence

a. Frame size

What is the minimum size of the data payload in an Ethernet frame?

46 bytes

What is the minimum and maximum size of an Ethernet frame?

Minimum: 64 bytes
Maximum: 1518 bytes

Define the acronym OUI. Where is the OUI used?

OUI: Organizationally Unique Identifier. The OUI is found in the first 3 bytes of the MAC address.

What does the OUI represent?

The OUI identifies the manufacturer of the network device.

In Windows Vista or Windows XP, how would you find the Ethernet (MAC)
address?

At the command line, type ipconfig /all

State the class of address (A, B, or C) for the following IP addresses:
a. 46.39.42.05
b. 220.244.38.168
c. 198.1.0.4
d. 126.87.12.34
e. 99.150.200.251
f. 128.64.32.16

a. A
b. C
c. C
d. A
e. A
f. B

Expand the acronym TCP/IP.

TCP/IP: Transmission Control Protocol / Internet Protocol

Cite the three advantages of a wired network.

1. Faster network data transfer speeds within the LAN
2. Relatively inexpensive to set up
3. Network is not susceptible to outside interference

Cite three advantages of a wireless network.

1. User mobility
2. Simple installations
3. No cables

What does it mean for a wireless networking device to be Wi-Fi compliant?

This means the wireless equipment is compliant with the 802.11x standards.

What are the most common types of equipment that are used to establish abroadband connection to the ISP?

Cable and DSL modems

Name six issues that should be considered when planning a home network?

Data speed, cost, ease of implementation, appearance, home access, and public access

Why is checking the lights of the networking device that connects to the ISP important?

Incorrect lights can indicate a connection problem with your cable modem, DSL modem, or your phone connection, or your ISP could be experiencing technical difficulties.

What is the purpose of a range expander?

This device relays the wireless signal from an access point or wireless router into areas with a weak signal or no signal at all

What is a hotspot?

Limited geographic area that provides wireless access for the public

List five steps that can be used to protect the home network.

Change the default factory passwords.
2. Change the default SSID.
3. Turn on encryption.
4. Turn off the SSID broadcast.
5. Enable MAC address filtering.

You have the choice of selecting a networking device with WEP and another with WPA. Which offers better security and why?

WPA offers stronger encryption and is supported with most new Wi-Fi systems

What are the potential problems of using the default factory passwords?

Wireless equipment is shipped with default passwords that are set at the factory.
These default settings are known by the public, including people who would like to gain access into your network and possibly change your settings.

What is the purpose of the SSID, and what can the network administrator do to
protect the network from hackers who might have learned the SSID?

The SSID is the name used to identify your network and is used by your access point or wireless router to establish an association.
Establishing an association means that a wireless client can join the network.
The SSID can be up to 32 characters and shou

What is the purpose of MAC filtering on a wireless network?

This can be used to select what devices can be allowed access to the network.
When MAC address filtering is turned on, only wireless devices that have allowed MAC addresses will be granted access to the network.

How does NAT (Network Address Translation) help protect outsider access to computers in the home network?

The bad guy only sees the router because the IP addresses of the internal networking devices are not provided on the Internet. Only the IP address of the router is provided.
The home network typically uses private address space that is not routable on the

What is Stateful Packet Inspection?

This type of firewall inspects incoming data packets to make sure they correspond to an outgoing request. Data packets that are not requested are rejected.

What is a VPN, and how does it protect the data transferred over a wireless network?

VPN is virtual private networking. A VPN connection enables a remote or mobile user to access the network as if they were actually physically at the network.
Additionally, the VPN connection is encrypted providing privacy for the data packets being transm

How is IP addressing typically handled in a home network?

IP addressing for the home network is managed by the router or wireless router that connects to the ISP.
The ISP will issue an IP address to the router from an available pool of IP addresses managed by the ISP.
The computers in the home network are issued

What is Port Address Translation (PAT)?

PAT is a form of NAT that allows a single address to represent many inside hosts.
A port number is attached to the network connection. This port number Identifies the device that is establishing a connection to the Internet.
This number is used when a dat

A router on a home network is assigned an IP address of 128.123.45.67.
A computer in the home network is assigned a private IP address of 192.168.10.62. This computer is assigned the public IP address 128.123.45.67:1922.
Which IP address is used for routi

The IP address 128.123.45.67:1922 will be used for routing the data packets on the Internet.
Yes, overloading is being used because one routable IP address is being shared by the home network.

Which of the following is not a step in building an office LAN?
a. Obtaining proper government permits
b. Configuring the network settings
c. Connecting the devices together
d. Network documentation

a. Obtaining proper government permits

What does RJ-45 represent?
a. A 45-pin connector for CAT6
b. An IEEE standard for data speed
c. An 8-pin modular connector for twisted pair Ethernet
d. Protocol used to verify a communications link

c. An 8-pin modular connector for twisted pair Ethernet

What is an uplink port?

An uplink port is a port on a hub or switch that can be used as either a cross-connected or straight-through input. This is used to connect multiple hubs/switches together.

What is the maximum speed and length for Category 6 cabling?

CAT6 cable is capable of supporting a data rate of 1000 Mbps (or greater) over a distance of 100 meters.

What do the link lights on a hub represent?

The link lights indicate that the transmit and receive pairs of the cable are properly aligned.

What do the link lights on a hub represent?

The link lights indicate that the transmit and receive pairs of the cable are properly aligned.

What does cross-connected mean?

When the transmit and receive pairs on the CAT5 cable are crossed to properly align each for data communication, they are said to be cross-connected

What command would you use to ping 10.3.9.42 indefinitely?

ping -t 10.3.9.42

What command would you use to ping 192.168.5.36 20 times with 1024 bytes of data?

ping -n 20 -1 1024 192.168.5.36

Expand the acronym TTL

TTL: Time To Live

In terms of computer security, a switch offers better security than a hub. Why is this?
a. A hub requires a special pin to activate the connection.
b. A hub forwards the data it receives to every device connected to the hub. It is possible for network dev

b. A hub forwards the data it receives to every device connected to the hub. It is possible for network devices to pick up data intended for a different device. A switch eliminates this by only forwarding data packets to the correct device whenever possib

What networking protocol does Ethernet use?
a. Ethernet uses a token ring passing scheme. The computer devices must
possess the ring to be able to pass a token.
b. Ethernet uses Carrier Access - Multiple Sensing / Collision Detection
c. Ethernet uses Carr

c. Ethernet uses Carrier Sense - Multiple Access / Collision Detection

Network interface card has a MAC address of 00-00-86-15-7A. From this information,
specify the OUI.
a. There is not sufficient information to specify the OUI.
b. The OUI is 86-15-7A.
c. The OUI is 86-00-00
d. The OUI is 00-00-86

d. The OUI is 00-00-86

An IP address for an internal computer is assigned by
a. the Internet Assigned Numbers Authority
b. the local network administrator
c. the user of the computer
d. Internet Address Numbers Authority

b. the local network administrator

The pad field in an Ethernet packet
a. is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes.
b. is used to bring the total number of bytes up to 64 if the data file is less
than 64 bytes.
c. is not required with CSMA/

a. is used to bring the total number of bytes up to 46 if the data file is less than 46 bytes.

The IP address 10.10.20.250 is an example of (select all that apply)
a. class A address.
b. class B address.
c. a private IP address.
d. a routable IP address.
e. a nonroutable Internet IP address

a. class A address.
c. a private IP address.
e. a nonroutable Internet IP address

An Intranet is (select all that apply)
a. uses class E addressing.
b. used in high speed (gigabit) Ethernet.
c. an internal network that provides file and resource sharing.
d. enables Fast Ethernet connections.
e. not typically accessed from the Internet

c. an internal network that provides file and resource sharing.
e. not typically accessed from the Internet