Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)A. After a collision, the station that detected the collision has first priority to resend the lost data.B. In a CSMA/CD collisi

题目

Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)

A. After a collision, the station that detected the collision has first priority to resend the lost data.

B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.

C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.

D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.

E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.

F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.


相似考题
更多“Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)A. After a collision, the station that detected the collision has first priority to resend the lost data.B. In a CSMA/CD collisi”相关问题
  • 第1题:

    Two devices on an Ethernet segment sent frames at the same time causing a collision. Which two statements are true?()

    A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re- transmit.

    B. The device with the lowest MAC address is permitted to retransmit first.

    C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.

    D. Both devices send a jam signal to notify all other devices of the collision.


    参考答案:A, D

  • 第2题:

    What is the function of the CSMA/CD algorithm in Ethernet technologies?()

    A. defines how the media is accessed

    B. supplies a token to determine which host has access to the media

    C. defines the encoding of electrical signals on the wire

    D. determines the preamble bits


    参考答案:A

  • 第3题:

    Which of the following statements describe the network shown in the graphic?()

    A. There are two broadcast domains in the network.

    B. There are four broadcast domains in the network.

    C. There are six broadcast domains in the network.

    D. There are four collision domains in the network.

    E. There are five collision domains in the network.

    F. There are seven collision domains in the network.


    参考答案:A, F

  • 第4题:

    Which two statements about the use of VLANs to segment a network are true? ()

    A.VLANs increase the size of collision domains.

    B.VLANs allow logical grouping of users by function.

    C.VLANs simplify switch administration.

    D.VLANs enhance network security.


    参考答案:B, D

  • 第5题:

    In multipoint networks , there are tree persistence methods when a station finds a channel busy.in the 1-persistent method,after the station finds the line idle,it sends its frame immediately.this method has the ( ) chance of collision because two or more stations may find the line (请作答此空) and send their frames immediately. In the nonpersistent method , a station that has a frame to send ( ) the line . If the line is idle , it sends immediately If the line is not idle , it waits a ( ) amount of time and then senses the line again.The nonpersistent approach ( ) the chance of collision because it is unlikely that two or more stations will wait the same amount of time and retry to send simultaneously The p-persistent approach combines the advantages of the other two strategies . It reduces the chance of collision and improves efficiency.

    A.idle
    B.busy
    C.useful
    D.unusable

    答案:A
    解析:

  • 第6题:

    Which two statements about 10 Gigabit Ethernet (10GE) are true?()

    • A、10 Gigabit Ethernet does not support VLAN definition
    • B、10 Gigabit Ethernet supports full duplex links, but does not support half duplex links
    • C、10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connections
    • D、10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
    • E、10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is not supported

    正确答案:B,C

  • 第7题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security
    • B、It requires use of an open authentication method
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
    • D、It requires that all access points and wireless devices use the same encryption key
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第8题:

    Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?()

    • A、Full-duplex Ethernet uses CSMA/CD to prevent collisions.
    • B、Half-duplex Ethernet uses a loopback circuit to detect collisions.
    • C、A full-duplex Ethernet card allows 20Mbps for data transmission.
    • D、Full-duplex Ethernet makes use of two pairs of wires for data.
    • E、An Ethernet hub can operate both half and full duplex simultaneously.

    正确答案:B,D

  • 第9题:

    Which two statements about the use of VLANs to segment a network are true? ()

    • A、VLANs increase the size of collision domains.
    • B、VLANs allow logical grouping of users by function.
    • C、VLANs simplify switch administration.
    • D、VLANs enhance network security.

    正确答案:B,D

  • 第10题:

    Two devices on an Ethernet segment sent frames at the same time causing a collision.Which two statements are true?()

    • A、Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re- transmit.
    • B、The device with the lowest MAC address is permitted to retransmit first.
    • C、The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.
    • D、Both devices send a jam signal to notify all other devices of the collision.

    正确答案:A,D

  • 第11题:

    多选题
    Which two statements about 10 Gigabit Ethernet (10GE) are true?()
    A

    10 Gigabit Ethernet does not support VLAN definition

    B

    10 Gigabit Ethernet supports full duplex links, but does not support half duplex links

    C

    10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connections

    D

    10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

    E

    10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is not supported


    正确答案: B,E
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
    A

    It specifies use of a static encryption key that must be changed frequently to enhance security.

    B

    It requires use of an open authentication method.

    C

    It specifies the use of dynamic encryption keys that change each time a client establishes a connection.

    D

    It requires that all access points and wireless devices use the same encryption key.

    E

    It includes authentication by PSK


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)

    A.ARP

    B.CDP

    C.DHCP

    D.DNS

    E.ICMP


    正确答案:AE
    解析:Explanation:ARPfindsthehardwareaddressofahostfromaknownIPaddress.Here'showitworks:whenIPhasadatagramtosend,itmustinform.aNetworkAccessprotocol,suchasEthernetorTokenRing,ofthedestination'shardwareaddressonthelocalnetwork.(Ithasalreadybeeninformedbyupper-layerprotocolsofthedestination'sIPaddress.)IfIPdoesn'tfindthedestinationhost'shardwareaddressintheARPcache,itusesARPtofindthisinformation.ICMPworksattheNetworklayerandisusedbyIPformanydifferentservices.ICMPisamanagementprotocolandmessagingserviceproviderforIP.ItsmessagesarecarriedasIPdatagrams.RFC1256isanannextoICMP,whichaffordshosts'extendedcapabilityindiscoveringroutestogateways.Periodically,routeradvertisementsareannouncedoverthenetwork,reportingIPaddressesfortherouter'snetworkinterfaces.Hostslistenforthesenetworkinfomercialstoacquirerouteinformation.Aroutersolicitationisarequestforimmediateadvertisementsandmaybesentbyahostwhenitstartsup.

  • 第14题:

    Which two statements about the use of VLANs to segment a network are true?()

    A. VLANs increase the size of collision domains.

    B. VLANs allow logical grouping of users by function.

    C. VLANs simplify switch administration.

    D. VLANs enhance network security.


    参考答案:B, D

  • 第15题:

    Which of the following statements describe the network shown in the graphic? ()

    A.There are two broadcast domains in the network.

    B.There are four broadcast domains in the network.

    C.There are six broadcast domains in the network.

    D.There are four collision domains in the network.

    E.There are five collision domains in the network.

    F.There are seven collision domains in the network.


    参考答案:A, F

  • 第16题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    A.It specifies use of a static encryption key that must be changed frequently to enhance security

    B.It requires use of an open authentication method

    C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection

    D.It requires that all access points and wireless devices use the same encryption key

    E.It includes authentication by PSK


    参考答案:C, E

  • 第17题:

    What is the function of the CSMA/CD algorithm in Ethernet technologies?()

    • A、defines how the media is accessed
    • B、supplies a token to determine which host has access to the media
    • C、defines the encoding of electrical signals on the wire
    • D、determines the preamble bits

    正确答案:A

  • 第18题:

    Which two statements are true regarding an Ethernet collision domain?()

    • A、If a switch is used, the collision domain is limited to each device and the switch
    • B、If a hub is used, the collision domain is limited to each device and the hub
    • C、If a hub is used, the collision domain includes all devices connected to the hub
    • D、If a switch is used, the collision domain includes all devices connected to the switch

    正确答案:A,C

  • 第19题:

    Which two statements about the implementation of WLAN QoS are true?()

    • A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.
    • B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.
    • C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.
    • D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.
    • E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.
    • F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

    正确答案:A,B

  • 第20题:

    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security.
    • B、It requires use of an open authentication method.
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
    • D、It requires that all access points and wireless devices use the same encryption key.
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第21题:

    Which two statements are true regarding an Ethernet collision domain?()

    • A、If a switch is used, the collision domain is limited to each device and the switch.
    • B、If a hub is used, the collision domain is limited to each device and the hub.
    • C、If a hub is used, the collision domain includes all devices connected to the hub.
    • D、If a switch is used, the collision domain includes all devices connected to the switch.

    正确答案:A,C

  • 第22题:

    多选题
    Which two statements are true regarding an Ethernet collision domain?()
    A

    If a switch is used, the collision domain is limited to each device and the switch.

    B

    If a hub is used, the collision domain is limited to each device and the hub.

    C

    If a hub is used, the collision domain includes all devices connected to the hub.

    D

    If a switch is used, the collision domain includes all devices connected to the switch.


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true regarding an Ethernet collision domain?()
    A

    If a switch is used, the collision domain is limited to each device and the switch

    B

    If a hub is used, the collision domain is limited to each device and the hub

    C

    If a hub is used, the collision domain includes all devices connected to the hub

    D

    If a switch is used, the collision domain includes all devices connected to the switch


    正确答案: D,C
    解析: 暂无解析