网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)

A. After a collision, the station that detected the collision has first priority to resend the lost data.

B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.

C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.

D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.

E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.

F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data.


参考答案

更多 “ Which two statements describe the operation of the CSMA/CD access method, which is in use on the Ezonexam network? (Choose two)A. After a collision, the station that detected the collision has first priority to resend the lost data.B. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.C. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.D. The use of hubs to enlarge the size of collision domains is one way to improve the operation of the CSMA/CD access method.E. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.F. After a collision, all stations involved run an identical backoff algorithm and then synchronize with each other prior to transmitting data. ” 相关考题
考题 IEEE802.3以太网采用_____协议以支持总线性结构,它的全称是()。A.STP,Spanning Tree ProtocolB.STP,Shortest Tree ProtocolC.CSMA/CD Carrier Sense Multicast Access/Collision DetectionD.CSMA/CD Carrier Sent Multicast Access/CRC DetectionE.CSMA/CD Carrier Service Multiple Access/Collision DetectionF.CSMA/CD Carrier Sense Multiple Access/Collision Detection

考题 Two stations on the Ezonexam LAN transmit at the same time, resulting in a collision. What happens when a collision occurs on the network? (Choose all that apply)A.Each device on the Ethernet segment stops transmitting for a short time.B.A jam signal informs all devices that a collision occurred.C.When data transmission resumes, the devices that were involved in the collision have priority to transmit.D.The devices that are involved in the collision stops transmitting for a short time.E.The collision invokes a random back-off algorithm.

考题 Ezonexam has implemented the use of VLANs in their network. Which of the following are considered to be a benefit of VLANs? (Choose three)A. They increase the size of collision domains.B. They allow logical grouping of users by function.C. They can enhance network security,D. The increase the size of broadcast domains while decreasing the number of the broadcast domains.E. The increase the number of broadcast domains while decreasing the size of the broadcast domains.F. They simplify switch administration.

考题 Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet? (Select two answer choices.)A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.B.Half-duplex Ethernet uses a loopback circuit to detect collisions.C.A full-duplex Ethernet card allows 20Mbps for data transmission.D.Full-duplex Ethernet makes use of two pairs of wires for data.E.An Ethernet hub can operate both half and full duplex simultaneously.

考题 Two devices on an Ethernet segment sent frames at the same time causing a collision. Which two statements are true?() A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re- transmit.B. The device with the lowest MAC address is permitted to retransmit first.C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.D. Both devices send a jam signal to notify all other devices of the collision.

考题 The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)A.ARPB.CDPC.DHCPD.DNSE.ICMP

考题 What is the function of the CSMA/CD algorithm in Ethernet technologies?() A. defines how the media is accessedB. supplies a token to determine which host has access to the mediaC. defines the encoding of electrical signals on the wireD. determines the preamble bits

考题 Which two statements about the use of VLANs to segment a network are true?() A. VLANs increase the size of collision domains.B. VLANs allow logical grouping of users by function.C. VLANs simplify switch administration.D. VLANs enhance network security.

考题 Which of the following statements describe the network shown in the graphic?() A. There are two broadcast domains in the network.B. There are four broadcast domains in the network.C. There are six broadcast domains in the network.D. There are four collision domains in the network.E. There are five collision domains in the network.F. There are seven collision domains in the network.

考题 Which of the following statements describe the network shown in the graphic? () A.There are two broadcast domains in the network.B.There are four broadcast domains in the network.C.There are six broadcast domains in the network.D.There are four collision domains in the network.E.There are five collision domains in the network.F.There are seven collision domains in the network.

考题 Which two statements about the use of VLANs to segment a network are true? () A.VLANs increase the size of collision domains.B.VLANs allow logical grouping of users by function.C.VLANs simplify switch administration.D.VLANs enhance network security.

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

考题 In multipoint networks , there are tree persistence methods when a station finds a channel busy.in the 1-persistent method,after the station finds the line idle,it sends its frame immediately.this method has the ( ) chance of collision because two or more stations may find the line (请作答此空) and send their frames immediately. In the nonpersistent method , a station that has a frame to send ( ) the line . If the line is idle , it sends immediately If the line is not idle , it waits a ( ) amount of time and then senses the line again.The nonpersistent approach ( ) the chance of collision because it is unlikely that two or more stations will wait the same amount of time and retry to send simultaneously The p-persistent approach combines the advantages of the other two strategies . It reduces the chance of collision and improves efficiency.A.idle B.busy C.useful D.unusable

考题 What is the function of the CSMA/CD algorithm in Ethernet technologies?()A、defines how the media is accessedB、supplies a token to determine which host has access to the mediaC、defines the encoding of electrical signals on the wireD、determines the preamble bits

考题 Which two statements about 10 Gigabit Ethernet (10GE) are true?()A、10 Gigabit Ethernet does not support VLAN definitionB、10 Gigabit Ethernet supports full duplex links, but does not support half duplex linksC、10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connectionsD、10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD)E、10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is not supported

考题 Which two statements are true regarding an Ethernet collision domain?()A、If a switch is used, the collision domain is limited to each device and the switchB、If a hub is used, the collision domain is limited to each device and the hubC、If a hub is used, the collision domain includes all devices connected to the hubD、If a switch is used, the collision domain includes all devices connected to the switch

考题 Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

考题 Which two statements about the implementation of WLAN QoS are true?()A、The 802.11e standard is the IEEE 802.11 OoS WLAN standard.B、The Wi-Fi Multimedia (WMM) standard decreases the eight priority levels to four access categories.C、The Wi-Fi Multimedia (WMM) standard is a Wi-Fi Alliance standard that increases the four priority levels to eight access categories.D、The Wi-Fi Multimedia (WMM) standard is an IEEE standard that increases the four priority levels to eight access categories.E、Wireless 802.11 deploys Distributed Coordination Function (DCF), carrier sense multiple access with collision detection (CSMA/CD), interframe spacing, and random wait timers to avoid collisions.F、Wireless OoS designs and implementations commonly use Layer 3 differentiated services code point (DSCP) or Layer 2 802.1 p to ensure priority

考题 Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet?()A、Full-duplex Ethernet uses CSMA/CD to prevent collisions.B、Half-duplex Ethernet uses a loopback circuit to detect collisions.C、A full-duplex Ethernet card allows 20Mbps for data transmission.D、Full-duplex Ethernet makes use of two pairs of wires for data.E、An Ethernet hub can operate both half and full duplex simultaneously.

考题 Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()A、It specifies use of a static encryption key that must be changed frequently to enhance security.B、It requires use of an open authentication method.C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.D、It requires that all access points and wireless devices use the same encryption key.E、It includes authentication by PSK

考题 Which two statements about the use of VLANs to segment a network are true? ()A、VLANs increase the size of collision domains.B、VLANs allow logical grouping of users by function.C、VLANs simplify switch administration.D、VLANs enhance network security.

考题 Which two statements are true regarding an Ethernet collision domain?()A、If a switch is used, the collision domain is limited to each device and the switch.B、If a hub is used, the collision domain is limited to each device and the hub.C、If a hub is used, the collision domain includes all devices connected to the hub.D、If a switch is used, the collision domain includes all devices connected to the switch.

考题 Two devices on an Ethernet segment sent frames at the same time causing a collision.Which two statements are true?()A、Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re- transmit.B、The device with the lowest MAC address is permitted to retransmit first.C、The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.D、Both devices send a jam signal to notify all other devices of the collision.

考题 多选题Which two statements are true regarding an Ethernet collision domain?()AIf a switch is used, the collision domain is limited to each device and the switch.BIf a hub is used, the collision domain is limited to each device and the hub.CIf a hub is used, the collision domain includes all devices connected to the hub.DIf a switch is used, the collision domain includes all devices connected to the switch.

考题 多选题Which two statements about 10 Gigabit Ethernet (10GE) are true?()A10 Gigabit Ethernet does not support VLAN definitionB10 Gigabit Ethernet supports full duplex links, but does not support half duplex linksC10 Gigabit Ethernet supports unshielded or shielded twisted-pair cable connectionsD10 Gigabit Ethernet supports Carrier Sense Multiple Access with Collision Detection (CSMA/CD)E10 Gigabit Ethernet supports optical fiber connections in single mode only. Mufti mode is not supported

考题 多选题Which two statements are true regarding an Ethernet collision domain?()AIf a switch is used, the collision domain is limited to each device and the switchBIf a hub is used, the collision domain is limited to each device and the hubCIf a hub is used, the collision domain includes all devices connected to the hubDIf a switch is used, the collision domain includes all devices connected to the switch

考题 多选题Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()AIt specifies use of a static encryption key that must be changed frequently to enhance security.BIt requires use of an open authentication method.CIt specifies the use of dynamic encryption keys that change each time a client establishes a connection.DIt requires that all access points and wireless devices use the same encryption key.EIt includes authentication by PSK