1. (p. 8) How many layers does the OSI model contain?
A. 3
B. 5
C. 7
D. 9
A. 3
B. 5
C. 7
D. 9
2. (p. 16-17) Select the one function below that a NIC does NOT perform.
A. It sends and receives binary data.
B. It provides an interface between the PC and the network.
C. It creates frames.
D. It routes data across the most efficient route on the network.
A. It sends and receives binary data.
B. It provides an interface between the PC and the network.
C. It creates frames.
D. It routes data across the most efficient route on the network.
3. (p. 15) How long is a MAC address?
A. 12 hexadecimal characters
B. 48 bytes
C. 12 bytes
D. 32 bytes
A. 12 hexadecimal characters
B. 48 bytes
C. 12 bytes
D. 32 bytes
4. (p. 15) A MAC address is composed of which two parts?
A. the network address and the node address
B. the computer name and the node address
C. the organizationally unique identifier and the unique device ID of the NIC
D. the IP address and the NICs serial number
A. the network address and the node address
B. the computer name and the node address
C. the organizationally unique identifier and the unique device ID of the NIC
D. the IP address and the NICs serial number
5. (p. 15) Which of the following is another name for a MAC address?
A. physical
B. logical
C. IP
D. computer
A. physical
B. logical
C. IP
D. computer
6. (p. 16) NICs send and receive binary data as pulses of all of the following EXCEPT ___________.
A. electricity
B. radio waves
C. gamma rays
D. light
A. electricity
B. radio waves
C. gamma rays
D. light
7. (p. 16) What must match in the communications between all NICs on a network?
A. frame
B. MAC address
C. frame type
D. IP address
A. frame
B. MAC address
C. frame type
D. IP address
8. (p. 17) What is the length of the typical frame?
A. 150 bytes of data
B. 1024 bytes of data
C. 1500 bytes of data
D. 48 bytes of data
A. 150 bytes of data
B. 1024 bytes of data
C. 1500 bytes of data
D. 48 bytes of data
9. (p. 17) Which statement best describes what happens to frames when the hub sends them to the NICs on the network?
A. The frames are sent only to the NIC that has the destination MAC address.
B. The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame.
C. Every NIC processes the frame when it receives it.
D. The NIC broadcasts the contents of the frame.
A. The frames are sent only to the NIC that has the destination MAC address.
B. The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame.
C. Every NIC processes the frame when it receives it.
D. The NIC broadcasts the contents of the frame.
10. (p. 17) Where does the CRC come from in a network frame?
A. The sending NIC attaches it.
B. The receiving NIC attaches it.
C. The network operating system generates it and attaches it.
D. The network administrator attaches it.
A. The sending NIC attaches it.
B. The receiving NIC attaches it.
C. The network operating system generates it and attaches it.
D. The network administrator attaches it.
11. (p. 18) Which of the following is a broadcast MAC address?
A. 255.255.255.255
B. FF-FF-FF-FF-FF-FF
C. 256
D. 1,000
A. 255.255.255.255
B. FF-FF-FF-FF-FF-FF
C. 256
D. 1,000
12. (p. 24) Routers have which of the following capabilities?
A. They allow you to assign a MAC address to each computer.
B. They allow you to assign an IP address to each computer.
C. They allow you to connect networks with different types of cabling or frames. D. They allow you to set up wireless networks.
A. They allow you to assign a MAC address to each computer.
B. They allow you to assign an IP address to each computer.
C. They allow you to connect networks with different types of cabling or frames. D. They allow you to set up wireless networks.
13. (p. 24) Which of the following statements best describes an IP address?
A. It is a unique identifier burned into the NIC when it is manufactured.
B. It is a unique dotted decimal number assigned to every network node.
C. It is a number shared by all computers on the same network.
D. It is a number assigned only to routers, identifying their priority ratings.
A. It is a unique identifier burned into the NIC when it is manufactured.
B. It is a unique dotted decimal number assigned to every network node.
C. It is a number shared by all computers on the same network.
D. It is a number assigned only to routers, identifying their priority ratings.
14. (p. 12) All of the following statements are true about the OSI model EXCEPT ____________.
A. The OSI model encourages modular design in networking.
B. Each protocol needs to understand all of the protocols handling all the other layers.
C. The OSI model provides a common jargon to describe the function of any network protocol.
D. Each layer of the OSI model addresses an essential network task.
A. The OSI model encourages modular design in networking.
B. Each protocol needs to understand all of the protocols handling all the other layers.
C. The OSI model provides a common jargon to describe the function of any network protocol.
D. Each layer of the OSI model addresses an essential network task.
15. (p. 11) Which standards organization is named for the Greek word for "equal"?
A. OSI
B. ISO
C. Cisco
D. IEEE
A. OSI
B. ISO
C. Cisco
D. IEEE
16. (p. 29) Which layer of the OSI model manages the connections between machines on the network?
A. Application
B. Session
C. Data Link
D. Transport
A. Application
B. Session
C. Data Link
D. Transport
17. (p. 24) When it receives data from the upper layers, which layer of the OSI model assembles the data into smaller pieces called packets?
A. Data Link
B. Physical
C. Network D. Transport
A. Data Link
B. Physical
C. Network D. Transport
18. (p. 24) Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?
A. Presentation
B. Application
C. Network
D. Data Link
A. Presentation
B. Application
C. Network
D. Data Link
19. (p. 22) Which layer of the OSI model adds source and destination MAC addresses to frames?
A. Network
B. Data Link
C. Transport
D. Presentation
A. Network
B. Data Link
C. Transport
D. Presentation
20. (p. 14) In some networks data moves over radio waves, which fall into which layer of the OSI model?
A. Application
B. Session
C. Presentation
D. Physical
A. Application
B. Session
C. Presentation
D. Physical
21. (p. 32) What layer of the OSI model refers to the code built into operating systems that enables network-aware applications?
A. Application
B. Transport
C. Session
D. Presentation
A. Application
B. Transport
C. Session
D. Presentation
22. (p. 21) Which of the following best describes Logical Link Control (LLC)?
A. It is a Layer 1 protocol.
B. It is a sublayer of the Data Link layer. C. It remembers the NIC's MAC address.
D. It controls open network sessions.
A. It is a Layer 1 protocol.
B. It is a sublayer of the Data Link layer. C. It remembers the NIC's MAC address.
D. It controls open network sessions.
23. (p. 14) Anything that moves data from one system to another, such as cabling or radio waves, is part of this layer of the OSI model.
A. Layer 1 B. Layer 2
C. Layer 3
D. Layer 4
A. Layer 1 B. Layer 2
C. Layer 3
D. Layer 4
24. (p. 21) Which layer of the OSI model is the only layer divided into two sublayers?
A. Transport
B. Network
C. Data Link
D. Physical
A. Transport
B. Network
C. Data Link
D. Physical
25. (p. 32) Which of these statements best describes an Application Program Interface?
A. It is the GUI interface that Windows uses to interact with the user.
B. It is the top layer of the OSI model of networking.
C. It is a set of commands, provided by the manufacturer of an operating system, which allows programmers to create applications.
D. It is a protocol that allows Web browsers to request data from a Web server.
A. It is the GUI interface that Windows uses to interact with the user.
B. It is the top layer of the OSI model of networking.
C. It is a set of commands, provided by the manufacturer of an operating system, which allows programmers to create applications.
D. It is a protocol that allows Web browsers to request data from a Web server.
26. (p. 38) For a network tech, one benefit of understanding the OSI seven-layer model and how traffic in an actual network works through the model is applying this knowledge to _______________ networks.
A. purchasing NICs
B. connecting to the Internet
C. troubleshooting D. securing a PC
A. purchasing NICs
B. connecting to the Internet
C. troubleshooting D. securing a PC
27. (p. 24) What device do you need to split a large network into smaller ones?
A. NIC
B. hub
C. router
D. MAC address
A. NIC
B. hub
C. router
D. MAC address
28. (p. 17) How does the receiving station on a network use the CRC to verify that it received accurate data?
A. It uses a new divisor to find a new remainder.
B. It uses the same divisor as the sending station to find the same remainder.
C. It uses the same divisor as the sending station to find a different remainder.
D. It adds its key to that of the sending station to find the total.
A. It uses a new divisor to find a new remainder.
B. It uses the same divisor as the sending station to find the same remainder.
C. It uses the same divisor as the sending station to find a different remainder.
D. It adds its key to that of the sending station to find the total.
29. (p. 24) What is the Network layer unique identifier assigned to each device on a TCP/IP network?
A. IP address B. MAC address
C. router name
D. port number
A. IP address B. MAC address
C. router name
D. port number
30. (p. 24) Routers function at which layer of the OSI model?
A. Physical
B. Data Link
C. Network
D. Transport
A. Physical
B. Data Link
C. Network
D. Transport
31. (p. 34) Routers function at which layer of the TCP/IP model?
A. Internet
B. Application
C. Link
D. Transport
A. Internet
B. Application
C. Link
D. Transport
32. (p. 34) Which TCP/IP model layer uses connection-oriented protocols?
A. Internet
B. Application
C. Link
D. Transport
A. Internet
B. Application
C. Link
D. Transport
33. (p. 36) Which layer of the TCP/IP model is mapped to the top three layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
34. (p. 33) Which layer of the TCP/IP model is mapped to the bottom two layers of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
35. (p. 34) Which layer of the TCP/IP model performs IP addressing functions?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
No comments:
Post a Comment