Network+ Chapter2

Card Set Information

Author:
peeojay
ID:
260099
Filename:
Network+ Chapter2
Updated:
2016-04-24 04:15:00
Tags:
Chapter2 Quiz
Folders:

Description:
Chapter2 Quiz
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user peeojay on FreezingBlue Flashcards. What would you like to do?


  1. Which layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?
    Application Layer
  2. Which layer is responsible for converting data packets from the Data Link layer into electricalsignals?
    Physical Layer
  3. At which layer is routing implemented, enabling connections and path selection betweentwo end systems?
    Network Layer
  4. Which layer defines how data is formatted, presented, encoded, and converted?
    Presentation Layer
  5. Which layer is responsible for creating, managing, and terminating sessions between applications?
    Session Layer
  6. Which layer manages the transmission of data across a physical link and is primarily concernedwith physical addressing and the ordered delivery of frames?
    Data Link Layer
  7. Which layer is used for reliable communication between end nodes over the network and provides mechanisms for establishing, maintaining, and terminating virtual circuits as well as controlling the flow of information?
    Transport Layer
  8. Which layer provides logical addressing that routers use for path determination?
    Network Layer
  9. Which layer specifies voltage, wire speed, and connector pinouts and moves bits between devices?
    Physical Layer
  10. Which layer combines bits into bytes and bytes into frames and uses MAC addressing?Which layer combines bits into bytes and bytes into frames and uses MAC addressing?
    Data Link Layer
  11. Host 1 sent a SYN packet to Host 2. What will host 2 send in response?
    A. SYN
    B. SYN-ACK
    C. SYN-NAK
    D. NAK
    E. ACK
    B. SYN-ACK
    (this multiple choice question has been scrambled)
  12. 2. TCP and UDP reside at which layer of the OSI model?
    A. 1
    B. 4
    C. 2
    D. 3
    B. 4
    (this multiple choice question has been scrambled)
  13. Which layer of the OSI model provides a user interface in the form of an entry point forprograms to access the network infrastructure?
    A. Physical
    B. Network
    C. Application
    D. Transport
    C. Application
    (this multiple choice question has been scrambled)
  14. You are connected to a server on the Internet and you click on a link on the server andreceive a time-out message. What layer could be the cause of this message?
    A. Physical
    B. Application
    C. Transport
    D. Network
    B. Application
    (this multiple choice question has been scrambled)
  15. Which layer of the OSI model is responsible for code and character-set conversion as well asrecognizing data formats?
    A. Application
    B. Presentation
    C. Network
    D. Session
    B. Presentation
    (this multiple choice question has been scrambled)
  16. At which layers of the OSI model do bridges, hubs, and routers primarily operate,respectively?
    A. Data Link, Data Link, Network
    B. Data Link, Physical, Network
    C. Physical, Data Link, Network
    D. Physical, Physical, Data Link
    B. Data Link, Physical, Network
    (this multiple choice question has been scrambled)
  17. Which layer of the OSI model is responsible for converting data into signals appropriate forthe transmission medium?
    A. Network
    B. Physical
    C. Data Link
    D. Application
    B. Physical
    (this multiple choice question has been scrambled)
  18. A receiving host has failed to receive all the segments that it should acknowledge. What canthe host do to improve the reliability of this communication session?
    A. Decrease the window size.
    B. Restart the virtual circuit.
    C. Send a different source port number.
    D. Decrease the sequence number.
    A. Decrease the window size.
    (this multiple choice question has been scrambled)
  19. Which Layer 1 devices can be used to enlarge the area covered by a single LAN segment?(Choose two.)
    A. NIC
    B. Switch
    C. RJ-45 transceiver
    D. Repeater
    E. Hub
    E. Hub   D. Repeater
    (this multiple choice question has been scrambled)
  20. Segmentation of a data stream happens at which layer of the OSI model?
    A. Physical
    B. Data Link
    C. Transport
    D. Network
    C. Transport
    (this multiple choice question has been scrambled)
  21. When data is encapsulated, which is the correct order?
    A. Data, segment, frame, packet, bits
    B. Data, segment, packet, frame, bits
    C. Data, frame, packet, segment, bits
    D. Segment, data, packet, frame, bits
    B. Data, segment, packet, frame, bits
    (this multiple choice question has been scrambled)
  22. What are two purposes for segmentation with a bridge?
    A. To add more broadcast domains
    B. To create more collision domains
    C. To add more bandwidth for users
    D. To allow more broadcasts for users
    • B. To create more collision domains
    • C. To add more bandwidth for users
  23. Acknowledgments, sequencing, and flow control are characteristic of which OSI layer?A. Layer 2
    B. Layer 3
    C. Layer 4
    D. Layer 7
    C. Layer 4
  24. Which of the following are types of flow control? (Choose all that apply.)
    A. Buffering
    B. Cut-through
    C. Windowing
    D. Congestion avoidance
    E. VLANs
    • A. Buffering
    • B. Cut-through
    • D. Congestion avoidance
  25. What is the purpose of flow control?
    A. To regulate the size of each segment
    B. To reassemble segments in the correct order at the destination device
    C. To provide a means for the receiver to govern the amount of data sent by the sender
    D. To ensure that data is retransmitted if an acknowledgment is not received
    C. To provide a means for the receiver to govern the amount of data sent by the sender
    (this multiple choice question has been scrambled)
  26. At which layer of the OSI model would you find IP?
    A. Physical
    B. Network
    C. Data Link
    D. Transport
    B. Network
    (this multiple choice question has been scrambled)
  27. Of the following, which is the highest layer in the OSI model?
    A. Network
    B. Presentation
    C. Transport
    D. Session
    B. Presentation
    (this multiple choice question has been scrambled)
  28. Routers perform routing at which OSI layer?
    A. Network
    B. Transport
    C. Application
    D. Physical
    E. Data Link
    A. Network
    (this multiple choice question has been scrambled)
  29. Which of the following mnemonic devices can you use to remember the first letter of the name of each layer of the OSI model in the proper order?
    A. All People Seem To Need Data Processing
    B. Always Should People Never Threaten Dog Police
    C. Please Do Not Throw Sausage Pizza Away
    D. All Day People Should Try New
    • C. Please Do Not Throw Sausage Pizza Away
    • D. All People Seem To Need Data Processing
  30. Which IEEE standard specifies the protocol for CSMA/CD?
    A. 802.5
    B. 802.2
    C. 802.11
    D. 802.3
    D. 802.3
    (this multiple choice question has been scrambled)
  31. What does OSI stand for?
    Open Source Interconnect
  32. What is the acoustic used to identify Protocol Data Units (PDU) at the various stages of the OSI model?
    • Some, People, Fear, Birthdays,
    • Segment, Packet, Frame, Bytes
  33. How do two devices successfully communicate at the physical layer?
    It uses synchronization bits to agree when one bit stop and another bit starts.
  34. What are the sychronization bit method used at the physical layer?  Please explain.
    Asynchronous - The sender indicates it is about to start transmitting by sending a start bit to the receiver.  When the receiver sees this, it starts its own internal clock to measure the subsequent bits.  After the send transmits its data, it sends a stop bit to indicate it has finished its transmission.

    Synchronous - Synchronizes the internal clock of both ehe sender and receiver to ensure they agreed on when bits begin and end.  Both the sender and receiver uses an external clock source as a reference.
  35. Explain bandwidth usage on a network.
    The fundamental approach is Broadband and Baseband.

    Broadband - Divides bandwidth available on a medium into different channels.  Different communication streams can then be transmitted over different channels.

    Baseband - Uses all available frequencies on a medium to transmit data.  Ethernet is an example of this type of technology.
  36. Which layer of the OSI model is concerned with how bits are represented on the medium and the transmission of data on the network?
    Physical layer or layer 1
  37. What are some typical physical layer topologies?
    Ring, Bus, Star
  38. What is DLC?  What layer do these processes operate?
    Data Link Control which operates at the Data Link layer or layer 2.
  39. What are the two sublayers within layer 2 of the OSI model?
    Media Access Control (MAC) and Logical Link Control (LLC).
  40. How many bits are contained in a MAC address? How are the bits configured?
    48bits.  The first 24 bits identify the manufacturer.  The last 24 bits are unique values provided by the manufacturer.
  41. When a device on the network receives data from another device on the network, the recipient can provide feedback to the sender in the form of an acknowledgement message.  This is a function of what process and what layer.
    Logical link layer within the Data Link layer or layer 2 of the OSI model.
  42. How does the OSI model constrain the flow of data?  At what layer is this accomplished?
    Flow Control is a part of the Logical Link Control within the Data Link Layer or layer 2 of the OSI model.
  43. What is error control and how does it work?  What layer does it operate in?
    Error control provides feedback to the sender by notifying the sender that expected data was or was not received.  The recipient determines if the data is corrupted by using a checksum, if the checksum is incorrect the recipient notifies the sender in an acknowledgement message.  This is a LLC process within the Data Link Layer.
  44. Explain the three synchronization transmissions within LLC?
    Isochronous - Network devices look to a common device in the network as a clock source.

    Asynchronous - Network devices reference their own internal clocks.

    Synchronous - Two network devices wanting to communicate with each other must agree on the clock method to indicate beginning and ending data frames.
  45. What services are contained within the Network Layer?  Where does this reside within the OSI Model?
    Logical addressing, Switching, Route discovery and selection, Connection services, Bandwidth usage, Multiplexing strategy.  This is layer 3 of the OSI Model.

What would you like to do?

Home > Flashcards > Print Preview