Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

10. What is the purpose of the jamming signal in CSMA/CD? A. To inform the sende

ID: 3887977 • Letter: 1

Question

10. What is the purpose of the jamming signal in CSMA/CD?

A. To inform the sender that the network is free.

B. To inform the sender of network congestion

C. To indicate network intrusion.

D. To acknowledge the reception of a frame

E. To inform other network nodes of a collision and to discard the previous frame

11. Why do we often assign an IP address to an Ethernet switch?

A. Because the switch relies on the assigned IP to function properly

B. Because we need remotely manage the device

C. Because a switch is a network device

D. Because we can secure the device

E. None of above

12. Ethernet network switch is: (refer to 7-layer OSI network model)

A. A layer 1 device

B. A layer 2 device

C. A layer 3 device

D. A layer 4 device

E. A layer 7 device

12. Ethernet network switch is: (refer to 7-layer OSI network model)

A. A layer 1 device

B. A layer 2 device

C. A layer 3 device

D. A layer 4 device

E. A layer 7 device

13. What are minimum and maximum sizes for the data in an Ethernet frame (IEEE 802.3)?

A. 46 and 64 bytes

B. 46 and 1500 bytes

C. 64 and 1518 bytes

D. 64 and 1600 bytes

E. 128 and 1600 bytes

14. How do you connect a PC directly to another PC (using Ethernet) without a hub/switch?

A. Use a straight through UTP cable

B. Use a crossover UTP cable

C. Use a parallel cable

D. Use a serial cable

E. Use a USB cable

15. Within an Ethernet collision domain, the 5-4-3 rule limits 10M Ethernet networks to ___________________ between any two nodes.

A. 5 populated segments, 4 repeaters, and 3 hubs

B. 5 segments, 4 repeaters, and 3 populated segments

C. 5 segments, 4 switches, and 3 repeaters

D. 5 collision domains, 4 devices, and 3 broadcast domains

E. 5 workstations, 4 repeaters, and 3 active users

16. What is the size of Media Access Control (MAC) address?

A. 2 bytes

B. 4 bytes

C. 8 bytes

D. 48 bits

E. variable size

17. From the network reliability perspective, which of the following network topologies provides the highest redundancy?

A. Star

B. Bus

C. Ring

D. Full Meshed

E. All are the same

18. A full-meshed network has 10 nodes, how many links are needed?

A. 10

B. 100

C. 45

D. 50

E. Depend on other requirements

19. What is the network connector for 10Base2?

A. AUI

B. BNC-T

C. RJ-11

D. RJ-45

E. SC

20. Which of the following has the best support for prioritized traffic?

A. 10Base5

B. 10baseT

C. FDDI

D. 100VG (802.12)

E. StarLAN

Explanation / Answer

10. B. To inform the sender of network congestion
11 B. Because we need remotely manage the device
12 C. A layer 3 device
13. C. 64 and 1518 bytes
14. B. Use a crossover UTP cable
15. B. 5 segments,4 repeaters and 3 populated segments
16. C. 6 bytes
17. D. Full Meshed
18 C. 45
19. B. BNC-T
20. B. 10baseT

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Chat Now And Get Quote