ThatQuiz Test Library Take this test now
CCNA Semester 1 - Chapter 7 Review
Contributed by: Alvarado
  • 1. The method of Media Access Control is determined by two things: Media Sharing and the Logical ________________.
A) device
B) topology
C) virtual circuit
D) application
  • 2. Three factors are crucial to consider when implementing a Layer 2 protocol in a network: the number of hosts to be connected, the physical layer implementation, and the geographic scope of the __________________.
A) logistics
B) network
C) server
D) domain
  • 3. When a host device sends out a packet, the packet must have two MAC addresses: the MAC address of the host and the MAC address of: ______________________________.
A) the neighboring LAN's gateway
B) the destination device
C) the LAN's own primary switch
D) the LAN's own gateway
  • 4. Contention-based media access for a shared media have the following 3 properties except:
A) non-deterministic
B) less overhead
C) collisions exist
D) only one station can transmit at one time
  • 5. Although the logical and physical topologies of a LAN may be different, the logical topology will always consist of virtual ____________________ between nodes.
A) gateways
B) servers
C) domains
D) connections
  • 6. The following are 3 main characteristics of MAC/Ethernet Layer 2 addresses except:
A) they are considered physical addresses
B) they are 48 binary bits in length
C) they are generally shown in hexadecimal not decimal
D) they are 128 binary bits in length
  • 7. The primary purpose of the trailer in a data link layer frame is to support frame ____________ detection.
A) hop-control
B) gateway
C) error
D) time-to-live
  • 8. The primary purpose of Data Link Layer encapsulation (surrounding data within a packet) is to facilitate the entry and exit of data onto the network ______________.
A) gateway
B) server
C) domain
D) media
  • 9. In a logical Point-to-Point topology (think DSL/WAN/PPOE), the frames do NOT need need a lot of overhead information; therefore, the media access control protocol will tend to be a very _______________ protocol.
A) complex
B) complicated
C) segmented
D) simple
  • 10. To summarize the role of the Data Link Layer, it can be said that it provides for the exchange of data over a common local ___________.
A) cabling system
B) wireless system
C) media
D) Ethernet system
  • 11. If an end device is moved from one network or subnet to another, the device will still have the same MAC address, and _______________________ address must be reassigned to allow it to communicate on the network.
A) a new gateway
B) a new MAC
C) a new routing table entry
D) a new IP
  • 12. Which sublayer of the data link layer prepares a signal to be transmitted at the physical layer?
A) MAC
B) IP
C) TCP
D) POP3
  • 13. When a host device sends a packet to an end device on another network, the source and destination IP addresses _________________ change/s.
A) never
B) always
C) sometimes
D) often
  • 14. When a host device sends a packet to an end device on another network, the source and destination MAC addresses _________________ change/s.
A) never
B) always
C) rarely
D) hardly ever
  • 15. (L7.3.4): On its a way to a destination device, the Frame Check Sequence (FCS) section of a frame's trailer will be calculated twice each time for comparison; except at the source device, where the FCS (Cyclic Redundancy Check (CRC)) will only be calculated ___________________.
A) four times
B) three times
C) one time
D) five times
  • 16. In the OSI Model Layer 2, the physical address added to a frame is the address burned into the __________________________.
A) NAT gateway interface
B) network interface card
C) gateway interface
D) application duplex binary interface
  • 17. In a frame that has been configured with the Ethernet protocol (7.3.5), the two purposes of the header 'preamble' section is to mark the end of transmission and ______________________.
A) synchronization
B) multiplexing
C) full-duplexing
D) segmentation
  • 18. If a network administrator is asked where and what type of network wiring is present in the building, s/he would be expected to show a ______________ ________________ diagram.
A) virtual circuit
B) physical topology
C) IP subnetting
D) logical topology
  • 19. In a logical token-passing topology, end devices can only transmit when they possess a "token," and this token must be passed _____________________.
A) nationally (from a tier 1 to tier 2 ISP)
B) sequentially (one by one in order)
C) dynamically (as determined by the DHCP)
D) statically (as determined by the ISP)
  • 20. Media Access Control methods and protocols control how data frames are defined on the media. Ethernet is the most popular of these protocols as it uses the ________________ method.
A) CCNA-NP
B) Token-Passing
C) CSMA/CA
D) CSMA/CD
  • 21. The standards set for Ethernet (802.3) and Wireless (802.11) are set by the:
A) ITU
B) ANSI
C) ISO
D) IEEE
  • 22. One of the advantages of Controlled Access Methods was that collisions _____________________________.
A) never took place
B) sometimes took place
C) always took place
D) often took place
  • 23. When a data packet or PDU arrives at the Data Link Layer and is encapsulated with header and trailer information, that PDU is now called a:
A) frame
B) bit
C) byte
D) PDA
  • 24. The company that has greatly contributed to advances of technology through its research and development lab at Palo Alto, CA is:
A) Microsoft
B) IBM Corp.
C) Apple, Inc.
D) Xerox
  • 25. Computers only understand binary information. Binary data is comprised of bits: 1s and 0s. A Byte is composed of _____ bits.
A) 128
B) 16
C) 4
D) 8
Students who took this test also took :

Created with That Quiz — a math test site for students of all grade levels.