Like what you see? Get it in one document for easy printing!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

NEW! Network+ N11-003 2005 Beta Exam Study Guide - Just $9!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Network+
 9  Chapter 0010:  ISO, OSI, and IEEE Standards

Previous Topic/Section
IV  Chapter 0010:  Summary
Previous Page
Pages in Current Topic/Section
1
Next Page
Chapter 0011:  Network Hardware
Next Topic/Section

V  Test 0010: Success Questions

(Click here to see answers with explanations.)

1. Why is there a limit to the number of MAUs that can be connected together in a standard Token-ring network?

A. Too many MAUs would exceed the cable limits imposed by the Token Ring specification

B. Too many MAUs would create too large of a collision domain for communications to take place

C. Too many MAUs require more electricity than the devices can support

D. Too many devices connected through MAUs requires more time to get control of the token, and communications become unacceptable

E. There is no limit to the number of MAUs a token ring network can support


 

2. The IEEE 802.3 standard helps define _______.

A. Token Bus

B. Token Ring

C. ATM

D. Ethernet

E. SLIP


 

3. The _______ IEEE standard defines MAC addresses for Token Ring networks.


 

4. You are creating a network design for a firm that requires the bandwidth to be shared equally, and performance degrades gracefully under load. Given these requirements, you select?

A. 802.3

B. 802.5

C. 802.7

D. 802.15


 

5. Logical Link Control is defined with

A. 802.1

B. 802.2

C. 802.3

D. 802.4


 

6. VG AnyLAN is defined by

A. 802.1

B. 802.5

C. 802.11

D. 802.12


 

7. IDSN is defined by

A. 802.1

B. 802.3

C. 802.6

D. 802.9


 

8. Wireless networking deined by

A. 802.1

B. 802.11

C. 802.3

D. 802.4


 

9. Metropolian Area Networking (MAN) is defined in

A. 802.5

B. 802.6

C. 802.7

D. 802.8

10. Fiber-Optic LAN is defined in

A. 802.4

B. 802.5

C. 802.7

D. 802.8


 

11. The ___________ layer is responible for end-to-end control and error correction.

A. Layer 4 (Transport)

B. Layer 5 (session)

C. Layer 6 (Presentation)

D. Layer 7 Application


 

12. When encypting data for a VPN, this typically occurs at layer ______

A. Layer 7 (Application)

B. Layer 6 (Presentation)

C. Layer 5 (Session)

D. Layer 4 (Transport)


 

13. Physical addresses, for example MAC addresses that are 'hardwired' are used by

A. Layer 7 (Application)

B. Layer 5 (Session)

C. Layer 3 (Network)

D. Layer 1 (Physical)


 

14. 802.11b uses the ________ access method.

A. CSMA/CD

B. CSMA/CA

C. Token Ring

D. Cell

E. Packet


 

15. Gigabit Ethernet can run on what category of copper cable?

A. Cat 1

B. Cat 3

C. Cat 5

D. Type 3

E. No choice is correct. It requires Cat5e or better


Previous Topic/Section
IV  Chapter 0010:  Summary
Previous Page
Pages in Current Topic/Section
1
Next Page
Chapter 0011:  Network Hardware
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Network+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Network+ (http://www.CertiGuide.com/netplus/) on CertiGuide.com
Version 1.0 - Version Date: November 7, 2004

Adapted with permission from a work created by Tcat Houser and Helen O’Boyle.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.