Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

NEW! Network+ N11-003 2005 Beta Exam Study Guide - Just $9!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Network+
 9  Appendix A: Answers to Success Questions and Real World Exam Questions

Previous Topic/Section
Chapter 0001: LAN Cabling Answers
Previous Page
Pages in Current Topic/Section
1
Next Page
Chapter 0011: Network Hardware Answers
Next Topic/Section

Chapter 0010: OSI and IEEE Network Standards Answers

1. Why is there a limit to the number of MAUs that can be connected together in a standard Token-ring network?

A. Too many MAUs would exceed the cable limits imposed by the Token Ring specification

B. Too many MAUs would create too large of a collision domain for communications to take place

C. Too many MAUs require more electricity than the devices can support

D. Too many devices connected through MAUs requires more time to get control of the token, and communications become unacceptable

E. There is no limit to the number of MAUs a token ring network can support

Explanation: As the length of the ring increases, by adding more devices into more MAUs, no one device is going to gain control of the token often enough to communicate within reasonable amounts of time.

& Domain 1.2: Specify the main features of 802.2 (LLC), 802.3 (Ethernet), 802.5 (token Ring), 802.11b (wireless) and FDDI networking technologies, including speed, access, method, topologies, media.


 

2. The IEEE 802.3 standard helps define _______.

A. Token Bus

B. Token Ring

C. ATM

D. Ethernet

E. SLIP

Explanation: Check out the IEEE 802.x and OSI model layer definitions. 802.3, for instance, spells out how Ethernet technology operates. 802.5 defines Token Rings. All of the above, with the exception of the SLIP protocol, occurs at the Data Link layer of the OSI model.

& Domain 1.2: Specify the main features of 802.2 (LLC), 802.3 (Ethernet) 802.5 (token ring), 802.11 (wireless) and FDDI networking technologies, including: Speed, Access, Method, Topology, Media.


 

3. The _______ IEEE standard defines MAC addresses for Token Ring networks.

802.5

Explanation: The 802.5 IEEE standard defines MAC addresses for Token Ring networks. These standards were conceived in February, 1980 (or '80/2) and define how Token Ring networks are configured.

& Domain 1.2: Specify the main features of 802.2 (LLC), 802.3 (Ethernet) 802.5 (token ring), 802.11 (wireless) and FDDI networking technologies, including: Speed, Access, Method, Topology, Media.


 

4. You are creating a network design for a firm that requires the bandwidth to be shared equally, and performance degrades gracefully under load. Given these requirements, you select?

A. 802.3

B. 802.5

C. 802.7

D. 802.15


 

5. Logical Link Control is defined with

A. 802.1

B. 802.2

C. 802.3

D. 802.4


 

6. VG AnyLAN is defined by

A. 802.1

B. 802.5

C. 802.11

D. 802.12


 

7. IDSN is defined by

A. 802.1

B. 802.3

C. 802.6

D. 802.9


 

8. Wireless networking deined by

A. 802.1

B. 802.11

C. 802.3

D. 802.4


 

9. Metropolian Area Networking (MAN) is defined in

A. 802.5

B. 802.6

C. 802.7

D. 802.8

10. Fiber-Optic LAN is defined in

A. 802.4

B. 802.5

C. 802.7

D. 802.8


 

11. The ___________ layer is responible for end-to-end control and error correction.

A. Layer 4 (Transport)

B. Layer 5 (session)

C. Layer 6 (Presentation)

D. Layer 7 Application


 

12. When encypting data for a VPN, this typically occurs at layer ______

A. Layer 7 (Application)

B. Layer 6 (Presentation)

C. Layer 5 (Session)

D. Layer 4 (Transport)


 

13. Physical addresses, for example MAC addresses that are 'hardwired' are used by

A. Layer 7 (Application)

B. Layer 5 (Session)

C. Layer 3 (Network)

D. Layer 1 (Physical)


 

14. 802.11b uses the ________ access method.

A. CSMA/CD

B. CSMA/CA

C. Token Ring

D. Cell

E. Packet

Explanation: The extra overhead of creating a clear channel before beginning a transmission is more than offset by broadcasting data without collisions.

& Domain 1.2: Specify the main features of 802.2 (LLC), 802.3 (Ethernet) 802.5 (token ring), 802.11 (wireless) and FDDI networking technologies, including: Speed, Access, Method, Topology, Media


 

15. Gigabit Ethernet can run on what category of copper cable?

A. Cat 1

B. Cat 3

C. Cat 5

D. Type 3

E. No choice is correct. It requires Cat5e or better

Explanation: If the cable installation meets TIA/EIA 568-A (Cat5) specifications, it should run 1000Base-T or Gigabit Ethernet.

& Domain 1.3: Specify the characteristics with (e.g., speed, plant, topology, cable type, etc.) of the following: 802.3 (Ethernet) standards, 10 Base-T, 100 Base-TX, 10 Base2, 10Base5, 100 Base-FX, Gigabit Ethernet.


Previous Topic/Section
Chapter 0001: LAN Cabling Answers
Previous Page
Pages in Current Topic/Section
1
Next Page
Chapter 0011: Network Hardware Answers
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Network+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004

Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.