Chapter Quizzes Flashcards

1
Q

Which of the following are layers of the OSI reference model? (Choose 3)
Transmission Layer

Application Layer

Presentation Layer

Session Layer

Encryption Layer

Connection Layer

WAN Layer

A

Application Layer

Presentation Layer

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Protocol Data Unit (PDU)?

A type of encryption used in data transmission

A device that manages data transmission rates

A measure of data transmission speed

A chunk of data with protocol-specific headers added at each OSI layer

A

A chunk of data with protocol-specific headers added at each OSI layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary purpose of data encapsulation in network protocols?

To encrypt data for secure transmission

To convert data into an analog signal for transmission

To compress data for faster transmission

To add additional data headers for routing and delivery

A

To add additional data headers for routing and delivery

Explanation

Data encapsulation is a fundamental process in network communication, where data at each layer of the OSI model is wrapped with protocol-specific headers (and sometimes footers). These headers provide essential information such as source and destination addresses, error checking, and more, which are necessary for the correct routing and delivery of data across a network. This process ensures that data packets are handled appropriately at each hop along their path to the destination.

Encapsulation is not about compressing data but organizing it for transmission. Compression is a separate process that might be applied to data before encapsulation.

Encapsulation itself does not involve encryption. Encryption may be applied to data as part of the security protocols at various layers but is distinct from the encapsulation process.

Encapsulation deals with the digital organization of data for transmission, not the conversion of digital signals to analog. The conversion to analog signals, if necessary, is handled at the Physical layer, separate from the encapsulation process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An engineer uses a type of network adapter to connect a fiber link to a router. The
transceiver fits into an optical interface on a layer 3 Ethernet router.

Of the choices, which layer 1 implementation does the engineer utilize?

Media converter

Switch

Bridge

VoIP endpoint

A

Media converter

Explanation
Media converters are layer 1 devices and are used to convert one cable type to another.
These components alter the characteristics of one type of cable to match those of another.
A switch is a layer 2 device. Switches can handle traffic based on a node’s physical address
which is also known as a Media Access Control (MAC) address.
A bridge is a layer 2 appliance or application that connects different networks as if they
were one network.
A VoIP (Voice over Internet Protocol) endpoint is a phone system component that can be
implemented as software running on a computer or smartphone, or as a dedicated
traditional handset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A communications engineer notices that every time it rains the signal becomes very
degraded.

Which layer of the OSI model is the engineer most likely troubleshooting?

Data Link

Transport

Application

Physical

A

Physical

Explanation
The physical layer (PHY) of the OSI model (layer 1) is responsible for the transmission and
receipt of the signals that represent bits of data from one node to another node. Wireless is
one medium.
The data link layer (layer 2) is responsible for transferring data between nodes on the same
logical segment.
At the transport layer on the sending host, the system packages data from the upper layers
as a series of layer 4 protocol data units (PDUs), referred to as segments.
The application layer (layer 7) is at the top of the OSI stack. An application-layer protocol
does not encapsulate any other protocols or provide services to any protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following devices operate at the Data Link layer of the OSI model? (Select
three.)
Routers
Gateways
Repeaters
Hubs
Network interface cards (NICs)
Bridges
Switches

A

Network Interface Cards (NICs)

Bridges

Switches

Explanation
Network interface cards (NICs), bridges, and switches all operate at the OSI Data Link layer.
They use the physical device address (MAC address) to identify packets.
Hubs and repeaters operate at the Physical layer. They simply repeat packets without
regard to addresses.
Routers and gateways function at the Network layer. They examine the logical device and
network address to perform routing tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When the Data Link layer performs encapsulation, it adds control information to the
payload in the form of header fields.

Which of the following are header fields added by the Data Link layer during
encapsulation? (Select three.)

TTL (Time to Live)
Destination hardware address
Sequence number
Source hardware address
Encryption type
Checksum for basic error checking
Window size

A

Destination hardware address

Source hardware address

Checksum for basic error checking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of an Access Control List (ACL) at Layer 3 (Network layer) of the OSI model?

To serve as a list of permissions for file access on the network

To filter network traffic by permitting or blocking packets based on IP
addresses and other criteria

To act as a routing protocol for determining the best path for data
packets

To define the maximum size for packets transmitted across the
network

A

To filter network traffic by permitting or blocking packets based on IP
addresses and other criteria

Explanation
At Layer 3, ACLs are used to enforce security policies by filtering traffic. They determine
which packets are allowed to pass through a network device, such as a router, based on
rules that include IP addresses, protocol types, ports, and other criteria.
ACLs do not define packet sizes; this is typically managed by the network protocols in use,
such as TCP/IP.
ACLs are not routing protocols. Routing protocols like OSPF or BGP are used to determine
the best path for data packets.
ACLs at Layer 3 do not manage file access permissions; they control network traffic. File
access permissions are typically managed by the operating system or file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the OSI model, what is the primary function of the Network layer?
The primary function of the Network layer is to move data around an internetwork using logical network and host IDs.

The primary function of the Network layer is to encode and convert
data into signals suitable for transmission over the physical medium.

The primary function of the Network layer is to ensure reliable
transmission of data across a physical link.

The primary function of the Network layer is to establish, manage,
and terminate connections between applications on different hosts.

A

The primary function of the Network layer is to move data around an internetwork using logical network and host IDs.

Explanation
The primary function of the Network layer is to move data around an internetwork using
logical network and host IDs. The Network layer, or Layer 3 of the OSI model, is responsible
for the logical addressing of data and its delivery across different networks, or an
internetwork. It uses logical addresses, such as IP addresses, to ensure data packets are
routed to the correct destination network and ultimately to the correct host within that
network. Routers, which operate at this layer, use the information contained in the packet’s
network layer header to make forwarding decisions, guiding the packet through the
internetwork hop by hop until it reaches its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following functions are performed by the OSI Transport layer? (Select three.)

Packet formatting for delivery through a medium

Data segmentation and reassembly

Media access control, logical topology, and device identification

Consistent data formatting between dissimilar systems

Path identification and selection

End-to-end flow control

Reliable message delivery

A

Data segmentation and reassembly

End-to-end flow control

Reliable message delivery

Explanation
The Transport layer is responsible for breaking upper-layer data into segments and
allowing reliable communication through end-to-end flow control, error detection, and
error correction.
Message transmission through a medium is performed at the Physical layer.
Media access, logical topology, and device identification occur at the Data Link layer.
Path identification and selection is a function of the Network layer.
Data formatting is performed at the Presentation layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A security engineer configures software-based port security on a hardware firewall.
Which OSI model layer identifies the application ports to configure?
Layer 3
Layer 1
Layer 4
Layer 2

A

Layer 4

Explanation
The transport layer (layer 4) manages end-to-end communications. At layer 4, a port
number identifies each application, such as 80 for hypertext transfer protocol (HTTP) web
traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What role does the Presentation layer (layer 6) of the OSI model play in terms of data
compression and encryption?

The Presentation layer handles the routing of data between different
networks and supports encryption protocols like IPsec.

The Presentation layer supports data compression and encryption to
prepare data for network transmission.

The Presentation layer is primarily responsible for the physical
encryption of data using hardware-based methods.

The Presentation layer is involved in the logical organization of data
into frames for transmission.

A

The Presentation layer supports data compression and encryption to
prepare data for network transmission.

Explanation
The Presentation layer transforms data to ensure that it is in the correct format for the
application or network. This includes data compression to reduce the size of the data for
transmission and encryption to secure the data during transfer.
The Presentation layer deals with data transformation and representation, not physical
encryption methods, which are typically implemented at lower layers or by specific security
hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements accurately describes the function of the Session layer
(layer 5) in the OSI model?
The Session layer is used for character set conversion, such as
between ASCII and Unicode.

The Session layer administers the process of establishing, managing,
and terminating a dialog between client and server.

The Session layer provides the physical transmission of data over
network media.

The Session layer is responsible for routing packets across different
networks.

A

The Session layer administers the process of establishing, managing,
and terminating a dialog between client and server.

Explanation
The correct answer is that the Session layer administers the process of establishing,
managing, and terminating a dialog between client and server. The Session layer is crucial
for controlling the dialog between two computers or network devices. It establishes,
manages, and terminates connections, ensuring that data is properly synchronized and
organized during communication sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A network engineer is designing a network in various offices to create multiple broadcast
domains. Each has its own Virtual Local Area Network (VLAN).
When configuring these multiple broadcast domains on the switch, the switch will be
operating at what layer of the OSI model?
Layer 4 (Transport Layer)

Layer 7 (Application Layer)

Layer 2 (Data Link Layer)

Layer 1 (Physical Layer)

A

Layer 2 (Data Link)

Explanation
Layer 2 (Datalink Layer) is the correct answer. VLANs (Virtual Local Area Networks) are a
Layer 2 technology. When configuring VLANs on a switch, the network engineer is working
at the Data Link Layer. This layer is responsible for segmenting the network into multiple
broadcast domains using VLAN IDs. Devices like switches and bridges operate at this layer
to manage MAC addresses and frames, which are essential for VLAN functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following network geographies refers to a network that spans several buildings within walking distance of each other, such as at a business park?
CAN

WAN

PAN

MAN

A

CAN

A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus. A WAN (Wide Area Network) is a network that spans a large geographical area, such as multiple cities or countries. A PAN (Personal Area Network) is a network that connects devices within an individual’s personal space, typically within a range of a few meters. A MAN (Metropolitan Area Network) is a network that spans a larger area than a LAN (Local Area Network), often covering a city or a metropolitan area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following type of network models doesn’t differentiate between the devices that provide services and those that request services?
Client-server

Point-to-point

Hub-and-spoke

Peer-to-peer

A

Peer-to-peer

A peer-to-peer network model does not differentiate between the clients and the servers, and every node can become a client and a server when requesting and responding to service requests. In a client-server network model, there is a clear distinction between client devices that request services and server devices that provide services. A Point-to-point network is a direct connection between two devices. One device acts as the sender and the other as the receiver. A Hub-and-spoke network model has a central hub that connects other devices (spokes). The hub provides services to the spokes.

17
Q

HongHong, a network administrator, was asked by the Chief Information Officer (CIO) to set up a new office with a network that has full redundancy. What topology would BEST meet the CIO’s requirement?

Hybrid

Bus

Mesh

Star

A

Mesh

A mesh topology connects every endpoint to every other endpoint, creating a fully redundant network. While a hybrid topology combines different topologies, it does not inherently provide full redundancy. The redundancy level depends on the specific combination of topologies used. In a bus topology, all devices are connected to a single shared communication line. If a device on it fails, the entire network can be affected. It lacks redundancy. In a star topology, devices are connected to a central hub or switch. If the hub or switch fails, the network can be disrupted.A mesh topology connects every endpoint to every other endpoint, creating a fully redundant network. While a hybrid topology combines different topologies, it does not inherently provide full redundancy. The redundancy level depends on the specific combination of topologies used. In a bus topology, all devices are connected to a single shared communication line. If a device on it fails, the entire network can be affected. It lacks redundancy. In a star topology, devices are connected to a central hub or switch. If the hub or switch fails, the network can be disrupted.

18
Q

Dion Worldwide has created a network architecture that relies on two main data centers, one in the United States and one in Japan. Each satellite office in the United States and Canada will connect back to the American data center, while each satellite office in Asia will connect back to the Japanese data center. Both the American and Japanese data centers are interconnected, as well. Therefore, if a client in the Philippines wants to send a file to the office in Miami, it will go first to the Japanese datacenter, then route across to the American datacenter, and then to the Miami satellite office. Which of the following network topologies best describes the Dion Worldwide network?

Hub and spoke

Bus

Star

Ring

A

Hub and spoke

A hub and spoke topology is a network topology where a central device (the hub) is connected to multiple other devices (the spokes). A Bus topology has a single communication line where all devices are connected. It does not have distinct hubs and spokes. A star topology has a central hub that connects all devices in a point-to-point manner. While the Dion Worldwide network has hubs, not a single central hub connecting all devices. A Ring topology connects devices in a circular manner, where each device is connected to two neighboring devices. It doesn’t have distinct hubs and spokes.

19
Q

Which type of network device operates at layer 1 of the OSI model and requires connected devices to operate at half-duplex using CSMA/CD?

Switch

Hub

Bridge

Router

A

Hub

A hub is a network hardware device for connecting multiple Ethernet devices together and making them act as a single network segment. It operates at the physical layer (Layer 1) of the OSI model. All devices connected by a hub are in a single collision domain and a single broadcast domain, so it must use half-duplex for communication and CSMA/CD. A switch operates at layer 2 of the OSI model and provides more advanced functionality than a hub. A bridge also operates at layer 2. It connects two separate network segments. A router operates at layer 3 and forwards data packets among networks.

20
Q

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

Tagging

Encapsulation

Tunneling

De-encapsulation

A

De-encapsulation

De-encapsulation in networking is performed at the receiver side or destination side as data moves from layer 1 to layer 7 of the OSI model. As information travels up the layers of the OSI layer, information added from the sender’s encapsulation process is removed layer by layer. Tagging typically refers to the process of adding additional information or labels to data packets for specific purposes. Tunneling involves encapsulating one network protocol within another protocol for data transference. Encapsulation is the reverse process of de-encapsulation.

21
Q

According to the OSI model, at which of the following layers is data encapsulated into a frame?

Layer 1

Layer 2

Layer 3

Layer 4

A

Layer 2

The data layer, or layer 2, is the second layer of the seven-layer OSI model. The data link layer encapsulates data into frames for delivery between nodes on the same network. Data is transmitted at Layers 5, 6, and 7 of the OSI model. At Layer 4, the data is encapsulated into segments. At layer 3, the segments are encapsulated into packets. At layer 2, the packets are encapsulated into frames. At layer 1, the frames are encapsulated into bits.

22
Q

Which network device operates at layer 2?

Repeater

Switch

Router

Firewall

A

Switch

A basic switch operates at layer 2 of the OSI model. For the exam, unless they mention a “multilayer switch” or “layer 3 switch”, always assume they are referencing a basic layer 2 switch. A router is a layer 3 device. A repeater is a layer 1 device. A firewall will operate layers 3 through 7, depending on the type of firewall.

23
Q

What layer of the OSI model is responsible for data encryption and character set conversion, such as ASCII to UTF-8?

Layer 7

Layer 6

Layer 5

Layer 4

A

Layer 6

The presentation layer (layer 6) establishes how information is presented, typically for display or printing. Data encryption and character set conversion (such as ASCII to EBCDIC) are usually associated with this layer. The presentation layer translates information in a way that the application layer understands. This layer also translates information from the application layer to the session layer. Layer 7, the Application Layer, deals with end-user services. Layer 5, the session layer, manages sessions. Layer 4, the transport layer, controls end-to-end communication and error-checking.