Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)
A. After a collision, the station that detected the collision has first priority to resend the lost data.
B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.
C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.
D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.
E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.
第1题:
A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re- transmit.
B. The device with the lowest MAC address is permitted to retransmit first.
C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.
D. Both devices send a jam signal to notify all other devices of the collision.
第2题:
A. defines how the media is accessed
B. supplies a token to determine which host has access to the media
C. defines the encoding of electrical signals on the wire
D. determines the preamble bits
第3题:
A. There are two broadcast domains in the network.
B. There are four broadcast domains in the network.
C. There are six broadcast domains in the network.
D. There are four collision domains in the network.
E. There are five collision domains in the network.
F. There are seven collision domains in the network.
第4题:
A.VLANs increase the size of collision domains.
B.VLANs allow logical grouping of users by function.
C.VLANs simplify switch administration.
D.VLANs enhance network security.
第5题:
第6题:
Which two statements about 10 Gigabit Ethernet (10GE) are true?()
第7题:
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。
第8题:
Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?()
第9题:
Which two statements about the use of VLANs to segment a network are true? ()
第10题:
Two devices on an Ethernet segment sent frames at the same time causing a collision.Which two statements are true?()
第11题:
10 Gigabit Ethernet does not support VLAN definition
10 Gigabit Ethernet supports full duplex links, but does not support half duplex links
10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connections
10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is not supported
第12题:
It specifies use of a static encryption key that must be changed frequently to enhance security.
It requires use of an open authentication method.
It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
It requires that all access points and wireless devices use the same encryption key.
It includes authentication by PSK
第13题:
The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)
A.ARP
B.CDP
C.DHCP
D.DNS
E.ICMP
第14题:
A. VLANs increase the size of collision domains.
B. VLANs allow logical grouping of users by function.
C. VLANs simplify switch administration.
D. VLANs enhance network security.
第15题:
A.There are two broadcast domains in the network.
B.There are four broadcast domains in the network.
C.There are six broadcast domains in the network.
D.There are four collision domains in the network.
E.There are five collision domains in the network.
F.There are seven collision domains in the network.
第16题:
A.It specifies use of a static encryption key that must be changed frequently to enhance security
B.It requires use of an open authentication method
C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection
D.It requires that all access points and wireless devices use the same encryption key
E.It includes authentication by PSK
第17题:
What is the function of the CSMA/CD algorithm in Ethernet technologies?()
第18题:
Which two statements are true regarding an Ethernet collision domain?()
第19题:
Which two statements about the implementation of WLAN QoS are true?()
第20题:
Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()
第21题:
Which two statements are true regarding an Ethernet collision domain?()
第22题:
If a switch is used, the collision domain is limited to each device and the switch.
If a hub is used, the collision domain is limited to each device and the hub.
If a hub is used, the collision domain includes all devices connected to the hub.
If a switch is used, the collision domain includes all devices connected to the switch.
第23题:
If a switch is used, the collision domain is limited to each device and the switch
If a hub is used, the collision domain is limited to each device and the hub
If a hub is used, the collision domain includes all devices connected to the hub
If a switch is used, the collision domain includes all devices connected to the switch