|
16:00
- April 15, 2002
Silent
Hill 2 Versi Xbox Untuk PS2
Question 1:
FDDI and token-ring share which of the following features?
B. use a ring topology
Question 2:
Why is Ethernet known as a best-effort delivery system?
A. If a destination device detects any errors, then the data packet is discarded and the sender notified.
B. The destination device notifies the source only if it receives all of the data.
C. The destination only notifies the source if the data was corrupted.
D. If the destination must discard the data, then it does not notify the source.
Question 3:
What are two types of token ring frames?
B. 802.2 and 802.5
C. data/command and token
Question 4:
Which best describes a network segment?
A. section of a network containing a predetermined number of addressable services
B. section of a network that is a logical grouping based on MAC addresses
C. section of a network that contains Token Ring topology
D. section of a network bounded by routers, switches, or bridges
Question 5:
What is the most widely used local area network (LAN) technology?
A. Token Ring
B. Ethernet
D. FDDI
Question 6:
What is the relationship between an Ethernet version 2 header and the header of an 802.3 frame?
C. The two headers are the same length as each other.
D. The two headers are completely different from each other.
Question 7:
Which fiber mode characteristic is recommended for inter-building connectivity?
A. single-mode
Question 8:
Which of the following is true concerning bridges?
D. They can improve network performance.
Question 9:
Which of the following statements are true of routers?
D. They base forwarding decisions on Layer 3 protocol addresses.
Question 10:
What is the process of each port of a switch being its own small bridge?
A. macrosegmentation
B. microsegmentation
C. port-centric
D. none of the above
Question 11:
What is true of 10BaseT signals?
C. They are designed to send and receive signals over a segment that consists of 4 wires.
Question 12:
On a LAN, what part of a host connects to the media?
A. media interface port
B. serial port
C. MAC card
D. NIC card
Question 13:
How does a token-ring topology differ from an Ethernet topology?
A. Token-ring is deterministic.
B. Token-ring networks have increased collisions.
D. Token-ring operates at 10 Mbps and Ethernet at 16 Mbps.
Question 14:
Which device can significantly reduce collisions?
C. switch
Question 15:
What can be done if the area of the LAN is more than 200 meters in diameter?
A. a repeater could be installed to extend the network
Question 16:
Which LAN technology uses CSMA/CD?
A. Ethernet
Question 17:
What are two token-ring frame fields, within the Access Control Byte, that control priority?
A. reservation field and priority field
Question 18:
What private company created Ethernet?
D. Cisco
Question 19:
What device builds a MAC address table?
B. bridge
Question 20:
Which of the following best describes a broadcast storm?
B. When too many broadcasts are sent out over the network
Question 21:
Which of the 4 FDDI specifications defines how the medium is accessed?
A. Media Access Control (MAC)
|
|
|
 |
|
|