Question
1. How many layers does the OSI model contain? A. 3 B. 5 C. 7 D. 9 2 . Which of the following statements about
1. How many layers does the OSI model contain?
A. 3
B. 5
C. 7
D. 9
2. Which of the following statements about the OSI is FALSE?
A. The OSI model encourages modular design in networking.
B. Each protocol needs to understand all of the protocols handling all the other layers.
C. The OSI model provides a common jargon to describe the function of any network protocol.
D. Each layer of the OSI model addresses an essential network task.
3. Which standards organization is named for the Greek word for equal?
A. OSI
B. ISO
C. Cisco
D. IEEE
4. In some networks, data moves over radio waves. These waves fall into which layer of the OSI model?
A. Application
B. Session
C. Presentation
D. Physical
5. Which layer of the OSI model is associated with moving data from one system to another by means such as cabling or radio waves?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
6. How long is a MAC address?
A. 12 hexadecimal characters
B. 48 bytes
C. 6 pairs of binary digits
D. 32 bits
7. A MAC address is composed of which two parts?
A. the network address and the node address
B. the computer name and the node address
C. the Organizationally Unique Identifier and the device ID of the NIC
D. the IP address and the NICs serial number
8. A MAC address is also known as a(n) __________ address.
A. physical
B. logical
C. IP
D. router
9. NICs send and receive binary data as pulses of all of the following EXCEPT ___________.
A. electricity
B. radio waves
C. gamma rays
D. light
10. All NICs on the same network must use the same __________, or they will not be able to communicate with other NICs.
A. frame check sequence
B. MAC address
C. frame type
D. IP address
11. Select the one function below that a NIC does NOT perform.
A. It sends and receives binary data.
B. It provides an interface between the PC and the network.
C. It creates frames.
D. It verifies the data within each frame.
12. Frames in most networks hold at most __________.
A. 150 bytes of data
B. 1024 bytes of data
C. 1500 bytes of data
D. 48 bytes of data
13. How are incoming frames handled by a switch?
A. The frames are sent only to the NIC that has the destination MAC address.
B. The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame.
C. Every NIC processes the frame when it receives it.
D. The NIC broadcasts the contents of the frame.
14. Where does the CRC originate in a network frame?
A. The sending NIC attaches it.
B. The receiving NIC attaches it.
C. The network operating system generates it and attaches it.
D. The network administrator attaches it
15. How does the receiving station on a network use the CRC to verify that it received accurate data?
A. It uses a new divisor to find a new remainder.
B. It uses the same divisor as the sending station to find the same remainder.
C. It uses the same divisor as the sending station to find a different remainder.
D. It adds its key to that of the sending station to find the total.
16. Which of the following is a broadcast MAC address?
A. 255.255.255.255
B. FF-FF-FF-FF-FF-FF
C. 256
D. 1000
17. Which layer of the OSI model adds source and destination MAC addresses to frames?
A. Network
B. Data Link
C. Transport
D. Presentation
18. Which of the following best describes Logical Link Control (LLC)?
A. It is a Layer 1 protocol.
B. It is a sublayer of the Data Link layer.
C. It remembers the NICs MAC address.
D. It controls open network sessions.
19. Which layer of the OSI model is the only layer divided into two sublayers?
A. Transport
B. Network
C. Data Link
D. Physical
20. Routers have which of the following capabilities?
A. They allow a MAC address to be assigned to each computer.
B. They allow an IP address to be assigned to each computer.
C. They allow network connections across data lines that dont use Ethernet.
D. They allow a network administrator to configure hardware settings.
21. Which of the following statements best describes an IP address?
A. It is a unique identifier burned into the NIC when it is manufactured.
B. It is a unique dotted decimal number assigned to every network node.
C. It is a number shared by all computers on the same network.
D. It is a number assigned only to routers, identifying their priority ratings.
22. When it receives data from the upper layers, which layer of the OSI model assembles the data into smaller pieces called packets?
A. Data Link
B. Physical
C. Network
D. Transport
23. Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?
A. Presentation
B. Application
C. Network
D. Data Link
24. What device do you need to split a large network into smaller ones?
A. NIC
B. bridge
C. router
D. MAC address
25. What is the unique numeric identifier assigned to each device at the Network layer of a TCP/IP network?
A. IP address
B. MAC address
C. router name
D. port number
26. Routers function at which layer of the OSI model?
A. Physical
B. Data Link
C. Network
D. Transport
27. Which layer of the OSI model manages connecting applications to applications?
A. Application
B. Session
C. Data Link
D. Transport
28. Which layer of the OSI model refers to the code built into operating systems that enables network-aware applications?
A. Application
B. Transport
C. Session
D. Presentation
29. Which of these statements best describes an Application Programming Interface?
A. It is the GUI interface that Windows uses to interact with the user.
B. It is the top layer of the OSI model of networking.
C. It provides programmers with a standard way to extend an applications capabilities.
D. It is a protocol that allows Web browsers to request data from a Web server.
30. Routers function at which layer of the TCP/IP model?
A. Internet
B. Application
C. Link
D. Transport
31. Which layer of the TCP/IP model is mapped to the bottom two layers of the OSI model?
A. Link
B. Internet
C. Application
D. Transport
32. Which layer of the TCP/IP model performs IP addressing functions?
A. Transport
B. Link
C. Internet
D. Application
33. Which TCP/IP model layer uses connection-oriented protocols?
A. Internet
B. Application
C. Link
D. Transport
34. Which layer of the TCP/IP model is mapped to the top three layers of the OSI model?
A. Internet
B. Link
C. Transport
D. Application
35. For a network tech, one benefit of understanding the OSI seven-layer model and how traffic in an actual network works through the model is applying this knowledge to __________.
A. purchasing NICs
B. connecting PCs to the Internet
C. troubleshooting networks
D. securing a PC
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started