Match each item with a statement below:

A. Ethernet contention method
B. a sudden rush of network transmissions that causes all other network communications to slow down due to the volume of data competing for access to the same bandwidth on the communications medium
C. the length of time that is required to forward, send, or otherwise propagate a data frame
D. limits collision domains to five segments of wire, four repeaters and/or hubs, and three populated hubs between any two stations on a 10-Mbps network
E. a frame with an FCS error and an octet missing
F. segments a network by filtering traffic at the Data Link layer
G. switches that require all attached network interface devices to use the same transmit/receive speed
H. also known as error sensing
I. virtual local area network that allows you to logically segment a network


A. CSMA/CD
B. Broadcast storm
C. Latency
D. 5-4-3 rule
E. Alignment error
F. Bridge
G. Symmetric switching
H. Adaptive cut-through forwarding
I. VLAN

Computer Science & Information Technology

You might also like to view...

Network speeds are measured in ________ per second

A) bits B) hertz C) nanos D) bytes

Computer Science & Information Technology

PowerPoint has ________ levels of outline indentation

A) 7 B) 9 C) 3 D) 5

Computer Science & Information Technology

From which prompt is the command to specify RIP routing issued?

A) Router(config)> B) Router(config-router-rip)# C) Router(config) D) Router(config)#

Computer Science & Information Technology

Which type of device log contains the most beneficial security data?

a. Firewall log b. Email log c. Switch log d. Router log

Computer Science & Information Technology