What is the IEEE standard associated with Gigabit Ethernet? (Select two answer choices)A. 802.11B. 802.5C. 802.3abD. 802.3aeE. 802.3zF. 802.3u

题目

What is the IEEE standard associated with Gigabit Ethernet? (Select two answer choices)

A. 802.11

B. 802.5

C. 802.3ab

D. 802.3ae

E. 802.3z

F. 802.3u


相似考题
更多“What is the IEEE standard associated with Gigabit Ethernet? (Select two answer choices)A. 802.11B. 802.5C. 802.3abD. 802.3aeE. 802.3zF. 802.3u”相关问题
  • 第1题:

    Which two of the addresses below are available for host addresses on the Ezonexam subnet 192.168.15.19/28? (Select two answer choices)

    A. 192.168.15.17

    B. 192.168.15.14

    C. 192.168.15.29

    D. 192.168.15.16

    E. 192.168.15.31

    F. None of the above


    正确答案:AC
    A,C 解析:Explanation:
    The network uses a 28bit subnet (255.255.255.240). This means that 4 bits are used for the networks and 4 bits for the hosts. This allows for 14 networks and 14 hosts (2n-2). The last bit used to make 240 is the 4th bit (16) therefore the first network will be 192.168.15.16.

    The network will have 16 addresses (but remember that the first address is the network address and the last address is the broadcast address). In other words, the networks will be in increments of 16 beginning at 192.168.15.16/28. The IP address we are given is 192.168.15.19. Therefore the other host addresses must also be on this network. Valid IP addresses for hosts on this network are: 192.168.15.17-192.168.15.30.

    Incorrect Answers:
    B. This is not a valid address for this particular 28 bit subnet mask. The first network address should be 192.168.15.16.

    D. This is the network address.

    E. This is the broadcast address for this particular subnet.

  • 第2题:

    Which three of the protocols below belong to the application layer? (Select three answer choices)

    A. ARP

    B. HTTPS

    C. SMTP

    D. CDP

    E. TFTP

    F. ICMP


    正确答案:BCE
    B,C,E 解析:Explanation:
    The application layer is the highest OSI layer, and protocols at this layer are end-user oriented. HTTPS so people can get information on the internet, SMTP so people can manage networks, and TFTP so people can download files.

    Incorrect Answers:
    A, D, F. ARP, CDP, ICMP are protocols that equipment like routers and switches use to communicate with themselves, and belong to lower levels on the model.

  • 第3题:

    Which encapsulation types are configurable on a Cisco switch for a trunk? (Select two answer choices)

    A. VTP

    B. ISL

    C. CDP

    D. 802.1Q

    E. 802.1p

    F. LLC

    G. IETF


    正确答案:BD
    B,D 解析:Explanation:
    Trunks are used to carry traffic belonging to multiple VLANs between devices over the same link. A device can determine which VLAN the traffic belongs to by its VLAN identifier. The VLAN identifier is a tag that is encapsulated with the data. ISL and 802.1q are two types of encapsulations used to carry data from multiple VLANs over trunk links.

    ISL is a Cisco proprietary protocol for interconnecting multiple switches and maintaining VLAN information as traffic goes between switches. ISL provides VLAN trunking capabilities while maintaining full wire speed performance on Ethernet links in full-duplex or half-duplex mode. ISL operates in a point-to-point environment and will support up to 1000 VLANs.

    In ISL, the original frame. is encapsulated and an additional header is added before the frame. is carried over a trunk link. At the receiving end, the header is removed and the frame. is forwarded to the assigned VLAN. .ISL uses Per VLAN Spanning Tree (PVST) which runs one instance of Spanning Tree Protocol (STP) per VLAN.

    PVST allows for optimal root switch placement for each VLAN and supports load balancing of VLANs over multiple trunk links. 802.1Q is the IEEE standard for tagging frames on a trunk and supports up to 4096 VLANs. In 802.1Q, the trunking device inserts a four-byte tag into the original frame. and re-computes the Frame. Check Sequence (FCS) before sending the frame. over the trunk link. At the receiving end, the tag is removed and the frame. is forwarded to the assigned VLAN. 802.1Q does not tag frames on the native VLAN.

    It tags all other frames transmitted and received on the trunk. While configuring a 802.1 trunk, you must make sure that the same native VLAN is configured on both sides of the trunk. IEEE 802.1Q defines a single instance of spanning tree running on the native VLAN for all the VLANs in the network which is called Mono Spanning Tree (MST). This lacks the flexibility and load balancing capability of PVST available with ISL. However, PVST+ offers the capability to retain multiple Spanning Tree topologies with 802.1Q trunking.

  • 第4题:

    You are working as a network technician at Ezonexam University, when you get a call from the Engineering Faculty. They're complaining that they're receiving obsolete information from the Business Faculty's network traffic broadcasts.

    What can you do to contain the Business Faculty's broadcast while still keeping it connected to the internet and the enterprise services of the University? (Select all valid answer choices)

    A. Use half and full-duplex Ethernet on the Engineering Department LAN

    B. Establish a VTP domain to minimize the obsolete traffic

    C. Change the switch IP address of the switch

    D. Create separate VLANs and subnets for the two departments and route between the two

    E. Provide greater bandwidth to the Engineering Department LAN

    F. Place the business department on a separate subnet and route between networks


    正确答案:DF
    D,F 解析:Explanation:
    In order to prevent the broadcast and link level multicast traffic separated between the departments, they need to be isolated at layer two. This can be accomplished in two ways. The first is to create separate VLANs and place each department into a different one. The second method would be to separate the two departments into two completely different networks, and route between them.

    Incorrect Answers:
    A. Mixing the use of half and full duplex will make no difference to the number of broadcasts sent.

    B. Trunking is only useful in networks that already contain VLANs.

    C. This will make no difference, as all users will still be contained within the same IP subnet.

    E. The amount of bandwidth involved will not have any impact on the amount of broadcasts that are sent and received.

  • 第5题:

    ● Ethernet is the commonly used local area network communication protocol. The standard of Ethernet is __(72)__.

    (72)A.IEEE 802.1 B.IEEE 802.2 C.IEEE 802.3 D.IEEE 802.11


    正确答案:C

  • 第6题:

    What are two way sthat IP datagrams are passed from the ingress line module to the egress line module?()

    A.over an ATM PVC

    B.over a FastEthernet bus

    C.overa Gigabit Ethernet bus

    D.over high speed serial bus


    参考答案:A, B

  • 第7题:

    A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?()

    A. The source and destination addresses

    B. The destination port number

    C. The destination address

    D. The source address

    E. All of the above


    参考答案:D

  • 第8题:

    Ethernet is the commonly used local area network communication protocol. The standard of Ethernet is ( ) .

    A.IEEE 802.1
    B.IEEE 802.2
    C.IEEE 802.3
    D.IEEE 802.11

    答案:C
    解析:

  • 第9题:

    Which two statements about 10 Gigabit Ethernet (10GE) are true?()

    • A、10 Gigabit Ethernet does not support VLAN definition
    • B、10 Gigabit Ethernet supports full duplex links, but does not support half duplex links
    • C、10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connections
    • D、10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
    • E、10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is not supported

    正确答案:B,C

  • 第10题:

    In what two ways does the Cisco SR 520 Secure Router complement the Cisco Smart Business  Communications System? ()

    • A、 stateful packet inspection firewall
    • B、 10-Gigabit Ethernet connectivity
    • C、 remote configuration of access points
    • D、 guest access
    • E、 Cisco Intrusion Prevention System

    正确答案:D,E

  • 第11题:

    In Cisco Network Attached Storage solutions, what are two common high-availability features for small business?() 

    • A、 XFS file system
    • B、 support for RAID 4
    • C、 10 Gigabit Ethernet connections
    • D、 lifetime warranty
    • E、 SMART disk support

    正确答案:A,E

  • 第12题:

    多选题
    Which two statements about 10 Gigabit Ethernet (10GE) are true?()
    A

    10 Gigabit Ethernet does not support VLAN definition

    B

    10 Gigabit Ethernet supports full duplex links, but does not support half duplex links

    C

    10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connections

    D

    10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

    E

    10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is not supported


    正确答案: B,E
    解析: 暂无解析

  • 第13题:

    What must the Ezonexam network administrator do in order to successfully configure a VLAN trunk between two switches named VE1 and VE2? (Select two answer choices)

    A. Set each end of the trunk line to IEEE 802.1Q encapsulation.

    B. Set the same VTP management domain name on both switches.

    C. Set all ports on the two switched as access ports.

    D. Configure one of the two switches as a VTP server.

    E. Connect the two switches using a rollover cable.

    F. Use a router to forward VTP traffic between the VLANs.


    正确答案:BD
    B,D 解析:Explanation:
    All servers that need to share VLAN information must use the same domain name, and a switch can only be in one domain at a time. This means that a switch can only share VTP domain information with other switches if they're configured into the same VTP domain. You can use a VTP domain if you have more than one switch connected in a network, but if you've got all your switches in only one VLAN, you don't need to use VTP. VTP information is sent between switches via a trunk port.

    Switches advertise VTP management domain information, as well as a configuration revision number and all known VLANs with any specific parameters. There's also something called VTP transparent mode, in it, you can configure switches to forward VTP information through trunk ports, but not to accept information updates or update their VTP databases. At least one of the switches will need to be configured as the VTP server in order to pass the VLAN info.

    Incorrect Answers:
    A. Although this is a valid option, it is not a requirement since using ISL as the encapsulation type is also a valid option.

    E. A rollover cable is not used between switches for any of the port types.

    F. Routers will be required for sending traffic from one VLAN to the other, but not to forward the actual VTP traffic.

  • 第14题:

    Which of following VLAN frame. encapsulation types are configurable on a Cisco switch? (Select two answer choices.)

    A. VTP

    B. 802.1Q

    C. LLC

    D. ISL

    E. CDP

    F. PAP


    正确答案:BD
    B,D 解析:Explanation:
    ISL and 802.1Q are the two trunking encapsulations that can be configured on a Cisco switch. ISL is Cisco proprietary and 802.1Q is the IEEE standard method.

    Incorrect Answers:
    A. VTP is the VLAN Trunking Protocol, which is used to carry VLAN information across the trunks. The question is asking for the encapsulation options for the trunk, which will be used by VTP.

    C. LLC is the Logical Link Control, which is a sub-layer of the data link layer.

    E. CDP is the Cisco Discovery Protocol, which is used by Cisco devices to discover information on neighboring Cisco devices.

    F. PAP is the Password Authentication Protocol, which is used as an authentication mechanism on PPP links.

  • 第15题:

    Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet? (Select two answer choices.)

    A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.

    B.Half-duplex Ethernet uses a loopback circuit to detect collisions.

    C.A full-duplex Ethernet card allows 20Mbps for data transmission.

    D.Full-duplex Ethernet makes use of two pairs of wires for data.

    E.An Ethernet hub can operate both half and full duplex simultaneously.


    正确答案:BD
    解析:Explanation:
    Half-duplex Ethernet send and receives on the same line, so a loopback needs to be set to detect collisions. Alternatively, full-duple Ethernet doesn't have to because it uses two pairs of wire, one to send and the other to receive. Collisions are not possible on full duplex Ethernet networks.

    Incorrect Answers:
    A. Full duplex uses both pairs of wires, so transmissions are sent on the first pair, and data that is received come in on the other pair. This prevents collisions.

    C. Full duplex allows for data to be sent and received at the same time. It will not double the amount of bandwidth at any given time. The speed of the Ethernet link will remain at 10/100.

    E. Hubs are shared devices and can only support one mode, unlike switches.

  • 第16题:

    Which two of the following values does STP take into consideration when it elects the root bridge? (Select two answer choices)

    A. The BPDU version number

    B. The access layer bridge setting

    C. The Bridge ID

    D. The spanning-tree update number

    E. The bridge priority

    F. The VLAN number


    正确答案:CE
    C,E 解析:Explanation:
    The bridges elect a root bridge based on the bridge IDs in the BPDUs. The root bridge is the bridge with the lowest numeric value for the bridge ID. Because the two part bridge ID starts with the priority value, essentially the bridge with the lowest priority becomes the root.

    For instance, if one bridge has priority 100, and another bridge has priority 200, the bridge with priority 100 wins, regardless of what MAC address was used to create the bridge ID or each bridge/switch.

  • 第17题:

    ●Wi-Fi联盟制定的安全认证方案 WPA(Wi-fi Protected Access)是(66)标准的子集。

    (66)

    A. IEEE 802.11

    B. IEEE 802.11a

    C. IEEE 802.11b

    D. IEEE 802.11i


    正确答案:D

  • 第18题:

    Which IEEE standard is used to define Wi-Fi?()

    A. IEEE 802.3

    B. IEEE 802.5

    C. IEEE 802.11h

    D. IEEE 802.11c

    E. IEEE 802.11


    参考答案:E

  • 第19题:

    10Gbps Ethernet采用的标准是IEEE( )。

    A)802.3a

    B)802.3ab

    C)802.3ae

    D)802.3u


    正确答案:C
    在Gigabit Ethernet标准802.32通过后不久,IEEE成立了高速研究组,1OGbpsEthemet的标准由IEEES02.3ae委员会制定,正式标准在2002年完成。

  • 第20题:

    Which switch port error is an indication of duplex mismatches on 10/100/1000 IEEE 802.3u  Gigabit Ethernet ports?()

    • A、FCS errors
    • B、Runts
    • C、Multiple collisions
    • D、Alignment errors

    正确答案:C

  • 第21题:

    What are two way sthat IP datagrams are passed from the ingress line module to the egress line module?()

    • A、over an ATM PVC
    • B、over a FastEthernet bus
    • C、overa Gigabit Ethernet bus
    • D、over high speed serial bus

    正确答案:A,B

  • 第22题:

    What is the IEEE standard associated with Gigabit Ethernet?()

    • A、802.11
    • B、802.5
    • C、802.3ab
    • D、802.3ae
    • E、802.3z
    • F、802.3u

    正确答案:C,E

  • 第23题:

    多选题
    What is the IEEE standard associated with Gigabit Ethernet?()
    A

    802.11

    B

    802.5

    C

    802.3ab

    D

    802.3ae

    E

    802.3z

    F

    802.3u


    正确答案: B,F
    解析: 暂无解析