[ AETN1102 ] (8) Data Link Layer - Review

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:38 PM on 3/27/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

42 Terms

1
New cards

B

What is another name for the OSI data link layer?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

2
New cards

C

What is one service performed by the data link layer of the OSI model?

A. It determines the path to forward packets.

B. It fragments data packets into the MTU size.

C. It accepts Layer 3 packets and encapsulates them into frames.

D. It monitors the Layer 2 communication by building a MAC address table

3
New cards

B

The IEEE 802 LAN/MAN data link layer consists of which two sublayers?

A. Network Control Protocol

B. Logical Link Control and Media Access Control

C. Media Access Control and Network Control Protocol

D. Link Control Protocol and Network Control Protocol

4
New cards

A

Which is a function of the Logical Link Control (LLC) sublayer?

A. To communicate between the networking software at the upper layers and the device

hardware at the lower layers

B. To define the media access processes that are performed by the hardware

C. To provide data link layer addressing

D. To accept segments and package them into data units that are called packets

5
New cards

B

What Layer 2 function does a router perform?

A. Accepts a frame from a medium, de-encapsulates the frame, and refers to its Layer 3 routing table for a matching destination network

B. Accepts a frame from a medium, de-encapsulates the frame, and re-encapsulates the packet into a new frame

C. Accepts a frame from a medium, refers to its Layer 3 routing table for a matching destination network, and re-encapsulates the packet into a new frame

D. De-encapsulates the frame, refers to its Layer 3 routing table for a matching destination network, and re-encapsulates the packet into a new frame

6
New cards

D

What kind of network would use point-to-point, hub and spoke, or mesh topologies?

A. PAN

B. WLAN

C. LAN

D. WAN

7
New cards

B

What type of physical topology can be created by connecting all Ethernet cables to a central device?

A. Ring

B. Star

C. Mesh

D. Bus

8
New cards

C

A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?

A. Star

B. Ring

C. Mesh

D. Bus

9
New cards

B

Which duplex communication method is used in WLANs?

A. Full-duplex

B. Half-duplex

C. Simplex

10
New cards

C

Which statement describes the half-duplex mode of data transmission?

A. Data that is transmitted over the network can only flow in one direction.

B. Data that is transmitted over the network flows in one direction to many different destinations simultaneously.

C. Data that is transmitted over the network flows in one direction at a time.

D. Data that is transmitted over the network flows in both directions at the same time

11
New cards

D

Which media access control method is used in legacy Ethernet LANs?

A. Carrier sense multiple access/collision annoyance

B. Carrier sense multiple access/collision avoidance

C. Carrier sense multiple access/collision destruction

D. Carrier sense multiple access/collision detection

12
New cards

B

What method is used to manage contention-based access on a wireless network?

A. Priority ordering

B. CSMA/CA

C. Token passing

D. CSMA/CD

13
New cards

D

What does the data link layer add to a Layer 3 packet to create a frame?

A. Header and sequence number

B. Trailer and flags

C. Header and flags

D. Header and trailer

14
New cards

B

What is the function of the trailer in a data link layer frame?

A. Contains the frame payload

B. To determine whether the frame experienced transmission errors

C. To identify special flow control services

D. To identify the Layer 3 protocol in the data field

15
New cards

A

Which lists the Layer 2 and Layer 3 address fields in the correct order?

A. Destination NIC address, source NIC address, source IP address, destination IP address

B. Source NIC address, destination NIC address, source IP address, destination IP address

C. Destination NIC address, source NIC address, destination IP address, source IP address

D. Source NIC address, destination NIC address, destination IP address, source IP address

16
New cards

D

Which of the following are data link layer protocols?

A. Ethernet, IP, UDP

B. Ethernet, PPP, UDP

C. PPP, IP, 802.11

D. 802.11, Ethernet, Frame Relay

17
New cards

C

In a scenario where a device is sending data over a network, how does the Data Link Layer ensure that data is placed on the media correctly?

A. By accepting packets from the application layer.

B. By establishing a session with the destination device.

C. By controlling how data is placed and received on the media.

D. By encrypting the data before sending

18
New cards

A

When a Data Link Layer receives an encapsulated Layer 3 packet, what must it do next?

A. Direct it to the appropriate upper-layer protocol.

B. Store it in a temporary buffer.

C. Translate it into a Layer 1 signal.

D. Log the packet for auditing purposes

19
New cards

B

What is the primary purpose of the Data Link Layer?

A. To encapsulate Layer 2 frames into Layer 3 packets

B. To prepare network data for the physical network

C. To establish a connection with the upper-layer protocols

D. To control the routing of data packets across networks

20
New cards

B

What is the primary function of the Data Link Layer in networking?

A. To provide end-to-end communication

B. To add Layer 2 Ethernet destination and source information

C. To encrypt data for secure transmission

D. To manage routing between different networks

21
New cards

B

In a network scenario, if a Layer 3 packet is prepared for transmission, what specific information does the Data Link Layer add?

A. Only source IP address

B. Source and destination MAC address

C. The data payload of the email message

D. Source and destination port numbers

22
New cards

B

Which of the following sublayers is responsible for addressing in the Data Link Layer?

A. Logical Link Control (LLC)

B. Media Access Control (MAC)

C. Network Layer

D. Transport Layer

23
New cards

B

How does the Media Access Control (MAC) sublayer contribute to network communication?

A. By preventing data encapsulation

B. By allowing multiple devices to access a shared medium

C. By enabling higher-level protocols

D. By providing encryption for data transmission

24
New cards

C

Which of the following actions is NOT performed by a router at Layer 2?

A. Accepts a frame from the network medium.

B. De-encapsulates the frame to expose the encapsulated packet.

C. Routes the packet to the next network segment.

D. Re-encapsulates the packet into a new frame.

25
New cards

B

Which WAN topology is described as the simplest and most common?

A. Hub and spoke

B. Point-to-point

C. Mesh

D. Star

26
New cards

B

In which scenario would a hub-and-spoke topology be the most beneficial?

A. When every endpoint needs to communicate directly.

B. When connecting multiple branch sites to a central site.

C. When only two endpoints need to be connected.

D. When high redundancy is required across all connections.

27
New cards

D

What is a key difference between half-duplex and full-duplex communication?

A. Half-duplex allows simultaneous communication, while full-duplex does not.

B. Full-duplex allows only one device to communicate at a time.

C. Half-duplex is used in Ethernet switches, while full-duplex is not.

D. Full-duplex allows both devices to transmit and receive simultaneously.

28
New cards

C

In which scenario would you likely find half-duplex communication being used?

A. In a modern Ethernet switch.

B. In a point-to-point fiber optic link.

C. In WLANs and legacy bus topologies with Ethernet hubs.

D. In a dedicated server-client architecture.

29
New cards

B

What is a multiaccess network?

A. A network allowing a single device to communicate

B. A network that can have two or more devices accessing simultaneously

C. A network that is restricted to wired connections only

D. A network with limited access for devices

30
New cards

B

Compare CSMA/CD and CSMA/CA. What distinguishes these two access methods?

A. CSMA/CD is used in Token Ring networks, while CSMA/CA is used in Ethernet.

B. CSMA/CD detects collisions while CSMA/CA avoids them.

C. CSMA/CA allows for deterministic access, while CSMA/CD does not.

D. There is no significant difference between CSMA/CD and CSMA/CA.

31
New cards

B

In which type of network would you find Token Ring technology?

A. A multiaccess network using CSMA/CD

B. A controlled access network where each node has its own time on the medium

C. A network using contention-based access methods

D. A purely wireless LAN setup

32
New cards

B

What is the primary purpose of controlled access in a network?

A. To allow all nodes to have equal chances of accessing the medium

B. To ensure deterministic access for each node

C. To minimize the number of devices connected to a network

D. To prioritize data packets based on size

33
New cards

B

What mode does CSMA/CD operate in?

A. Full-duplex

B. Half-duplex

C. Simplex

D. Multiplex

34
New cards

B

What happens when two devices attempt to transmit simultaneously on a CSMA/CD network?

A. A frame is sent to all devices

B. A collision occurs

C. The transmission is successful

D. Device prioritization occurs

35
New cards

B

In a CSMA/CD network, after a collision is detected, what is the next step that devices must take?

A. Stop all transmissions

B. Wait a random period of time

C. Notify the hub of the collision

D. Increase their transmission power

36
New cards

C

Which statement best describes the role of the Ethernet hub in the CSMA/CD process?

A. It prioritizes the transmission of frames.

B. It sends frames only to the destination device.

C. It broadcasts frames to all connected devices.

D. It manages the collision detection process.

37
New cards

B

Which of the following statements correctly describes how CSMA/CA operates?

A. It uses a collision detection method to avoid interference.

B. Only one device can send or receive at a time.

C. All devices can transmit simultaneously.

D. It relies on wired connections for operation.

38
New cards

B

If host A is currently receiving a frame, what will hosts B and C do according to the CSMA/CA process?

A. Start transmitting immediately

B. Wait for the transmission duration to finish

C. Begin sending data simultaneously

D. Ignore the transmission entirely

39
New cards

B

How does a wireless device inform others about the duration of its transmission in a CSMA/CA system?

A. By sending a signal that must be followed by all devices

B. By including the transmission duration in the frame sent

C. By continuously broadcasting its status

D. By initiating a handshake process with each device

40
New cards

A

What are the three main parts of a data link frame?

A. Header, Data, Trailer

B. Header, Addressing, Control

C. Data, Trailer, Error Detection

D. Start, Stop, Payload

41
New cards

B

If a frame needs to be delivered to a device on the same local link, which address is primarily used?

A. Layer 3 address

B. MAC address

C. IP address

D. Transport layer address

42
New cards

B

Why are Layer 2 addresses referred to as physical addresses?

A. They are used to identify the physical location of a device

B. They are tied to the hardware of the device

C. They enable internet-wide communication

D. They are user-defined addresses

Explore top notes

note
Chapter 8: Fluency Disorders
Updated 763d ago
0.0(0)
note
PALAENTOLOGY
Updated 196d ago
0.0(0)
note
Chapter 9: Differential Equations
Updated 1074d ago
0.0(0)
note
APUSH Test Review
Updated 416d ago
0.0(0)
note
Kamienie na Szaniec
Updated 764d ago
0.0(0)
note
Chapter 10: Emotion and Motivation
Updated 1284d ago
0.0(0)
note
3.9 The Late Baroque Period
Updated 1212d ago
0.0(0)
note
2.4 Transport Across Membranes
Updated 1154d ago
0.0(0)
note
Chapter 8: Fluency Disorders
Updated 763d ago
0.0(0)
note
PALAENTOLOGY
Updated 196d ago
0.0(0)
note
Chapter 9: Differential Equations
Updated 1074d ago
0.0(0)
note
APUSH Test Review
Updated 416d ago
0.0(0)
note
Kamienie na Szaniec
Updated 764d ago
0.0(0)
note
Chapter 10: Emotion and Motivation
Updated 1284d ago
0.0(0)
note
3.9 The Late Baroque Period
Updated 1212d ago
0.0(0)
note
2.4 Transport Across Membranes
Updated 1154d ago
0.0(0)

Explore top flashcards

flashcards
IB Spanish Las Artes Visuales
41
Updated 793d ago
0.0(0)
flashcards
Learner's Dictionary - H
76
Updated 765d ago
0.0(0)
flashcards
25-26 - E2 U1 | Quizlet
30
Updated 217d ago
0.0(0)
flashcards
Chapter 27 Prokaryotes
48
Updated 1158d ago
0.0(0)
flashcards
psych chapter 8
33
Updated 1233d ago
0.0(0)
flashcards
IB Spanish Las Artes Visuales
41
Updated 793d ago
0.0(0)
flashcards
Learner's Dictionary - H
76
Updated 765d ago
0.0(0)
flashcards
25-26 - E2 U1 | Quizlet
30
Updated 217d ago
0.0(0)
flashcards
Chapter 27 Prokaryotes
48
Updated 1158d ago
0.0(0)
flashcards
psych chapter 8
33
Updated 1233d ago
0.0(0)