What are four ways that Fast Ethernet compares to 10BaseT
Ethernet? (Choose four)

A. Fast Ethernet uses the same Maximum Transmission Unit (MTU)

B. Fast Ethernet is based on an extension to the IEEE 802.3
specification

C. Fast Ethernet uses the same Media Access Control (MAC)
mechanisms

D. Fast Ethernet preserves the frame format that is used by
10BaseT Ethernet

E. Fast Ethernet errors a speed increase one hundred times
that of the 10BaseT Ethernet



What are four ways that Fast Ethernet compares to 10BaseT Ethernet? (Choose four) A. Fast Ether..

Answer / guest

Answer: A, B, C, D

Is This Answer Correct ?    5 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which statement about Ethernet networks is true? A. The advantage of a full duplex is the ability to transmit data over 111 cable B. Full duplex Ethernet requires a point-to-point connection when only two nodes are present C. Ethernet switches can use full duplex mode to connect multiple nodes to a single pod of a switch D. Half duplex is a cut through packet processing method that is vow fast little error correction Full duplex is a store and forward method that is slower but has better error correction

1 Answers  


At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance

12 Answers   EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,


Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE

1 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


What are the three phases of PPP session establishment? A. Link establishment phase B. Authentication phase C. Network layer protocol phase D. Handshake phase E. Dial-in phase

2 Answers  






what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how to block some site on that which form user not able to access site and basic firwall config and why are we using firwall please jittendra explain it.can u send me doc of firwall in my gmail id - dsoni89@gmail.com

6 Answers  


Explain the difference between baseband and broadband transmission in ccna?

0 Answers  


What is the Broadcast IP Address?

14 Answers  


Frame relay technology works on which layer of osi model?

0 Answers  


Which is true regarding half duplex Ethernet operation? A.) Half Duplex ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end B.) Half duplex transmission between stations is achieved by using point to multipoint Ethernet and Fast Ethernet C.) With Half Duplex transmission logically circuits feed into a single cable creating a situation similar to a one way bridge D.) Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast Ethernet

2 Answers  


Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection-oriented protocol that acknowledges receipt of data packets and is considered reliable

1 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


Categories