Intro to networks 6.2

Intro to networks 6.2

Professional Development

7 Qs

quiz-placeholder

Similar activities

Authentication and Security Protocols

Authentication and Security Protocols

Professional Development

10 Qs

Access 02

Access 02

University - Professional Development

10 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

Computer Architecture Quiz

Computer Architecture Quiz

Professional Development

10 Qs

Microsoft RISE Program,AISECT Training Centre

Microsoft RISE Program,AISECT Training Centre

Professional Development

10 Qs

Office Packages

Office Packages

Professional Development

10 Qs

CCENT DITKA Chap 2

CCENT DITKA Chap 2

Professional Development

8 Qs

cyberops11

cyberops11

Professional Development

7 Qs

Intro to networks 6.2

Intro to networks 6.2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Angel Martinez

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method is used in Wireless LANs?
A) Contention-based access
B) Controlled access
C) Carrier sense multiple access with collision detection (CSMA/CD)
D) Carrier sense multiple access with collision avoidance (CSMA/CA)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method is used on legacy bus-topology Ethernet LANs?
A) Contention-based access
B) Controlled access
C) Carrier sense multiple access with collision detection (CSMA/CD)
D) Carrier sense multiple access with collision avoidance (CSMA/CA)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which access control method do devices compete for the use of the medium in a multiaccess network?
A) Contention-based access
B) Controlled access
C) Carrier sense multiple access with collision detection (CSMA/CD)
D) Carrier sense multiple access with collision avoidance (CSMA/CA)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method requires each node to have its own designated time to use the medium?
A) Contention-based access
B) Controlled access
C) Carrier sense multiple access with collision detection (CSMA/CD)
D) Carrier sense multiple access with collision avoidance (CSMA/CA)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method is used in legacy Token Ring networks?
A) Contention-based access
B) Controlled access
C) Carrier sense multiple access with collision detection (CSMA/CD)
D) Carrier sense multiple access with collision avoidance (CSMA/CA)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method is used on legacy bus-topology Ethernet LANs?
A) Carrier sense multiple access with collision detection (CSMA/CD)
B) Carrier sense multiple access with collision avoidance (CSMA/CA)
C) Controlled access
D) None of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which access control method is used in Wireless LANs?
A) Carrier sense multiple access with collision detection (CSMA/CD)
B) Carrier sense multiple access with collision avoidance (CSMA/CA)
C) Controlled access
D) None of the above