Which statement about Ethernet networks is true?

A. The advantage of a full duplex is the ability to transmit
data over 111 cable

B. Full duplex Ethernet requires a point-to-point connection
when only two nodes are present

C. Ethernet switches can use full duplex mode to connect
multiple nodes to a single pod of a switch

D. Half duplex is a cut through packet processing method
that is vow fast little error correction Full duplex is a
store and forward method that is slower but has better error
correction



Which statement about Ethernet networks is true? A. The advantage of a full duplex is the ability..

Answer / guest

Answer: B

Is This Answer Correct ?    2 Yes 2 No

Post New Answer

More CCNA Interview Questions

What is the difference between csma/cd and csma/ca?

0 Answers  


What is the difference between bus topology and hub?

0 Answers  


Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191

4 Answers  


let there are three switch and there are 3 ree valn craed on each switch that is vlan 2 on first switch valn 3 on 2nd switch and vlan 4 is cretaed on switch 3 i have implemnted intervlan routin through ciso switchses. the router is conected through its fa0/1 port by one switch and and the two switch are trunked with each other now question is that we want to comuniacte betwwen vlan but does alse want that only vlan 2 is allow to access internet (ISP)which is conected through s0 interface of router.and no any vlan can access that internet.what should be solution.

1 Answers  


Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether

1 Answers  






Which command we give if router ios stucked?

0 Answers  


Which NetWare protocol works on layer 3--network layer--of the OSI model? A. IPX B. NCP C. SPX D. NetBIOS

1 Answers  


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

0 Answers  


Which layer are called upper layer?

0 Answers  


Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port

1 Answers  


6. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway

4 Answers  


Can you explain IKE (Internet Key Exchange)?

1 Answers   CCIE, IBM,


Categories