1/41
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
B
What is another name for the OSI data link layer?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
C
What is one service performed by the data link layer of the OSI model?
A. It determines the path to forward packets.
B. It fragments data packets into the MTU size.
C. It accepts Layer 3 packets and encapsulates them into frames.
D. It monitors the Layer 2 communication by building a MAC address table
B
The IEEE 802 LAN/MAN data link layer consists of which two sublayers?
A. Network Control Protocol
B. Logical Link Control and Media Access Control
C. Media Access Control and Network Control Protocol
D. Link Control Protocol and Network Control Protocol
A
Which is a function of the Logical Link Control (LLC) sublayer?
A. To communicate between the networking software at the upper layers and the device
hardware at the lower layers
B. To define the media access processes that are performed by the hardware
C. To provide data link layer addressing
D. To accept segments and package them into data units that are called packets
B
What Layer 2 function does a router perform?
A. Accepts a frame from a medium, de-encapsulates the frame, and refers to its Layer 3 routing table for a matching destination network
B. Accepts a frame from a medium, de-encapsulates the frame, and re-encapsulates the packet into a new frame
C. Accepts a frame from a medium, refers to its Layer 3 routing table for a matching destination network, and re-encapsulates the packet into a new frame
D. De-encapsulates the frame, refers to its Layer 3 routing table for a matching destination network, and re-encapsulates the packet into a new frame
D
What kind of network would use point-to-point, hub and spoke, or mesh topologies?
A. PAN
B. WLAN
C. LAN
D. WAN
B
What type of physical topology can be created by connecting all Ethernet cables to a central device?
A. Ring
B. Star
C. Mesh
D. Bus
C
A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
A. Star
B. Ring
C. Mesh
D. Bus
B
Which duplex communication method is used in WLANs?
A. Full-duplex
B. Half-duplex
C. Simplex
C
Which statement describes the half-duplex mode of data transmission?
A. Data that is transmitted over the network can only flow in one direction.
B. Data that is transmitted over the network flows in one direction to many different destinations simultaneously.
C. Data that is transmitted over the network flows in one direction at a time.
D. Data that is transmitted over the network flows in both directions at the same time
D
Which media access control method is used in legacy Ethernet LANs?
A. Carrier sense multiple access/collision annoyance
B. Carrier sense multiple access/collision avoidance
C. Carrier sense multiple access/collision destruction
D. Carrier sense multiple access/collision detection
B
What method is used to manage contention-based access on a wireless network?
A. Priority ordering
B. CSMA/CA
C. Token passing
D. CSMA/CD
D
What does the data link layer add to a Layer 3 packet to create a frame?
A. Header and sequence number
B. Trailer and flags
C. Header and flags
D. Header and trailer
B
What is the function of the trailer in a data link layer frame?
A. Contains the frame payload
B. To determine whether the frame experienced transmission errors
C. To identify special flow control services
D. To identify the Layer 3 protocol in the data field
A
Which lists the Layer 2 and Layer 3 address fields in the correct order?
A. Destination NIC address, source NIC address, source IP address, destination IP address
B. Source NIC address, destination NIC address, source IP address, destination IP address
C. Destination NIC address, source NIC address, destination IP address, source IP address
D. Source NIC address, destination NIC address, destination IP address, source IP address
D
Which of the following are data link layer protocols?
A. Ethernet, IP, UDP
B. Ethernet, PPP, UDP
C. PPP, IP, 802.11
D. 802.11, Ethernet, Frame Relay
C
In a scenario where a device is sending data over a network, how does the Data Link Layer ensure that data is placed on the media correctly?
A. By accepting packets from the application layer.
B. By establishing a session with the destination device.
C. By controlling how data is placed and received on the media.
D. By encrypting the data before sending
A
When a Data Link Layer receives an encapsulated Layer 3 packet, what must it do next?
A. Direct it to the appropriate upper-layer protocol.
B. Store it in a temporary buffer.
C. Translate it into a Layer 1 signal.
D. Log the packet for auditing purposes
B
What is the primary purpose of the Data Link Layer?
A. To encapsulate Layer 2 frames into Layer 3 packets
B. To prepare network data for the physical network
C. To establish a connection with the upper-layer protocols
D. To control the routing of data packets across networks
B
What is the primary function of the Data Link Layer in networking?
A. To provide end-to-end communication
B. To add Layer 2 Ethernet destination and source information
C. To encrypt data for secure transmission
D. To manage routing between different networks
B
In a network scenario, if a Layer 3 packet is prepared for transmission, what specific information does the Data Link Layer add?
A. Only source IP address
B. Source and destination MAC address
C. The data payload of the email message
D. Source and destination port numbers
B
Which of the following sublayers is responsible for addressing in the Data Link Layer?
A. Logical Link Control (LLC)
B. Media Access Control (MAC)
C. Network Layer
D. Transport Layer
B
How does the Media Access Control (MAC) sublayer contribute to network communication?
A. By preventing data encapsulation
B. By allowing multiple devices to access a shared medium
C. By enabling higher-level protocols
D. By providing encryption for data transmission
C
Which of the following actions is NOT performed by a router at Layer 2?
A. Accepts a frame from the network medium.
B. De-encapsulates the frame to expose the encapsulated packet.
C. Routes the packet to the next network segment.
D. Re-encapsulates the packet into a new frame.
B
Which WAN topology is described as the simplest and most common?
A. Hub and spoke
B. Point-to-point
C. Mesh
D. Star
B
In which scenario would a hub-and-spoke topology be the most beneficial?
A. When every endpoint needs to communicate directly.
B. When connecting multiple branch sites to a central site.
C. When only two endpoints need to be connected.
D. When high redundancy is required across all connections.
D
What is a key difference between half-duplex and full-duplex communication?
A. Half-duplex allows simultaneous communication, while full-duplex does not.
B. Full-duplex allows only one device to communicate at a time.
C. Half-duplex is used in Ethernet switches, while full-duplex is not.
D. Full-duplex allows both devices to transmit and receive simultaneously.
C
In which scenario would you likely find half-duplex communication being used?
A. In a modern Ethernet switch.
B. In a point-to-point fiber optic link.
C. In WLANs and legacy bus topologies with Ethernet hubs.
D. In a dedicated server-client architecture.
B
What is a multiaccess network?
A. A network allowing a single device to communicate
B. A network that can have two or more devices accessing simultaneously
C. A network that is restricted to wired connections only
D. A network with limited access for devices
B
Compare CSMA/CD and CSMA/CA. What distinguishes these two access methods?
A. CSMA/CD is used in Token Ring networks, while CSMA/CA is used in Ethernet.
B. CSMA/CD detects collisions while CSMA/CA avoids them.
C. CSMA/CA allows for deterministic access, while CSMA/CD does not.
D. There is no significant difference between CSMA/CD and CSMA/CA.
B
In which type of network would you find Token Ring technology?
A. A multiaccess network using CSMA/CD
B. A controlled access network where each node has its own time on the medium
C. A network using contention-based access methods
D. A purely wireless LAN setup
B
What is the primary purpose of controlled access in a network?
A. To allow all nodes to have equal chances of accessing the medium
B. To ensure deterministic access for each node
C. To minimize the number of devices connected to a network
D. To prioritize data packets based on size
B
What mode does CSMA/CD operate in?
A. Full-duplex
B. Half-duplex
C. Simplex
D. Multiplex
B
What happens when two devices attempt to transmit simultaneously on a CSMA/CD network?
A. A frame is sent to all devices
B. A collision occurs
C. The transmission is successful
D. Device prioritization occurs
B
In a CSMA/CD network, after a collision is detected, what is the next step that devices must take?
A. Stop all transmissions
B. Wait a random period of time
C. Notify the hub of the collision
D. Increase their transmission power
C
Which statement best describes the role of the Ethernet hub in the CSMA/CD process?
A. It prioritizes the transmission of frames.
B. It sends frames only to the destination device.
C. It broadcasts frames to all connected devices.
D. It manages the collision detection process.
B
Which of the following statements correctly describes how CSMA/CA operates?
A. It uses a collision detection method to avoid interference.
B. Only one device can send or receive at a time.
C. All devices can transmit simultaneously.
D. It relies on wired connections for operation.
B
If host A is currently receiving a frame, what will hosts B and C do according to the CSMA/CA process?
A. Start transmitting immediately
B. Wait for the transmission duration to finish
C. Begin sending data simultaneously
D. Ignore the transmission entirely
B
How does a wireless device inform others about the duration of its transmission in a CSMA/CA system?
A. By sending a signal that must be followed by all devices
B. By including the transmission duration in the frame sent
C. By continuously broadcasting its status
D. By initiating a handshake process with each device
A
What are the three main parts of a data link frame?
A. Header, Data, Trailer
B. Header, Addressing, Control
C. Data, Trailer, Error Detection
D. Start, Stop, Payload
B
If a frame needs to be delivered to a device on the same local link, which address is primarily used?
A. Layer 3 address
B. MAC address
C. IP address
D. Transport layer address
B
Why are Layer 2 addresses referred to as physical addresses?
A. They are used to identify the physical location of a device
B. They are tied to the hardware of the device
C. They enable internet-wide communication
D. They are user-defined addresses