MIS-589 Week 3 Quiz 100% Correct Answers

1.

Question :

(TCO B) Which of the following is true with respect to the data link layer?

Student Answer:

It accepts streams of bits from the application layer

It is responsible for getting a message from one computer to another

It accepts messages from the physical layer

It performs routing functions

2.

Question :

(TCO B) You are working to resolve a problem with communication to an office in your building. The Sr. Network Engineer asks you to go get a mini-switch or repeater so that the source of the error can be resolved. What was the likely source of this error?

Student Answer:

Echo

Jitter

Crosstalk

Attenuation

3.

Question :

(TCO B) This error checking scheme adds 8, 16, 24, or 32 bits to the message.

Student Answer:

Parity Checking

Cyclical Redundancy Check

Checksum

Stop-and-Wait ARQ

4.

Question :

(TCO B) This type of transmission is typically used on a point-to-point full-duplex circuits.

Student Answer:

synchronous transmissions

High-level data link control

asynchronous transmissions

Continuous ARQ



5.

Question :

(TCO B) Your new position requires that you maintain a Token Ring network that includes several IBM mainframes. What type of access control would this network most likely use?

Student Answer:

Contention based

Mixed Mode

Relative performance based

Controlled based



6.

Question :

(TCO B) You are working with a co-worker over the phone to connect a router at your location in New York to their network in San Francisco. After hours of troubleshooting the WAN protocol configured on the routers you find that the root of the problem is that he has a Cisco router and you have a Nortel router. Which WAN protocol are you most likely configuring in this scenario?

Student Answer:

HDLC

SDLC

PPP

Ethernet



7.

Question :

(TCO B) __________ is not a function of a data link protocol.

Student Answer:

Media access control

Message delineation

Amplitude shift keying

Error Control

8.

Question :

(TCO B) The key to selecting the best access control technique is to _______________.

Student Answer:

whether you are using mainframes or not

selecting the appropriate cable media

find the crossover point between controlled and contention

type of LAN



9.

Question :

(TCO B) In general, controlled approaches:

Student Answer:

work better than contention approaches for small networks that have low usage

work better than contention approaches for large networks that have high usage

work better than contention approaches for all sizes of networks

do not require a host, server, or active monitor to assign media access control



10.

Question :

(TCO B) With contention:

Student Answer:

computers wait until the circuit is free before they send data

the front end processor must wait for a response from the polled client or terminal

one computer starts the poll and passes it to the next computer on the multipoint circuit

there is never a chance of a “collision” or two computers trying to send data at the same time

Photos

MIS-589 Week 3 Quiz 100% Correct Answers
$15.00 Tax included. Shipping not included.

User reviews

No reviews. Be the first to write one!

Delivery

All purchases are sent via email. Check your inbox and spam folder for an email from DevryGenius.com.

Promotions

Subscribe to our newsletter to receive special discounts and offers.

Contact us

DevryGenius.com
New York, NY 10011
support@devrygenius.com,

Newsletter

Sign up and never miss another deal.