Module 1 - Networking Fundamentals

40 Questions | Total Attempts: 54

SettingsSettingsSettings
Please wait...
OSI Model Quizzes & Trivia

Overview of the OSI Model and networking fundamentals


Questions and Answers
  • 1. 
    Name and describe the three distinct functions of Switching. (3 points will be allocated according to content and accuracy of answer)
  • 2. 
    What does VLAN stand for and what functions does it provide within a network? (3 points will be allocated according to content and accuracy of answer)
  • 3. 
    Fundamentally what are the main difference between Access Links and Trunk Links? (3 points will be allocated according to content and accuracy of answer)
  • 4. 
    Under what circumstances might 2.4 GHz Wi-Fi hardware be considered better than 5 GHz? (Minimum of 3 reasons - explain in detail)  (3 points will be allocated according to content and accuracy of answer)
  • 5. 
    Within Layer 2 (Data Link) of the OSI Model, there are two sub layers. Provide their Names and a brief description of their functions. (Both Abbreviations = 1 point, Both Full Names = 1 point, Both Descriptions = 1 point)
  • 6. 
    What does OSI stand for in the OSI Model?
    • A. 

      Open System Interconnection Model

    • B. 

      Open System Interconnect Model

    • C. 

      Open Service Interconnection Model

    • D. 

      Open Service Interconnect Model

  • 7. 
    As data travels down the OSI layers it reaches the _______ layer which is responsible for its bit conversion and actual transmission to other computers?
    • A. 

      Network

    • B. 

      Application

    • C. 

      Physical

    • D. 

      Transport

  • 8. 
    What is the maximum theoretical data rate per stream achievable under the IEEE 802.11g standard?  
    • A. 

      6 Mbps

    • B. 

      11 Mbps

    • C. 

      22 Mbps

    • D. 

      54 Mbps

  • 9. 
    The IEEE standard 802.3af states the specifications for which of the following?
    • A. 

      Quality of Service

    • B. 

      VLANs

    • C. 

      Routing tables

    • D. 

      Power over Ethernet

  • 10. 
    The maximum power delivered by 802.3at Power Sourcing Equipment is approximately 35 W.
    • A. 

      True

    • B. 

      False

  • 11. 
    Name the unique physical address assigned by the NIC manufacturer.
    • A. 

      Subnet Mask

    • B. 

      IP Address

    • C. 

      MAC Address

    • D. 

      NIC Address

  • 12. 
    What is the frequency range of the IEEE 802.11g standard?
    • A. 

      2.4 Gbps

    • B. 

      5 Gbps

    • C. 

      2.4 GHz

    • D. 

      5 GHz

  • 13. 
    What best practice design principle would lead you to disable support for Channel 12 in the 2.4GHz band?
    • A. 

      Channel 12 should be disabled because it is affected in most parts of the world by 802.11h restrictions.

    • B. 

      In certain configuration setups, the WLAN system dynamically enables or disables supported channels whenever co-channel interference occurs and more channels are needed.

    • C. 

      Channel 12 is not part of the 802.11b/g-supported bands and should never be used in indoor deployments.

    • D. 

      Channel 12 is not part of the unlicensed OFDM frequency range. An operator’s license is required to use this channel.

    • E. 

      Channel 12 is not supported by all 802.11b/g client devices. Enabling channel 12 when some clients don’t support it may create a coverage gap for those clients.

  • 14. 
    Select three advantages of VLANs? (Choose three)
    • A. 

      VLANs establish broadcast domains in switched networks

    • B. 

      VLANs utilize packet filtering to enhance network security

    • C. 

      VLANs provide a method of conserving IP addresses in large networks

    • D. 

      VLANs provide a low-latency internetworking alternative to routed networks

    • E. 

      VLANs allow access to network services based on department, not physical location

    • F. 

      VLANs can greatly simplify adding, moving, or changing hosts on the network

  • 15. 
    What is a router?
    • A. 

      A hardware device that connects dissimilar physical networks

    • B. 

      A network host that reads the source and destination addresses in the packet header and makes decisions about where to forward the packet

    • C. 

      A network host that can forward LAN-based email messages onto the Internet, after repackaging them into the SMTP format

    • D. 

      A software system that can translate one application protocol in to another application protocol

  • 16. 
    The RJ-45 connector used in UTP networks typically terminates ____ wires?
    • A. 

      2

    • B. 

      4

    • C. 

      8

    • D. 

      12

  • 17. 
    Switches operate at the _______________ OSI level
    • A. 

      Top Layer

    • B. 

      Transport Layer

    • C. 

      Network Layer

    • D. 

      Data Link Layer

    • E. 

      The Packet Layer

  • 18. 
    Select two benefits which are provided by creating VLANs? (Choose two)
    • A. 

      Added security

    • B. 

      Dedicated bandwidth

    • C. 

      Provides segmentation

    • D. 

      Allows switches to route traffic between subinterfaces

    • E. 

      Contains collisions

  • 19. 
    Layer 1 of the OSI Model defines the methods of moving data between hardware. It includes cabling, interface cards and other physical means. Typically NICs, hubs and cabling are are common components in this category. What is this layer named?
    • A. 

      Protocol

    • B. 

      Primary

    • C. 

      Physical

    • D. 

      Processing

  • 20. 
    Layer 2 of the OSI Model transfers data between adjacent (i.e. directly connected) nodes in a network. It is a direct and reliable point-to-point connection. Switches operate in this layer; Ethernet is a protocol which exists in this layer. Information in data packets is encoded and decoded into data frames (Link Layer Header followed by a packet within this layer. What is this Layer called?
    • A. 

      Link Layer

    • B. 

      Logical Layer

    • C. 

      Data Layer

    • D. 

      Data Link Layer

  • 21. 
    Layer 3 of the OSI Model uses switching and routing technologies, along with the (IP) Internet Protocol to ensure that each piece of data gets to where it needs to go on the network. Delivery is not guaranteed. Frames from Layer 2 become packets in this Layer. Most routing occurs here. What is this Layer called? 
    • A. 

      Routing Layer

    • B. 

      Network Layer

    • C. 

      Switching Layer

    • D. 

      Transport Layer

  • 22. 
    Layer 7 of the OSI Model supports application and end-user protocols. Device Operating Systems have Applications Programming Interfaces (API) which programmers can use to make their programs network aware from within this Layer. File transfers, email and Telnet are some examples of things performed within this Layer. What is this layer called?
    • A. 

      Operations Layer

    • B. 

      Application Layer

    • C. 

      Applications Programming Layer

    • D. 

      Users Layer

  • 23. 
    DNS, DHCP, SSH, HTTP, FTP & SMTP are all protocols which are commonly found in which OSI Model Layer?
  • 24. 
    ICMP, IPv4, IPSec, RIP & ARP are all protocols which are commonly found in which OSI Model Layer?
  • 25. 
    Select four (4) protocols which you WOULD NOT typically find in the Application Layer.
    • A. 

      DHCP

    • B. 

      ISDN

    • C. 

      SSH

    • D. 

      TCP

    • E. 

      HTTP

    • F. 

      FTP

    • G. 

      ICMP

    • H. 

      SSL

Back to Top Back to top