Advertisement Upgrade to remove ads

1) Which of the following best describes the Presentation layer?
A) Establishes, maintains, and manages sessions between applications
B) Translates, encrypts, or prepares data from the Application layer for network transmission.
C) Handles routing information for data packets
D) Provides the electrical and mechanical transmission of data
E) Handles link control and uses the MAC address on the network interface card (NIC).

B) Translates, encrypts, or prepares data from the Application layer for network transmission.

2) Which of the following best describes the Network layer?
A) Handles routing information for data packets
B) Provides the electrical and mechanical transmission of data
C) Handles link control and uses the MAC address on the network interface card (NIC)
D) Establishes, maintains, and manages sessions between applications
E) Translates, encrypts, or prepares data from the Application layer for network transmission.

A) Handles routing information for data packets

3) Which of the following best describes the Session layer?
A) Translates, encrypts, or prepares data from the Application layer for network transmission
B) Handles routing information for data packets
C) Provides the electrical and mechanical transmission of data
D) Handles link control and uses the MAC address on the network interface card (NIC)
E) Establishes, maintains, and manages sessions between applications

E) Establishes, maintains, and manages sessions between applications

4) Which of the following best describes the Transport layer?
A) Provides the electrical and mechanical transmission of data
B) Handles link control and uses the MAC address on the network interface card (NIC)
C) Establishes, maintains, and manages sessions between applications
D) Segments and reassembles data and provides either connection oriented or connectionless communications
E) Translates, encrypts, or prepares data from the Application layer for network transmission

D) Segments and reassembles data and provides either connection oriented or connectionless communications

5) Which of the following best describes the Data Link Layer?
A) Provides the electrical and mechanical transmission of data
B) Handles link control and uses the MAC address on the network interface card (NIC)
C) Establishes, maintains, and manages sessions between applications
D) Translates, encrypts, or prepares data from the Application layer for network transmission
E) Handles routing information for data packets

B) Handles link control and uses the MAC address on the network interface card (NIC)

6) Which of the following best describes the Physical layer?
A) Establishes, maintains, and manages sessions between applications
B) Translates, encrypts, or prepares data from the Application layer for network transmission
C) Provides the electrical and mechanical transmission of data
D) Handles link control and uses the MAC address on the network interface card (NIC)
E) Provides network services to the user

C) Provides the electrical and mechanical transmission of data

7) Which of the following best describes the Application layer?
A) Establishes, maintains, and manages sessions between applications
B) Translates, encrypts, or prepares data from the Application layer for network transmission
C) Provides network services to the user
D) Handles routing information for data packets
E) Provides the electrical and mechanical transmission of data

C) Provides network services to the user

8) Which of the following accurately describe the Media Access Control (MAC) address? (Choose all that apply)
A) It is a physical number set during the manufacturing process
B) This address is a layer in a network segment.
C) MAC addresses contain 12 hexadecimal numbers
D) Computers use this address to uniquely identify themselves on the network.
E) An IP address is one example of this type of address.

A) It is a physical number set during the manufacturing process
C) MAC addresses contain 12 hexadecimal numbers
D) Computers use this address to uniquely identify themselves on the network.

9) Which of the following accurately describe the network address? (Choose all that apply)
A) It is a physical number set during the manufacturing process
B) This address is used when routing communications between different network segments.
C) The Data Link layer uses this address
D) This address is set at layer 3 of the OSI model
E) An example of this type of address is an IP address.

B) This address is used when routing communications between different network segments.
D) This address is set at layer 3 of the OSI model
E) An example of this type of address is an IP address.

10) Connection oriented services are also known as ____________services.
A) Reliable
B) Unreliable
C) Datagram

A) Reliable

11) Connectionless services are also called ________________services.
A) Reliable
B) Acknowledgement
C) Unreliable

C) Unreliable

12) Which of the following describes services that receive an acknowledgement from the destination? (Choose all that apply)
A) Datagram
B) Reliable
C) Connection-oriented
D) Connectionless
E) Unreliable

B) Reliable
C) Connection-oriented

13) Place the following steps of data encapsulation in their correct descending order:
A) Frame headers and trailers added
B) Segment header added
C) Bit transmission
D) Packet creation and Network Header
E) Data Conversion

E) Data Conversion
B) Segment header added
D) Packet creation and Network Header
A) Frame headers and trailers added
C) Bit transmission

14) Which of the following correctly defines a WAN?
A) A network contained within a single geographic location and usually connected by a privately maintained media
B) A network spread over multiple geographic areas and usually connected by publicly and privately maintained media
C) A network spread over a single metropolitan area

B) A network spread over multiple geographic areas and usually connected by publicly and privately maintained media

15) Which of the following best describes a LAN?
A) A network that is contained in a single geographic area such as a building or floor in a building
B) A countrywide network that spans multiple geographic locations
C) A large network that is connected by both publicly and privately maintained cabling spread over multiple geographic regions

A) A network that is contained in a single geographic area such as a building or floor in a building

16) Which of the following reasons for providing a layered OSI architecture are correct? (Choose all that apply)
A) To provide design modularity, which allows upgrades to a specific layer to remain separate from the other layers.
B) To simplify the networking model by dividing the networking model in 14 layers and 12 sublayers.
C) To discourage interoperability between disparate networking models.
D) To enable programmers to specialize in a particular layer.
E) To allow for standardized interfaces from networking vendors

A) To provide design modularity, which allows upgrades to a specific layer to remain separate from the other layers
D) To enable programmers to specialize in a particular layer.
E) To allow for standardized interfaces from networking vendors

17) On a network, computers must use a common ____________ in order for communication to occur.
A) Protocol
B) Operating system
C) Manufacturer
D) Hardware platform

...

18) Before networks, what did people use to transfer files?
A) Sneakernet
B) Protocols
C) Interface cards
D) Ethernet

...

19) A protocol is to a computer as a(n) ________________ is to a person.
A) Identify
B) Personality
C) Language
D) Personal philosophy

...

20) Which of the following are network hardware? (Choose all that apply)
A) NIC
B) NOS
C) LLC
D) Network media
E) Connectors

...

21) Which of the following are network software? (Choose all that apply)
A) Components that map to the Application layer of the OSI model.
B) NIC
C) NOS
D) Media connectors

...

22) All networking vendors follow the OSI model and design seven layer architectures.
A) True
B) False

...

23) Communications on a network originate at the
A) Destination
B) Breaker
C) Peak
D) Source

...

24) Transmitted signals are bound for a(n) _____________ computer.
A) Destination
B) Breaker
C) Peak
D) Source

...

25) Information transmitted on a network is called a(n) ______________________
A) Package
B) Expresser
C) Data destination
D) Data packet
E) E-pack

...

26) Which of the following are layers of the OSI model? (Choose all that apply)
A) OSI
B) Physical
C) IEEE
D) Data Link

...

27) Which layer of the OSI model is responsible for media access and packaging data into frames?
A) Network layer
B) Physical layer
C) Data Link layer
D) Transport layer

...

28) At which layer of the OSI model will encryption and compression occur?
A) Presentation layer
B) Session layer
C) Application layer
D) Network layer

...

29) Which of the following lists the layers of the OSI mode from layer 7 to layer 1?
A) Application, Session, Transport, Network, Presentation, Data Link, Physical
B) Physical, Data Link, Network, Transport, Session, Presentation, Application
C) Application, Presentation, Session, Transport, Network, Data Link, Physical
D) Presentation, Application, Session, Network, Transport, Data Link, Physical

...

30) The __________ layer is responsible for finding the best path to route packets within an internetwork.
A) Transport
B) Network
C) Session
D) Data Link

...

1) ROUTERS OPERATE AT WHICH LAYER OF THE OSI MODEL?
A) DATA LINK
B) PRESENTATION
C) SESSION
D) NETWORK

...

2) BRIDGES OPERATE AT WHICH LAYER OF THE OSI MODEL?
A) NETWORK
B) DATA LINK
C) SESSION
D) TRANSPORT

...

3) WHAT IS THE ADVANTAGE OF USING A SWITCH RATHER THAN A BRIDGE?
A) LOWER COST
B) MICROSEGMENTATION
C) USE OF THE MAC ADDRESS FOR FILTERING
D) THERE IS NO ADVANTAGE TO USING A SWITCH RATHER THAN A BRIDGE

...

4) WHICH OF THE FOLLOWING IS AN APPROPRIATE DESCRIPTION OF A BROADCAST STORM?
A) NONE ON THE NETWORK
B) A LARGE AMOUNT OF TRAFFIC THAT PASSES DIRECTLY THROUGH ROUTERS
C) AN ELECTRICAL CONDITION CAUSED BY THE SUN
D) AN ERROR CONDITION IN WHICH MANY BROADCASTS ARE SENT SIMULTANEOUSLY ACROSS THE ENTIRE NETWORK

...

5) WHICH OF THE FOLLOWING BEST DESCRIBES A NETWORK SEGMENT?
A) A SECTION OF THE NETWORK THAT HAS BEEN SEPARATED FROM OTHER SEGMENTS BY A ROUTER, BRIDGE, OR SWITCH
B) A PIECE OF BROKEN TWISTED-PAIR CABLE
C) A PIECE OF BROKEN COAXIAL CABLE
D) A PORTION OF THE NETWORK THAT HAS BEEN ISOLATED WITH A REPEATER

...

6) A ROUTER THAT HAS EIGHT PORTS WILL REQUIRE HOW MANY IP ADDRESSES?
A) FOUR
B) SIX
C) EIGHT
D) NINE
E) TEN

...

7) IF A BRIDGE RECEIVES A FRAME THAT HAS A DESTINATION MAC ADDRESS LOCATED ON THE SAME SEGMENT FROM WHICH IT CAME, WHAT WILL HAPPEN TO THE FRAME AT THE BRIDGE?
A) IT WILL BE FORWARDED
B) IT WILL BE DROPPED
C) THE SOURCE SIGNAL WILL BE REPEATED ON ALL SEGMENTS
D) THE DESTINATION ADDRESS WILL BE REPEATED ON ALL SEGMENTS

...

8) WHICH OF THE FOLLOWING IS NOT TRUE ABOUT BRIDGES?
A) BRIDGES DO NOT FORWARD BROADCAST TRAFFIC
B) BRIDGES SEGMENT THE NETWORK
C) BRIDGES REDUCE THE LIKELIHOOD OF A COLLISION
D) BRIDGES OPERATE AT THE DATA LINK LAYER

...

9) WHICH OF THE FOLLOWING IS NOT TRUE ABOUT ROUTERS?
A) ROUTERS OPERATE AT THE NETWORK LAYER
B) ROUTERS SEGMENT THE NETWORK
C) ROUTERS REDUCE BROADCAST TRAFFIC
D) ROUTERS ARE FASTER THAN REPEATERS

...

10) WHICH OF THE FOLLOWING IS NOT TRUE ABOUT SWITCHES?
A) SWITCHES OPERATE AT THE DATA LINK LAYER
B) SWITCHES CREATE VIRTUAL NETWORK SEGMENTS
C) SWITCHES DO NOT SEGMENT THE NETWORK
D) SWITCHES CREATE PRIVATE CONNECTIONS BETWEEN TWO POINT

...

11) WHICH TYPE OF ADDRESSES DO ROUTERS USE?
A) LOGICAL
B) PHYSICAL
C) MAC
D) DATA LINK

...

12) A _____________ CAN REDUCE BROADCAST TRAFFIC
A) BRIDGE
B) ROUTER
C) REPEATER
D) CONNECTOR

...

13) WHICH OF THE FOLLOWING IS THE CORRECT NAME FOR A DEVICE THAT OPERATES AT BOTH THE DATA LINK AND NETWORK LAYERS OF THE OSI REFERENCE MODEL?
A) ROUTER
B) BRIDGE
C) SWITCH
D) BROUTER
E) HUB

...

14) WHEN TWO STATIONS BROADCAST AT THE SAME TIME ON A SINGLE SEGMENT OF AN ETHERNET NETWORK, WHAT HAPPENS?
A) CONTENTION
B) CRASH
C) COLLISION
D) INTERRUPTION

...

15) WHICH TYPE OF ADDRESSES DO BRIDGES USE?
A) LOGICAL
B) PHYSICAL
C) IP
D) TCP

...

16) WHICH OF THE FOLLOWING IS AN IMPLEMENTATION OF GIGABIT ETHERNET?
A) 1000BASET
B) 1000BASEFX
C) 1000BASE3
D) ALL OF THE ABOVE

...

17) WHICH OF THE FOLLOWING OSI LAYERS CONTAINS MEDIA ACCESS CONTROL INFORMATION?
A) PHYSICAL
B) DATA LINK
C) TRANSPORT
D) PRESENTATION
E) SESSION
F) NETWORK

...

18) A SWITCH DIVIDES NETWORK COMMUNICATIONS AT WHICH LAYER OF THE OSI MODEL?
A) PRESENTATION
B) NETWORK
C) TRANSPORT
D) DATA LINK

...

19) WHICH OF THE FOLLOWING DEVICES TRANSLATES BETWEEN DIFFERENT PROTOCOLS?
A) BRIDGE
B) SWITCH
C) ROUTER
D) GATEWAY

...

20) RANK THE FOLLOWING DEVICES FROM LOWEST TO HIGHEST LATENCY?
A) HUB
B) SWITCH
C) GATEWAY
D) ROUTER

...

21) TYPICALLY, WHICH IS THE BEST DEVICE FOR INCREASING PERFORMANCE ON YOUR LAN?
A) HUB
B) BRIDGE
C) SWITCH
D) ROUTER

...

22) WHAT KIND OF BRIDGES DO ETHERNET NETWORKS USE?
A) TRANSLATION
B) SOURCE ROUTING
C) TRANSPARENT
D) BROOKLYN

...

23) WHAT KIND OF BRIDGES WILL CONNECT AN ETHERNET NETWORK TO A TOKEN RING NETWORK?
A) TRANSLATION
B) SOURCE ROUTING
C) TRANSPARENT
D) BROOKLYN

...

24) WHY DON'T REPEATERS AND HUBS SEGMENT THE NETWORK?
A) THEY ONLY WORK AT THE PHYSICAL LAYER WHERE THERE IS NOTHING TO FILTER
B) THEY ARE NOT CONSIDERED DEVICES
C) THEY OPERATE AT THE NETWORK LAYER WHERE SEGMENTATION CAN'T OCCUR
D) THEY DO SEGMENT THE NETWORK

...

25) ANOTHER NAME FOR IP ADDRESS IS__________ ADDRESS AND ANOTHER NAME FOR A MAC ADDRESS IS _____________ ADDRESS.
A) ETHERNET, LOGICAL
B) PHYSICAL, ETHERNET
C) LOGICAL, PHYSICAL
D) NIC, SOFTWARE

...

26) WHAT DEVICE PROVIDES FUNCTIONS SIMILAR TO A HUB IN WIRELESS NETWORKS?
A) WIRELESS LOCAL AREA NETWORK
B) OPTICAL REPEATER
C) VIRTUAL LOCAL AREA NETWORK
D) WIRELESS ACCESS POINT

...

27) WHICH OF THE FOLLOWING REPRESENTS THE HIGHEST LEVEL OF 802.11 SECURITY?
A) WPA2
B) WPA
C) 802.11I
D) WEP

...

28) WHICH OF THE FOLLOWING DOES NOT OPERATE IN THE 2.4 GHZ FREQUENCY RANGE?
A) 802.11
B) 802.11A
C) 802.11B
D) 802.11G

...

1) WHICH OF THE FOLLOWING IS A RELIABLE COMMUNICATIONS PROTOCOL?
A) UDP
B) TCP
C) IP
D) ICMP

...

2) WHICH OF THE FOLLOWING IS USED BY THE TFTP PROTOCOL?
A) UDP
B) TCP
C) ICMP
D) TELNET

...

4) WHICH OF THE FOLLOWING IS A TCP/IP APPLICATION LAYER PROTOCOL? (CHOOSE ALL THAT APPLY)
A) DNS
B) FTP
C) UDP
D) IP
E) ICMP

...

5) WHICH OF THE FOLLOWING IS A TCP/IP INTERNETWORK LAYER PROTOCOL? (CHOOSE ALL THAT APPLY)
A) ICMP
B) FTP
C) DNS
D) ARP
E) IP

...

6) WHICH OF THE FOLLOWING IS A TCP/IP TRANSPORT LAYER PROTOCOL? (CHOOSE ALL THAT APPLY)
A) ARP
B) RARP
C) IP
D) UDP
E) TCP

...

7) WHAT ARE THE WELL KNOWN PORT NUMBERS?
A) 1024 - 49151
B) 49152 - 65535
C) 0 - 1021
D) 1 - 1023

...

8) WHAT IS THE PURPOSE OF THE THREE-WAY HANDSHAKE?
A) TO ESTABLISH A RELIABLE CONNECTION BETWEEN TWO POINTS
B) TO ESTABLISH AN UNRELIABLE CONNECTION BETWEEN TWO POINTS
C) TO ESTABLISH A RELATIONSHIP AT THE APPLICATION LAYER BETWEEN TWO POINTS
D) TO ESTABLISH A RELATIONSHIP AT THE INTERNETWORK LAYER BETWEEN TWO POINTS

...

9) WHAT IS AN ARP TABLE?
A) DESTINATION AND SOURCE MAC ADDRESSES
B) MAC AND CORRESPONDING IP ADDRESSES
C) DESTINATION AND SOURCE IP ADDRESSES
D) ROUTES TO NETWORKS

...

10) WHAT DO COMPUTERS DO WITH THE INFORMATION IN AN ARP REQUEST WHEN THEY ARE NOT THE DESTINATION IP?
A) UPDATE THEIR ARP CACHES WITH THE DESTINATION INFORMATION
B) UPDATE THE ARP CACHES WITH THE SOURCE INFORMATION
C) UPDATE THEIR ROUTING TABLES WITH THE ARP INFORMATION
D) NONE OF THE ABOVE

...

11) ROUTERS PASS ARP BROADCASTS TO FIND MAC ADDRESSES ON OTHER NETWORKS.
A) TRUE
B) FALSE

...

12) AN ARP REQUEST IS A
A) MULTICAST
B) UNICAST
C) BROADCAST
D) ANYCAST

...

14) RARP HAS LARGELY BEEN REPLACED BY?
A) BOOTP
B) ARP
C) DHCP
D) DNS
E) THE FIRST THREE OCTETS

...

15) PING AND TRACE BOTH RELY ON WHAT PROTOCOL?
A) SMTP
B) DNS
C) ICMP
D) TFTP

...

16) WHEN SENDING PACKETS TO REMOTE SEGMENTS, ROUTER RELY ON INFORMATION IN
A) ARP TABLES
B) ROUTING TABLES
C) SWITCHING TABLES
D) ROM

...

17) DISTANCE-VECTOR ALGORITHMS AND LINK-STATE ALGORITHMS ARE USED IN
A) DHCP
B) ARP
C) STATIC ROUTING
D) DYNAMIC ROUTING

...

18) ALL COMPUTERS ON THE LOCAL SEGMENT PROCESS AN ARP REQUEST AT LAYER 4 OF THE OSI MODEL.
A) TRUE
B) FALSE

...

19) EACH INTERFACE ON A ROUTER REPRESENTS AN IP ADDRESS ON A DIFFERENT NETWORK.
A) TRUE
B) FALSE

...

20) THE TCP ACKNOWLEDGEMENT PROCESS IS .
A) EXPECTATIONAL
B) SEQUENTIAL
C) EXCEPTIONAL
D) SESQUICENTENNIAL

...

21) WHICH OF THE FOLLOWING ARE NOT ICMP MESSAGE TYPES?
A) ECHO & DESTINATION UNREACHABLE
B) SOURCE QUENCH & REDIRECT
C) RELAY & REROUTE
D) PARAMETER PROBLEM & INFORMATION
E) TIMESTAMP & TIME EXCEEDED

...

22) WHICH LAYER OF CISCO'S THREE-LAYER HIERARCHIAL MODEL PROVIDES SERVICES SUCH AS TRAFFIC CONTROL AND SECURITY TO THE NETWORK?
A) ACCESS LAYER
B) DISTRIBUTION LAYER
C) CORE LAYER
D) ALL LAYERS CAN PROVIDE THESE FUNCTIONS
TRAFFIC CONTROL AND SECURITY ARE NOT ADDRESSED BY THIS MODEL.

...

1) IF YOUR CLASS C ADDRESS HAS A THREE-BIT SUBNET MASK, WHICH OF THE FOLLOWING WOULD BE A SUBNETWORK IDENTIFIER?
A) 203.16.34.33
B) 203.16.34.135
C) 203.16.34.32
D) 203.16.34.240

...

2) WHICH OF THE FOLLOWING WOULD BE A BROADCAST ADDRESS FOR A CLASS C NETWORK?
A) 190.15.23.255
B) 190.42.25.255
C) 221.21.23.255
D) 129.21.15.255

...

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set