You are on page 1of 14

1. The Internet model consists of _______ layers.

A) Three
B) Five
C) Seven
D) Eight

2. The process-to-process delivery of the entire message is the


responsibility of the _______ layer.
A) Network
B) Transport
C) Application
D) Physical

3. The _______ layer is the layer closest to the transmission medium.


A) Physical
B) Data link
C) Network
D) Transport

4. Mail services are available to network users through the _______


layer.
A) Data link
B) Physical
C) Transport
D) Application

5. As the data packet moves from the upper to the lower layers,
headers are _______.
A) Added
B) Removed
C) Rearranged
D) Modified

6. The _______ layer lies between the network layer and the
application layer.
A) Physical
B) Data link
C) Transport
D) None of the above
7. Layer 2 lies between the physical layer and the _______ layer.
A) Network
B) Data link
C) Transport
D) None of the above

8. When data are transmitted from device A to device B, the header


from A's layer 4 is read by B's _______ layer.
A) Physical
B) Transport
C) Application
D) None of the above

9. The _______ layer changes bits into electromagnetic signals.


A) Physical
B) Data link
C) Transport
D) None of the above

10. Which of the following is an application layer service?


A) Remote log-in
B) File transfer and access
C) Mail service
D) All the above

11. Why was the OSI model developed?


A) Manufacturers disliked the TCP/IP protocol suite.
B) The rate of data transfer was increasing exponentially
C) Standards were needed to allow any two systems to communicate
D) None of the above

12. The _______ model shows how the network functions of a


computer ought to be organized.
A) CCITT
B) OSI
C) ISO
D) ANSI

13. The physical layer is concerned with the movement of _______


over the physical medium.
A) programs
B) dialogs
C) protocols
D) bits
14. The OSI model consists of _______ layers.
A) three
B) five
C) seven
D) eight

15. In the OSI model, as a data packet moves from the lower to the
upper layers, headers are _______.
A) added
B) removed
C) rearranged
D) modified

16. In the OSI model, when data is transmitted from device A to


device B, the header from A's layer 5 is read by B's _______ layer.
A) physical
B) transport
C) session
D) presentation

17. In the OSI model, what is the main function of the transport layer?
A) node-to-node delivery
B) process-to-process message delivery
C) synchronization
D) updating and maintenance of routing tables

18. In the OSI model, encryption and decryption are functions of the
________ layer.
A) transport
B) session
C) presentation
D) application

19. When a host on network A sends a message to a host on network


B, which address does the router look at?
A) port
B) logical
C) physical
D) none of the above
20. To deliver a message to the correct application program running
on a host, the _______ address must be consulted.
A) port
B) IP
C) physical
D) none of the above

21. IPv6 has _______ -bit addresses.


A) 32
B) 64
C) 128
D) variable

22. ICMPv6 includes _______.


A) IGMP
B) ARP
C) RARP
D) a and b

23. The ______ layer is responsible for moving frames from one hop
(node) to the next.
A) physical
B) data link
C) transport
D) none of the above

24. The ______ layer adds a header to the packet coming from the
upper layer that includes the logical addresses of the sender and
receiver.
A) physical
B) data link
C) network
D) none of the above
2. The Internetworking Protocol (IP) is a ________ protocol.
A) reliable
B) connection-oriented
C) both a and b
D) none of the above

3. _______ is a process-to-process protocol that adds only port


addresses, checksum error control, and length information to the data
from the upper layer.
A) TCP
B) UDP
C) IP
D) none of the above

4. __________ provides full transport layer services to applications.


A) TCP
B) UDP
C) ARP
D) none of the above

5. The ________ address, also known as the link address, is the


address of a node as defined by its LAN or WAN.
A) port
B) physical
C) logical
D) none of the above

6. Ethernet uses a ______ physical address that is imprinted on the


network interface card (NIC).
A) 32-bit
B) 64-bit
C) 6-byte
D) none of the above

7. A port address in TCP/IP is ______ bits long.


A) 32
B) 48
C) 16
D) none of the above
8. The ____ created a model called the Open Systems
Interconnection, which allows diverse systems to communicate.
A) OSI
B) ISO
C) IEEE
D) none of the above

9. The seven-layer _____ model provides guidelines for the


development of universally compatible networking protocols.
A) OSI
B) ISO
C) IEEE
D) none of the above

10. The physical, data link, and network layers are the ______ support
layers.
A) user
B) network
C) both (a) and (b)
D) neither (a) nor (b)

11. The session, presentation, and application layers are the ____
support layers.
A) user
B) network
C) both (a) and (b)
D) neither (a) nor (b)

12. The _______ layer links the network support layers and the user
support layers.
A) transport
B) network
C) data link
D) session

13. The _______ layer coordinates the functions required to transmit a


bit stream over a physical medium.
A) transport
B) network
C) data link
D) physical
14. The _______ layer is responsible for delivering data units from one
station to the next without errors.
A) transport
B) network
C) data link
D) physical

15. The ______ layer is responsible for the source-to-destination


delivery of a packet across multiple network links.
A) transport
B) network
C) data link
D) physical

16. The ________ layer is responsible for the process-to-process


delivery of the entire message.
A) transport
B) network
C) data link
D) physical

17. The ______ layer establishes, maintains, and synchronizes the


interactions between communicating devices.
A) transport
B) network
C) session
D) physical

18. The _______ layer ensures interoperability between


communicating devices through transformation of data into a mutually
agreed upon format.
A) transport
B) network
C) data link
D) presentation

19. The _________ layer enables the users to access the network.
A) transport
B) application
C) data link
D) physical
20. TCP/IP is a ______ hierarchical protocol suite developed ____ the
OSI model.
A) seven-layer; before
B) five-layer; before
C) six-layer; before
D) five-layer; after

21. The TCP/IP _______ layer is equivalent to the combined session,


presentation, and application layers of the OSI model.
A) application
B) network
C) data link
D) physical

22. The ________ address, also known as the link address, is the
address of a node as defined by its LAN or WAN.
A) physical
B) IP
C) port
D) specific

23. The ____ address uniquely defines a host on the Internet.


A) physical
B) IP
C) port
D) specific

24. The_____ address identifies a process on a host.


A) physical
B) IP
C) port
D) specific
1. A repeater is a connecting device that operates in the
_______ layer of the Internet model.
A) physical
B) data link
C) network
D) all of the above

2. A _______ regenerates a signal, connects segments of a


LAN, and has no filtering capability.
A) repeater
B) bridge
C) router
D) none of the above

3. A _______ is a connecting device that operates in the


physical and data link layers of the Internet model.
A) repeater
B) bridge
C) router
D) none of the above

4. A ________ bridge can forward and filter frames and


automatically build its forwarding table.
A) simple
B) dual
C) transparent
D) none of the above

5. A bridge can use the _________ algorithm to create a


loopless topology.
A) binary tree
B) spanning tree
C) multiway tree
D) none of the above

6. A _______ LAN allows several LANs to be connected.


A) backbone
B) wireless
C) wired
D) none of the above
7. A backbone is usually a ______.
A) bus
B) star
C) either (a) or (b)
D) neither (a) nor (b)

8. A virtual local area network (VLAN) is configured by


_________.
A) software
B) physical wiring
C) hardware
D) none of the above

9. Membership in a VLAN can be based on _________.


A) port numbers
B) MAC addresses
C) IP addresses
D) all of the above

10. VLANs can_________.


A) reduce network traffic
B) provide an extra measure of security
C) either (a) or (b)
D) both (a) and (b)

11. _________ is just a connector.


A) An active hub
B) A passive hub
C) either (a) or (b)
D) neither (a) nor (b)

12. In a star-topology Ethernet LAN, _______ is just a point


where the signals coming from different stations collide; it is the
collision point.
A) An active hub
B) A passive hub
C) either (a) or (b)
D) neither (a) nor (b)

13. ________ is part of the media; its location in the Internet


model is below the physical layer.
A) An active hub
B) A passive hub
C) either (a) or (b)
D) neither (a) nor (b)
14. A _______ is a device that operates only in the physical
layer.
A) passive hub
B) repeater
C) bridge
D) router

15. A ________receives a signal and, before it becomes too


weak or corrupted, regenerates the original bit pattern. It then sends
the refreshed signal.
A) passive hub
B) repeater
C) bridge
D) router

16. A __________ forwards every frame; it has no filtering


capability.
A) passive hub
B) repeater
C) bridge
D) router

17. ________ is actually a multiport repeater. It is normally


used to create connections between stations in a physical star
topology.
A) An active hub
B) A passive hub
C) either (a) or (b)
D) neither (a) nor (b)

18. A ________ operates in both the physical and the data link
layer.
A) passive hub
B) repeater
C) bridge
D) router

19. A _______ can check the MAC addresses contained in the


frame.
A) passive hub
B) repeater
C) bridge
D) router
20. A ______ has a table used in filtering decisions.
A) passive hub
B) repeater
C) bridge
D) none of the above

21. A ________ is a device in which the stations are completely


unaware of its existence.
A) passive hub
B) repeater
C) simple bridge
D) transparent bridge

22. IEEE 802.1d specification, defines _________ criteria for a


transparent bridges.
A) two
B) three
C) four
D) none of the above

23. A spanning tree is a graph in which there is no _____.


A) node
B) branch
C) loop
D) arc

24. In a bridged LAN, the _______ algorithm creates a topology


in which each LAN can be reached from any other LAN through one
path only.
A) spanning tree
B) binary tree
C) unary tree
D) none of the above

25. A three-layer switch is a kind of ________.


A) repeater
B) bridge
C) router
D) none of the above

26. A two-layer switch is a ______.


A) repeater
B) bridge
C) router
D) none of the above
27. Some new two-layer switches, called _______ switches, have
been designed to forward the frame as soon as they check the MAC
addresses in the header of the frame.
A) cut-through
B) go-through
C) come-through
D) none of the above

28. A _______ is a three-layer device that handles packets based


on their logical addresses.
A) repeater
B) bridge
C) router
D) none of the above

29. A ______ normally connects LANs and WANs in the Internet


and has a table that is used for making decisions about the route.
A) repeater
B) bridge
C) router
D) none of the above

30. A ______ switch is a faster and more sophisticated router.


A) two-layer
B) three-layer
C) four-layer
D) none of the above

31. A ________ is normally a computer that operates in all five


layers of the Internet model or seven layers of OSI model.
A) repeater
B) bridge
C) router
D) gateway

32. A _____ can be used as a connecting device between two


internetworks that use different models.
A) repeater
B) bridge
C) router
D) gateway
33. In a _____ backbone, the backbone is just one switch.
A) bus
B) ring
C) star
D) none of the above

34. A ________ link acts as a LAN in a remote backbone


connected by remote bridges.
A) point-to-point
B) multipoint
C) multidrop
D) none of the above

35. VLANs create _________ domains.


A) unicast
B) multicast
C) broadcast
D) none of the above

36. In a(n) _______ configuration, the administrator types the


port numbers, the IP addresses, or other characteristics, using the
VLAN software.
A) manual
B) automatic
C) semiautomatic
D) none of the above

37. In a(n) _____ configuration, the stations are automatically


connected or disconnected from a VLAN using criteria defined by the
administrator.
A) manual
B) automatic
C) semiautomatic
D) none of the above

38. In a(n) ______ configuration, the initializing is done


manually, with migrations done automatically.
A) manual
B) automatic
C) semiautomatic
D) none of the above

You might also like