Module 1 - Networking Fundamentals

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By SFox
S
SFox
Community Contributor
Quizzes Created: 1 | Total Attempts: 392
| Attempts: 392 | Questions: 51
Please wait...
Question 1 / 51
0 %
0/100
Score 0/100
1. Layer 1 of the OSI Model defines the methods of moving data between hardware. It includes cabling, interface cards and other physical means. Typically NICs, hubs and cabling are are common components in this category. What is this layer named?

Explanation

Layer 1 of the OSI Model is named "Physical" because it is responsible for defining the physical means of moving data between hardware. This includes cabling, interface cards, and other physical components such as NICs and hubs. It focuses on the transmission and reception of raw data bits over a physical medium.

Submit
Please wait...
About This Quiz
Networking Quizzes & Trivia

Module 1 - Networking Fundamentals explores key networking concepts, focusing on the OSI Model, data transmission, and networking standards like IEEE 802.11g and Power over Ethernet. This quiz... see moreassesses understanding of network layers, data rates, and switching functions, essential for students and professionals in IT. see less

2. VLAN Tagging, also known as Frame Tagging helps identify packets travelling through trunk links. Tags are added inside frame headers to identify the VLAN to which it belogs

Explanation

VLAN Tagging, also known as Frame Tagging, is a process that adds tags inside frame headers to identify the VLAN to which a packet belongs. This helps in distinguishing and managing packets as they travel through trunk links. By assigning a specific tag to each packet, network administrators can ensure that the packets are correctly routed to their respective VLANs, allowing for efficient network management and segregation of traffic. Therefore, the statement "True" is correct.

Submit
3. Layer 7 of the OSI Model supports application and end-user protocols. Device Operating Systems have Applications Programming Interfaces (API) which programmers can use to make their programs network aware from within this Layer. File transfers, email and Telnet are some examples of things performed within this Layer. What is this layer called?

Explanation

The correct answer is the Application Layer. This layer of the OSI Model supports application and end-user protocols. It is responsible for allowing programmers to make their programs network aware through the use of Device Operating Systems' Applications Programming Interfaces (API). File transfers, email, and Telnet are examples of activities that occur within this layer.

Submit
4. Layer 3 of the OSI Model uses switching and routing technologies, along with the (IP) Internet Protocol to ensure that each piece of data gets to where it needs to go on the network. Delivery is not guaranteed. Frames from Layer 2 become packets in this Layer. Most routing occurs here. What is this Layer called? 

Explanation

The correct answer is Network Layer. This layer in the OSI Model is responsible for routing and switching technologies, as well as using the Internet Protocol (IP) to ensure that data is delivered to its intended destination on the network. It is where frames from Layer 2 are transformed into packets, and it is the layer where most routing occurs.

Submit
5. Name the unique physical address assigned by the NIC manufacturer.

Explanation

The MAC Address, also known as the Media Access Control Address, is a unique physical address assigned by the NIC (Network Interface Card) manufacturer. It is used to identify network devices, such as computers or routers, on a local network. Each device connected to a network has a different MAC Address, allowing for the identification and communication between devices. The MAC Address is hardcoded into the NIC and cannot be changed, making it a reliable and unique identifier for network devices.

Submit
6. What is the maximum theoretical data rate per stream achievable under the IEEE 802.11g standard?  

Explanation

The maximum theoretical data rate per stream achievable under the IEEE 802.11g standard is 54 Mbps. This standard was introduced in 2003 and offered higher data rates compared to its predecessor, IEEE 802.11b. The 54 Mbps data rate is achieved using Orthogonal Frequency Division Multiplexing (OFDM) modulation technique, which allows for higher throughput and better performance in wireless networks. However, it is important to note that the actual data rate experienced by users may be lower due to various factors such as distance, interference, and network congestion.

Submit
7. ICMP, IPv4, IPSec, RIP & ARP are all protocols which are commonly found in which OSI Model Layer?

Explanation

ICMP, IPv4, IPSec, RIP, and ARP are all protocols commonly found in the Network Layer of the OSI Model. This layer is responsible for logical addressing, routing, and the delivery of data packets across different networks. These protocols operate at the Network Layer to perform tasks such as network addressing, error detection and reporting, security, and routing decisions. Therefore, the correct answer is any variation that includes the term "Network Layer," such as "Network," "Layer 3 Network," or "Layer 3 - Network Layer."

Submit
8. Layer 2 of the OSI Model transfers data between adjacent (i.e. directly connected) nodes in a network. It is a direct and reliable point-to-point connection. Switches operate in this layer; Ethernet is a protocol which exists in this layer. Information in data packets is encoded and decoded into data frames (Link Layer Header followed by a packet within this layer. What is this Layer called?

Explanation

The correct answer is Data Link Layer. This layer of the OSI Model is responsible for transferring data between directly connected nodes in a network. It establishes a direct and reliable point-to-point connection. Switches operate in this layer, and the Ethernet protocol exists within this layer. Information in data packets is encoded and decoded into data frames, which consist of a Link Layer Header followed by a packet within this layer.

Submit
9. A POE device such as an external POE Injector, is commonly known as a midspan device.

Explanation

A POE device, such as an external POE Injector, is commonly known as a midspan device. This means that it is a device that can be added to an existing network infrastructure to provide Power over Ethernet capabilities to devices that do not have built-in POE support. Midspan devices are typically used when there is a need to upgrade or add POE functionality to a network without replacing all the existing network switches. Therefore, the statement "A POE device such as an external POE Injector, is commonly known as a midspan device" is true.

Submit
10. Client devices (e.g. PCs or laptops) receive the correct VLAN packets because hardware such as switches only allow certain VLANs to pass through that port. The client is actually unaware of what the VLAN is.

Explanation

Client devices receive the correct VLAN packets because switches restrict the passage of VLANs through specific ports. This means that only certain VLANs are allowed to reach the client devices, while others are blocked. The client devices themselves are not aware of which VLAN they are receiving, as this is managed by the hardware switches.

Submit
11. Name the following OSI Model Layers.
Submit
12. What does OSI stand for in the OSI Model?

Explanation

The correct answer is Open System Interconnection Model. The OSI Model is a conceptual framework that standardizes the functions of a communication system into seven different layers. These layers help in understanding and implementing network protocols and technologies. The OSI Model provides a systematic approach to network design and troubleshooting by dividing the communication process into smaller, manageable layers.

Submit
13. What is a router?

Explanation

A router is a network host that reads the source and destination addresses in the packet header and makes decisions about where to forward the packet. It functions as a hardware device that connects dissimilar physical networks, allowing data to be transmitted between them. By analyzing the packet header information, the router determines the most efficient path for the packet to reach its destination, forwarding it accordingly. This enables the router to effectively route data between different networks and ensure proper delivery.

Submit
14. Switches operate at the _______________ OSI level

Explanation

Switches operate at the Data Link Layer of the OSI model. The Data Link Layer is responsible for the reliable transfer of data between nodes on a network. Switches use MAC addresses to forward data packets within a local area network (LAN). They analyze the destination MAC address of incoming packets and use their forwarding table to determine the appropriate port to send the packet to. This layer also handles error detection and correction, ensuring the integrity of data transmission.

Submit
15. Client devices (e.g. PCs or laptops) only receive the correct VLAN packets because they actively block all other VLANs.

Explanation

Client devices (e.g. PCs or laptops) do not actively block all other VLANs. In fact, client devices are typically unaware of VLANs and are not responsible for filtering or blocking VLAN packets. VLAN filtering and blocking is usually done at the network switch level, where the switch determines which VLAN packets to forward to which ports based on their VLAN tags. Therefore, the correct answer is False.

Submit
16. DNS, DHCP, SSH, HTTP, FTP & SMTP are all protocols which are commonly found in which OSI Model Layer?

Explanation

These protocols, DNS, DHCP, SSH, HTTP, FTP, and SMTP, are all commonly found in the Application Layer of the OSI Model. The Application Layer is responsible for providing network services to user applications. These protocols are specifically designed to support various application-level functions such as domain name resolution (DNS), dynamic IP address allocation (DHCP), secure remote access (SSH), web browsing (HTTP), file transfer (FTP), and email communication (SMTP). Therefore, the correct answer is Layer 7, Application Layer, or any variation that includes both Layer 7 and Application.

Submit
17. What is the frequency range of the IEEE 802.11g standard?

Explanation

The frequency range of the IEEE 802.11g standard is 2.4 GHz. This standard operates in the 2.4 GHz frequency band, which is commonly used for Wi-Fi communication. The 2.4 GHz frequency range allows for a good balance between range and data transfer speed, making it suitable for most wireless networking applications.

Submit
18. What is the maximum distance over which POE power can be guaranteed delivery along certified Cat 6 cable?

Explanation

The maximum distance over which POE power can be guaranteed delivery along certified Cat 6 cable is 100 metres. This is because Cat 6 cable is designed to support Ethernet connections up to 1000 Mbps and has a maximum length specification of 100 metres. Beyond this distance, there may be signal degradation and power loss, resulting in unreliable POE power delivery.

Submit
19. The IEEE standard 802.3af states the specifications for which of the following?

Explanation

The correct answer is Power over Ethernet. The IEEE standard 802.3af defines the specifications for Power over Ethernet (PoE), which is a technology that allows network devices to receive power and data over the same Ethernet cable. This standard enables devices such as IP phones, wireless access points, and network cameras to be powered without the need for separate power cables or outlets.

Submit
20. The maximum power delivered by 802.3at Power Sourcing Equipment is approximately 35 W.

Explanation

The 802.3at Power Sourcing Equipment is capable of delivering a maximum power of approximately 35 W.

Submit
21. The RJ-45 connector used in UTP networks typically terminates ____ wires?

Explanation

The RJ-45 connector used in UTP networks typically terminates 8 wires. The RJ-45 connector is commonly used for Ethernet connections and has 8 pins or positions for wires to be connected. Each pin is assigned to a specific wire in the UTP (Unshielded Twisted Pair) cable, allowing for the transmission of data. Therefore, the correct answer is 8.

Submit
22. Ports on switches which are configured as Trunk Links may be configured with multiple VLANs per port.

Explanation

Trunk links on switches allow for the transmission of multiple VLANs over a single physical connection. This means that multiple VLANs can be configured on a single port, allowing for efficient use of network resources. Trunk links are commonly used in scenarios where there is a need to carry multiple VLANs between switches, such as in a large network with multiple subnets or in a virtualized environment. By configuring multiple VLANs on a trunk link, network administrators can effectively manage and control the flow of traffic between different VLANs on the network.

Submit
23. Ports on switches which are configured as Access Links are usually configured with only one VLAN per port.

Explanation

Access links on switches are typically used to connect end devices, such as computers or printers, to the network. These links are usually configured with only one VLAN per port. This allows the switch to send and receive traffic for a specific VLAN, ensuring that the connected device is only part of that particular VLAN. By limiting each access link to a single VLAN, network administrators can control and separate traffic between different VLANs more effectively. Therefore, the given answer, "True," is correct.

Submit
24. IEEE 802.11ac is a recent Wi-Fi specification which has been fully ratified as a standard. Therefore all existing Wi-Fi hardware is automatically compatible with 802.11ac and can achieve these new fast speeds.

Explanation

The explanation for the given answer "False" is that IEEE 802.11ac is a recent Wi-Fi specification that requires specific hardware to support its features. Therefore, not all existing Wi-Fi hardware is automatically compatible with 802.11ac and cannot achieve the new fast speeds without upgrading to compatible hardware.

Submit
25. What is the frequency range of the IEEE 802.11n standard?

Explanation

The IEEE 802.11n standard operates in the frequency range of both 2.4 GHz and 5 GHz. This means that devices using this standard can connect to wireless networks in either of these frequency bands. The 2.4 GHz band is commonly used and has a longer range, while the 5 GHz band offers faster speeds but has a shorter range. Having both frequency options allows for more flexibility and compatibility with different types of devices and network environments.

Submit
26. Within Ethernet networks, how many active logical paths may exist at any time between any two stations, for the network to function properly?

Explanation

In Ethernet networks, only one active logical path may exist at any time between any two stations for the network to function properly. This is because Ethernet networks use a single path or link to transmit data between stations. Having multiple active logical paths between stations can lead to collisions and data loss, which can disrupt the network's functioning. Therefore, to ensure proper functioning, Ethernet networks typically have only one active logical path between stations.

Submit
27. IEEE 802 is a family of standards which define how much of what we define as data networks are able to operate. Match the following IEEE 802 working groups with the correct descriptions.
Submit
28. The maximum power delivered by 802.3af Power Sourcing Equipment is approximately 15 W.

Explanation

The 802.3af Power Sourcing Equipment is a standard used for Power over Ethernet (PoE) applications. It specifies that the maximum power that can be delivered by this equipment is approximately 15 W. Therefore, the statement "The maximum power delivered by 802.3af Power Sourcing Equipment is approximately 15 W" is true.

Submit
29. As data travels down the OSI layers it reaches the _______ layer which is responsible for its bit conversion and actual transmission to other computers?

Explanation

The correct answer is Physical because the Physical layer of the OSI model is responsible for converting the data into bits and transmitting it over the network. This layer deals with the actual transmission of data, including the physical medium, cables, connectors, and electrical signals. It ensures that the data is transmitted reliably and accurately between the computers.

Submit
30. Which of the following best describes what Spanning Tree Protocol does?

Explanation

Spanning Tree Protocol is a network protocol that prevents loops in a network by blocking redundant paths. It ensures that there is only one active path between any two network devices, thus preventing broadcast storms and network congestion. By blocking redundant paths, Spanning Tree Protocol helps to maintain a loop-free and stable network topology.

Submit
31. Within IEEE 802.11, what does MIMO stand for?

Explanation

MIMO stands for Multiple Input Multiple Output in IEEE 802.11. It refers to a technology that uses multiple antennas at both the transmitting and receiving ends of a wireless communication system. This allows for multiple data streams to be transmitted and received simultaneously, increasing the overall data throughput and improving the system's reliability and performance.

Submit
32. The maximum power delivered by 802.3af Power Sourcing Equipment is approximately 48 W.

Explanation

The maximum power delivered by 802.3af Power Sourcing Equipment is not approximately 48 W. The correct answer is False.

Submit
33. When a POE device is a Switch, it is commonly called an Endspan.

Explanation

When a Power over Ethernet (POE) device is a Switch, it is commonly referred to as an Endspan. This means that the switch is capable of providing power to connected devices through the Ethernet cable itself, eliminating the need for separate power cables. This is in contrast to a Midspan, which is a separate device that is installed between the switch and the powered devices to provide power. Therefore, the statement is true.

Submit
34. Ports on switches which are configured as Access Links are able to be configured with multiple VLANs per port.

Explanation

Ports on switches which are configured as Access Links can only be configured with a single VLAN per port. Access Links are used to connect end devices to the switch and allow traffic from only one VLAN to pass through the port. This helps to segregate network traffic and ensure that devices in different VLANs do not interfere with each other. Therefore, the statement that Access Links can be configured with multiple VLANs per port is false.

Submit
35. The maximum power delivered by 802.3at Power Sourcing Equipment is approximately 48 W.

Explanation

The given statement is false. The maximum power delivered by 802.3at Power Sourcing Equipment is not approximately 48 W. The actual maximum power delivered by 802.3at Power Sourcing Equipment is 30 W.

Submit
36. Which of the following best describes what switches do?

Explanation

Switches are networking devices that are responsible for moving packets between devices in a network. They receive packets from one device and forward them to the appropriate destination device based on the destination MAC address. This allows for efficient and direct communication between devices in a network. Switches operate at the data link layer of the OSI model and are essential for creating local area networks (LANs) by connecting multiple devices together.

Submit
37. What is the smallest number of cables that are required in order to successfully transmit 802.3af POE over standard UTP (Unshielded Twisted Pair) cable?

Explanation

To successfully transmit 802.3af POE over standard UTP cable, four cables are required. This is because 802.3af POE requires two pairs of wires for power transmission and the remaining two pairs for data transmission. Therefore, a minimum of four cables are needed to transmit both power and data effectively.

Submit
38. Which protocol prevents undesirable switching loops (e.g. multiple paths between end stations) in a network?

Explanation

The correct answer is Spanning Tree Protocol (STP). STP is a network protocol that prevents undesirable switching loops in a network by creating a loop-free logical topology. It achieves this by dynamically selecting a root bridge and calculating the shortest path to the root bridge for each switch in the network. STP disables redundant links and blocks certain ports to eliminate loops and ensure a single active path between end stations.

Submit
39. Typically in Australia, the DC Voltage supplied via 802.3af or 802.3at is approximately what?

Explanation

In Australia, the DC voltage supplied via 802.3af or 802.3at is typically 48 Volts.

Submit
40. What is the maximum theoretical data rate achievable using the following Wi-Fi protocols?
Submit
41. Select five things you should always do when terminating a Cat 5 cable to an RJ-45 connector. (Choose 5)

Explanation

When terminating a Cat 5 cable to an RJ-45 connector, it is important to use the correct connector for the cable type being used. This ensures compatibility and proper connection. Additionally, the outer sheath of the cable should be secured inside the rear of the connector when crimped to provide stability and prevent damage. All cables should be trimmed neatly and pressed firmly into the very end of the connector before crimping to ensure a secure connection. It is also important to maintain as much of the original twists in the UTP cable as close to the connector as possible to maintain signal integrity. Finally, always test the cable to confirm that all pins are connected correctly for proper functionality.

Submit
42. When terminating a Cat 5 cable to an RJ-45 connector for a 'straight through' connection, following the T568B standard, match the Pin numbers to the correct Cable colours.
Submit
43. What best practice design principle would lead you to disable support for Channel 12 in the 2.4GHz band?

Explanation

Enabling channel 12 when some clients don't support it may create a coverage gap for those clients. This means that if channel 12 is enabled and some devices in the network do not support it, those devices will not be able to connect to the network. This could result in a coverage gap where certain devices are unable to access the network or experience poor connectivity. Therefore, it is best practice to disable support for channel 12 in order to ensure consistent and reliable connectivity for all devices in the network.

Submit
44. What is the maximum theoretical data rate per stream achievable under the IEEE 802.11n standard with 20 MHz wide channels?  

Explanation

The maximum theoretical data rate per stream achievable under the IEEE 802.11n standard with 20 MHz wide channels is 72.2 Mbps. This standard supports multiple-input multiple-output (MIMO) technology, which allows for the use of multiple antennas to transmit and receive data simultaneously. The 72.2 Mbps data rate is achieved using a 64-QAM modulation scheme with a coding rate of 5/6, which provides a higher level of data encoding and faster transmission speeds.

Submit
45. Select two benefits which are provided by creating VLANs? (Choose two)

Explanation

Creating VLANs provides added security by separating network traffic into different virtual networks, reducing the risk of unauthorized access and potential data breaches. It also provides segmentation, allowing network administrators to logically divide the network into smaller, more manageable segments, improving network performance and reducing network congestion.

Submit
46. What are the two forms of equipment that PoE may be found in?

Explanation

PoE (Power over Ethernet) can be found in two forms of equipment: Powered Device and Power Sourcing Equipment. A Powered Device refers to any device that receives power through the Ethernet cable, such as IP phones, wireless access points, or IP cameras. On the other hand, Power Sourcing Equipment refers to the equipment that provides power to the Powered Devices, such as PoE switches or injectors. These two forms of equipment work together to enable the transmission of power and data over the Ethernet cable.

Submit
47. At what Layer in the OSI Model would the following components commonly be found?
Submit
48. Select four (4) protocols which you WOULD NOT typically find in the Application Layer.

Explanation

The protocols typically found in the Application Layer are DHCP, SSH, HTTP, and FTP. ISDN, TCP, ICMP, and SSL are not typically found in this layer. ISDN (Integrated Services Digital Network) is a protocol used for digital transmission of voice, video, and data over traditional telephone lines. TCP (Transmission Control Protocol) is a transport layer protocol responsible for establishing and maintaining a reliable connection between devices. ICMP (Internet Control Message Protocol) is a network layer protocol used for error reporting and diagnostic purposes. SSL (Secure Sockets Layer) is a cryptographic protocol used for secure communication over the internet. These protocols operate at different layers of the network stack and are not typically associated with the Application Layer.

Submit
49. Select three benefits of Multicasting in a Network. (Choose 3)

Explanation

Multicasting in a network offers several benefits. Firstly, individual host machines have the freedom to decide whether they want to participate in a multicast group, allowing for greater flexibility and control. Secondly, multicast traffic is only generated when requested by host machines, minimizing unnecessary network traffic and optimizing bandwidth usage. Lastly, multicast traffic creates efficiency and saves bandwidth by transmitting data only when and where it is needed, reducing network congestion and improving overall performance.

Submit
50. At what Layer in the OSI Model would the following components commonly be found?
Submit
51. Select three advantages of VLANs? (Choose three)

Explanation

The three advantages of VLANs are:
1. VLANs establish broadcast domains in switched networks: By dividing a network into VLANs, broadcast traffic is contained within each VLAN, reducing the overall broadcast traffic on the network.
2. VLANs allow access to network services based on department, not physical location: VLANs can be configured to allow specific departments or groups to access certain network services, regardless of their physical location.
3. VLANs can greatly simplify adding, moving, or changing hosts on the network: With VLANs, hosts can be easily added, moved, or changed without the need for physical reconfiguration, making network management more flexible and efficient.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 10, 2013
    Quiz Created by
    SFox
Cancel
  • All
    All (51)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Layer 1 of the OSI Model defines the methods of moving data between...
VLAN Tagging, also known as Frame Tagging helps identify packets...
Layer 7 of the OSI Model supports application and end-user protocols....
Layer 3 of the OSI Model uses switching and routing technologies,...
Name the unique physical address assigned by the NIC manufacturer.
What is the maximum theoretical data rate per stream achievable under...
ICMP, IPv4, IPSec, RIP & ARP are all protocols which are commonly...
Layer 2 of the OSI Model transfers data between adjacent (i.e....
A POE device such as an external POE Injector, is commonly known as a...
Client devices (e.g. PCs or laptops) receive the correct VLAN packets...
Name the following OSI Model Layers.
What does OSI stand for in the OSI Model?
What is a router?
Switches operate at the _______________ OSI level
Client devices (e.g. PCs or laptops) only receive the correct VLAN...
DNS, DHCP, SSH, HTTP, FTP & SMTP are all protocols which are...
What is the frequency range of the IEEE 802.11g standard?
What is the maximum distance over which POE power can be guaranteed...
The IEEE standard 802.3af states the specifications for which of the...
The maximum power delivered by 802.3at Power Sourcing Equipment is...
The RJ-45 connector used in UTP networks typically terminates ____...
Ports on switches which are configured as Trunk Links may be...
Ports on switches which are configured as Access Links are usually...
IEEE 802.11ac is a recent Wi-Fi specification which has been fully...
What is the frequency range of the IEEE 802.11n standard?
Within Ethernet networks, how many active logical paths may exist at...
IEEE 802 is a family of standards which define how much of what we...
The maximum power delivered by 802.3af Power Sourcing Equipment is...
As data travels down the OSI layers it reaches the _______ layer which...
Which of the following best describes what Spanning Tree Protocol...
Within IEEE 802.11, what does MIMO stand for?
The maximum power delivered by 802.3af Power Sourcing Equipment is...
When a POE device is a Switch, it is commonly called an Endspan.
Ports on switches which are configured as Access Links are able to be...
The maximum power delivered by 802.3at Power Sourcing Equipment is...
Which of the following best describes what switches do?
What is the smallest number of cables that are required in order to...
Which protocol prevents undesirable switching loops (e.g. multiple...
Typically in Australia, the DC Voltage supplied via 802.3af or 802.3at...
What is the maximum theoretical data rate achievable using...
Select five things you should always do when terminating a Cat 5 cable...
When terminating a Cat 5 cable to an RJ-45 connector for a...
What best practice design principle would lead you to disable support...
What is the maximum theoretical data rate per stream achievable under...
Select two benefits which are provided by creating VLANs? (Choose two)
What are the two forms of equipment that PoE may be found in?
At what Layer in the OSI Model would the following components commonly...
Select four (4) protocols which you WOULD NOT typically find in the...
Select three benefits of Multicasting in a Network. (Choose 3)
At what Layer in the OSI Model would the following components commonly...
Select three advantages of VLANs? (Choose three)
Alert!

Advertisement