Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. How many layers does the OSI model contain? A. 3 B. 5 C. 7 D. 9 2 . Which of

ID: 3850338 • Letter: 1

Question

1. How many layers does the OSI model contain?

A. 3

B. 5

C. 7

D. 9

2. Which of the following statements about the OSI is FALSE?

A. The OSI model encourages modular design in networking.

B. Each protocol needs to understand all of the protocols handling all the other layers.

C. The OSI model provides a common jargon to describe the function of any network protocol.

D. Each layer of the OSI model addresses an essential network task.

3. Which standards organization is named for the Greek word for “equal”?

A. OSI

B. ISO

C. Cisco

D. IEEE

4. In some networks, data moves over radio waves. These waves fall into which layer of the OSI model?

A. Application

B. Session

C. Presentation

D. Physical

5. Which layer of the OSI model is associated with moving data from one system to another by means such as cabling or radio waves?

A. Layer 1

B. Layer 2

C. Layer 3

D. Layer 4

6. How long is a MAC address?

A. 12 hexadecimal characters

B. 48 bytes

C. 6 pairs of binary digits

D. 32 bits

7. A MAC address is composed of which two parts?

A. the network address and the node address

B. the computer name and the node address

C. the Organizationally Unique Identifier and the device ID of the NIC

D. the IP address and the NICs serial number

8. A MAC address is also known as a(n) __________ address.

A. physical

B. logical

C. IP

D. router

9. NICs send and receive binary data as pulses of all of the following EXCEPT ___________.

A. electricity

B. radio waves

C. gamma rays

D. light

10. All NICs on the same network must use the same __________, or they will not be able to communicate with other NICs.

A. frame check sequence

B. MAC address

C. frame type

D. IP address

11. Select the one function below that a NIC does NOT perform.

A. It sends and receives binary data.

B. It provides an interface between the PC and the network.

C. It creates frames.

D. It verifies the data within each frame.

12. Frames in most networks hold at most __________.

A. 150 bytes of data

B. 1024 bytes of data

C. 1500 bytes of data

D. 48 bytes of data

13. How are incoming frames handled by a switch?

A. The frames are sent only to the NIC that has the destination MAC address.

B. The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame.

C. Every NIC processes the frame when it receives it.

D. The NIC broadcasts the contents of the frame.

14. Where does the CRC originate in a network frame?

A. The sending NIC attaches it.

B. The receiving NIC attaches it.

C. The network operating system generates it and attaches it.

D. The network administrator attaches it

15. How does the receiving station on a network use the CRC to verify that it received accurate data?

A. It uses a new divisor to find a new remainder.

B. It uses the same divisor as the sending station to find the same remainder.

C. It uses the same divisor as the sending station to find a different remainder.

D. It adds its key to that of the sending station to find the total.

16. Which of the following is a broadcast MAC address?

A. 255.255.255.255

B. FF-FF-FF-FF-FF-FF

C. 256

D. 1000

17. Which layer of the OSI model adds source and destination MAC addresses to frames?

A. Network

B. Data Link

C. Transport

D. Presentation

18. Which of the following best describes Logical Link Control (LLC)?

A. It is a Layer 1 protocol.

B. It is a sublayer of the Data Link layer.

C. It remembers the NIC’s MAC address.

D. It controls open network sessions.

19. Which layer of the OSI model is the only layer divided into two sublayers?

A. Transport

B. Network

C. Data Link

D. Physical

20. Routers have which of the following capabilities?

A. They allow a MAC address to be assigned to each computer.

B. They allow an IP address to be assigned to each computer.

C. They allow network connections across data lines that don’t use Ethernet.

D. They allow a network administrator to configure hardware settings.

21. Which of the following statements best describes an IP address?

A. It is a unique identifier burned into the NIC when it is manufactured.

B. It is a unique dotted decimal number assigned to every network node.

C. It is a number shared by all computers on the same network.

D. It is a number assigned only to routers, identifying their priority ratings.

22. When it receives data from the upper layers, which layer of the OSI model assembles the data into smaller pieces called packets?

A. Data Link

B. Physical

C. Network

D. Transport

23. Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?

A. Presentation

B. Application

C. Network

D. Data Link

24. What device do you need to split a large network into smaller ones?

A. NIC

B. bridge

C. router

D. MAC address

25. What is the unique numeric identifier assigned to each device at the Network layer of a TCP/IP network?

A. IP address

B. MAC address

C. router name

D. port number

26. Routers function at which layer of the OSI model?

A. Physical

B. Data Link

C. Network

D. Transport

27. Which layer of the OSI model manages connecting applications to applications?

A. Application

B. Session

C. Data Link

D. Transport

28. Which layer of the OSI model refers to the code built into operating systems that enables network-aware applications?

A. Application

B. Transport

C. Session

D. Presentation

29. Which of these statements best describes an Application Programming Interface?

A. It is the GUI interface that Windows uses to interact with the user.

B. It is the top layer of the OSI model of networking.

C. It provides programmers with a standard way to extend an application’s capabilities.

D. It is a protocol that allows Web browsers to request data from a Web server.

30. Routers function at which layer of the TCP/IP model?

A. Internet

B. Application

C. Link

D. Transport

31. Which layer of the TCP/IP model is mapped to the bottom two layers of the OSI model?

A. Link

B. Internet

C. Application

D. Transport

32. Which layer of the TCP/IP model performs IP addressing functions?

A. Transport

B. Link

C. Internet

D. Application

33. Which TCP/IP model layer uses connection-oriented protocols?

A. Internet

B. Application

C. Link

D. Transport

34. Which layer of the TCP/IP model is mapped to the top three layers of the OSI model?

A. Internet

B. Link

C. Transport

D. Application

35. For a network tech, one benefit of understanding the OSI seven-layer model and how traffic in an actual network works through the model is applying this knowledge to __________.

A. purchasing NICs

B. connecting PCs to the Internet

C. troubleshooting networks

D. securing a PC

Explanation / Answer

1qn)How many layers does the OSI model contain?

ans:C.7

2qn)2. Which of the following statements about the OSI is FALSE?

ans: B. Each protocol needs to understand all of the protocols handling all the other layers

3qn)Which standards organization is named for the Greek word for “equal”

ans: B.ISO

4qn)In some networks, data moves over radio waves. These waves fall into which layer of the OSI model?

ans:D. Physical

5. Which layer of the OSI model is associated with moving data from one system to another by means such as cabling or radio waves?

ans: A. Layer 1

6. How long is a MAC address?

ans: A. 12 hexadecimal characters

7. A MAC address is composed of which two parts?

ans :C. the Organizationally Unique Identifier and the device ID of the NIC

8. A MAC address is also known as a(n) __________ address.

ans: A. physical

9. NICs send and receive binary data as pulses of all of the following EXCEPT ____

ans: C. gamma rays

10. All NICs on the same network must use the same __________, or they will not be able to communicate with other NICs.

ans: B. MAC address

11. Select the one function below that a NIC does NOT perform.

ans: D. It verifies the data within each frame.

12. Frames in most networks hold at most __________.

ans: C. 1500 bytes of data

13. How are incoming frames handled by a switch?
ans: B. The frames are received by every NIC, but only the NIC with the matching MAC address processes the frame.
14. Where does the CRC originate in a network frame?
ans: A. The sending NIC attaches it.
15. How does the receiving station on a network use the CRC to verify that it received accurate data?
ans: B. It uses the same divisor as the sending station to find the same remainder.
16. Which of the following is a broadcast MAC address?
ans: B. FF-FF-FF-FF-FF-FF
17. Which layer of the OSI model adds source and destination MAC addresses to frames?
ans: B. Data Link
18. Which of the following best describes Logical Link Control (LLC)?
ans: B. It is a sublayer of the Data Link layer.
19. Which layer of the OSI model is the only layer divided into two sublayers?
ans: C. Data Link
20. Routers have which of the following capabilities?
ans: C. They allow network connections across data lines that don’t use Ethernet.
21. Which of the following statements best describes an IP address?
ans: B. It is a unique dotted decimal number assigned to every network node
22. When it receives data from the upper layers, which layer of the OSI model assembles the data into smaller pieces called packets?
ans: D. Transport
23. Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?
ans: C. Network
24. What device do you need to split a large network into smaller ones?
ans: C. router
25. What is the unique numeric identifier assigned to each device at the Network layer of a TCP/IP network?
ans: A. IP address
26. Routers function at which layer of the OSI model?
ans: C. Network
27. Which layer of the OSI model manages connecting applications to applications?
ans: A. Application
28. Which layer of the OSI model refers to the code built into operating systems that enables network-aware applications?
ans : A. Application

29. Which of these statements best describes an Application Programming Interface?
ans:
C. It provides programmers with a standard way to extend an application’s capabilities.
30. Routers function at which layer of the TCP/IP model?
ans:
A. Internet
31. Which layer of the TCP/IP model is mapped to the bottom two layers of the OSI model?
ans:
C. Application

32. Which layer of the TCP/IP model performs IP addressing functions?

Ans : C. Internet
33. Which TCP/IP model layer uses connection-oriented protocols?
ans: D. Transport

34. Which layer of the TCP/IP model is mapped to the top three layers of the OSI model?

ans: D. Application
35. For a network tech, one benefit of understanding the OSI seven-layer model and how traffic in an actual network works through the model is applying this knowledge to __________.
ans: C. troubleshooting networks
















29. Which of these statements best describes an Application Programming Interface
34. Which layer of the TCP/IP model is mapped to the top three layers of the OSI model?