Sample

advertisement
Lesson 2: The OSI Model
Multiple Choice
1. Which standardization model describes the steps that data must go through to be transmitted across a
data network?
a) SOHO model
b) UAC model
c) Proprietary model
d) OSI model
Answer: d
Difficulty: Easy
Section Reference: Introduction to the OSI Model
Explanation: The Open Systems Interconnection (OSI) model was created by the International Standards
Organization to describe the steps that data must go through in order to be transmitted across a data
network. The OSI model was never intended to define how data moves across networks; instead, it was
intended to describe how data is created and defined so that it could be sent over a network.
2. What is the process of taking data from a higher layer of the OSI model and carrying it down into the
next layer?
a) embedment
b) fixation
c) encapsulation
d) segmentation
Answer: c
Difficulty: Medium
Section Reference: Introduction to the OSI Model
Explanation: In networking, encapsulation is the process of taking data from a higher layer of the OSI
model and carrying it down into the next layer. The reverse of this process is called deencapsulation.
3. In what format is data sent at the Physical layer of the OSI model?
a) bits
b) segments
c) packets
d) frames
Answer: a
Difficulty: Medium
Section Reference: Introduction to the OSI Model
Explanation: When the data frame reaches the bottom of the OSI model and enters the Physical layer, it is
converted into bits, which are then passed down the network media to its destination computer.
4. In what format is data sent at the Transport layer of the OSI model?
a) bits
b) segments
c) packets
d) frames
Answer: b
Difficulty: Medium
Section Reference: Introduction to the OSI Model
Explanation: When data enters the Transport layer, it then becomes known as a segment.
5. In what format is data sent at the Data-Link layer of the OSI model?
a) bits
b) segments
c) packets
d) frames
Answer: d
Difficulty: Medium
Section Reference: Introduction to the OSI Model
Explanation: In the Data-Link layer, data packets are turned into frames.
6. In what format is data sent at the Network layer of the OSI model?
a) bits
b) segments
c) packets
d) frames
Answer: c
Difficulty: Medium
Section Reference: Introduction to the OSI Model
Explanation: As the segment is passed further down the OSI Model to the Networking layer, the segment
becomes known as a packet.
7. Which OSI layer is the lowest layer that sends data over a cable or wireless medium?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: a
Difficulty: Easy
Section Reference: Physical Layer
Explanation: The Physical layer, as can be expected from its name, deals with all aspects of physically
moving data from one computer to the next. The encapsulation units on this layer are called bits because
this layer is concerned with converting data from the upper layers into 1s and 0s that can be transmitted
over various types of transmission, called media.
8. Which layer includes the cables, wireless cards, and hubs?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: a
Difficulty: Easy
Section Reference: Physical Layer
Explanation: Because the Physical layer deals with all aspects of physically moving data from one
computer to the next, it includes physical devices such as cables, wireless cards, and hubs.
9. Which layer includes the Logical Link Control and Media Access Control sublayers?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: b
Difficulty: Easy
Section Reference: Data-Link Layer
Explanation: The Data-Link layer is unique because it is divided into two sublayers to properly describe
its full functionality. These two sublayers are called Logical Link Control (LLC)and Media Access
Control. The LLC standard was created to facilitate communications between the upper Network Layer of
the OSI Model and the Lower Physical Layer. The Media Access Control Sub Layer is used to determine
which computer has access to the network media at any given time.
10. Which layer includes the MAC address?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: b
Difficulty: Easy
Section Reference: Data-Link Layer
Explanation: The Data-Link layer is concerned with moving data (in frames) from one computer or node
to another. In this layer, computers communicate by using a physical address called the MAC address.
11. What method is used by a specific frame type or protocol to delineate to the computer the beginning
and ending of any given frame?
a) period counting
b) signal threading
c) frame synchronization
d) clock threading
Answer: c
Difficulty: Medium
Section Reference: MAC Sublayer
Explanation: The Media Access Control sublayer determines where one frame ends and the next one
starts. This method is known as frame synchronization.
12. Which of the following is not a form of frame synchronization?
a) time-based frame synchronization
b) character counting
c) byte stuffing
d) clock threading
Answer: d
Difficulty: Medium
Section Reference: MAC Sublayer
Explanation: In frame synchronization, a specific frame type or protocol delineates to the computer the
beginning and ending of any given frame. The four methods of frame synchronization are time-based
frame synchronization, character counting, byte stuffing, and bit stuffing.
13. At which OSI layer are logical addresses, such as IP addresses, defined?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: c
Difficulty: Easy
Section Reference: Network Layer
Explanation: Logical addresses, such as IP addresses, need to be assigned manually to every computer on
a network. These addresses are assigned at the Network layer.
14. Which OSI layer is responsible for routing between networks?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: c
Difficulty: Easy
Section Reference: Network Layer
Explanation: Whereas the Data-Link layer is responsible for moving data from one computer or node to
another, the Network layer is responsible for routing data in the form of packets from one end of the
network to the other.
15. Which type of network communications protocol does not ask for verification that a data packet has
successfully reached its destination?
a) connectionless protocol
b) connection-oriented protocol
c) end-to-end protocol
d) terminating protocol
Answer: a
Difficulty: Medium
Section Reference: Network Layer
Explanation: A connectionless protocol does not ask for verification that a data packet has successfully
reached its destination. If a connectionless protocol is being used, the data packet is thrown out on the
network and is just “assumed” that it successfully reached its destination. This “best-effort” delivery will
usually suffice on most environments without problems.
16. TCP is an example of a ___________ protocol
a) connectionless protocol
b) connection-oriented protocol
c) end-to-end protocol
d) terminating protocol
Answer: b
Difficulty: Medium
Section Reference: Network Layer
Explanation: Connection-oriented protocols ask for verification that a packet has successfully reached its
destination before sending another packet out. Most Network layer protocols used in modern networks,
such as IP, are of the connectionless variety. However, TCP, one of the most widely used protocols at the
Transport layer, is actually a connection-oriented protocol.
17. Which OSI layer ensures that the data gets delivered safely to its destination?
a) Transport
b) Data-Link
c) Network
d) Physical
Answer: a
Difficulty: Medium
Section Reference: Network Layer
Explanation: Aside from breaking the data into segments or reassembling segments back into data, the
Transport Layer is also concerned with the reliability of the transport of the data sent. What this means is
that the one of the jobs of the Transport Layer is to ensure that the data that has been sent safely arrived at
its destination.
18. A/An ___________ is a unique address inside the computer that is associated with a specific protocol,
service, or application.
a) IP address
b) TCP address
c) ICMP port
d) port address
Answer: d
Difficulty: Easy
Section Reference: Port Addressing
Explanation: The Transport layer needs to ensure that the data it has sent can get to the proper destination
applications, services, or protocols. To do this, the Transport layer uses port addressing. A port address is
a unique address inside the computer that is associated with a specific protocol, service, or application.
19. What port addresses range from 0 through 1,023?
a) well-known ports
b) registered ports
c) dynamic ports
d) recognized ports
Answer: a
Difficulty: Easy
Section Reference: Port Addressing
Explanation: Port addresses especially apply to the TCP and UDP protocols and are divided into three
categories or ranges: well-known ports, registered ports, and dynamic ports. Well-known ports range from
0 through 1,023 and are pre-assigned by the Internet Corporation for Assigned Names and Numbers
(ICANN) for the use of major networking protocols. Well-known ports do not change, no matter what
computer or operating system you use.
20. Which address ports range between 1,024 and 49,151?
a) well-known ports
b) registered ports
c) dynamic ports
d) recognized ports
Answer: b
Difficulty: Easy
Section Reference: Port Addressing
Registered ports range from 1,024 through 49,151 and are registered with ICANN for specific uses,
usually for a specific company, vendor, application, or operating system for proprietary use.
21. Which address ports range from 49,152 through 65,535 and are available for any application to use to
communicate with any other application?
a) well-known ports
b) registered ports
c) dynamic ports
d) recognized ports
Answer: c
Difficulty: Easy
Section Reference: Port Addressing
Dynamic ports range from 49,152 through 65,535 and are available for any application to use to
communicate with any other application. Dynamic ports are also sometimes known as private ports and
ephemeral ports.
22. Which OSI layer is responsible for managing the dialog between networked devices?
a) Transport
b) Session
c) Presentation
d) Application
Answer: b
Difficulty: Easy
Section Reference: Session Layer
Explanation: The Session layer manages the dialog between networked devices. It can establish, manage,
and terminate connections between local and remote computers or applications.
23. Which communication method is a true two-way communication between devices?
a) full-duplex
b) half-duplex
c) simplex
d) half-simplex
Answer: a
Difficulty: Easy
Section Reference: Session Layer
Explanation: Duplex or full-duplex means true two-way communications between devices. Either end of
the connection can transmit or receive at the same time the other end is doing the same thing.
24. Which communication method is a pure one-way communication?
a) full-duplex
b) half-duplex
c) simplex
d) half-simplex
Answer: c
Difficulty: Easy
Section Reference: Session Layer
Explanation: Simplex communication is purely one way. Think of a radio or TV: All such a device can do
is either send or receive; it cannot do both.
25. Which OSI layer is concerned with translation, compression, and encryption?
a) Transport
b) Session
c) Presentation
d) Application
Answer: c
Difficulty: Easy
Section Reference: Presentation Layer
Explanation: The Presentation layer is concerned with how data is presented to the network. To properly
present data to the network, the Presentation layer is primarily concerned with three tasks: translation,
compression, and encryption.
26. Which OSI layer includes SSL?
a) Transport
b) Session
c) Presentation
d) Application
Answer: c
Difficulty: Easy
Section Reference: Presentation Layer
Explanation: The Presentation layer is concerned with encryption, among other tasks. One of the most
well-known uses of network encryption is something called Secure Sockets Layer (SSL), which is used to
encrypt web pages.
27. Which layer of the OSI model discusses network services?
a) Transport
b) Session
c) Presentation
d) Application
Answer: d
Difficulty: Easy
Section Reference: Application Layer
Explanation: The top layer of the OSI model is the Application layer, which contains all the services and
protocols needed by application software or the operating system to communicate on the network.
28. Which layer of the TCP/IP model corresponds to the OSI Network layer?
a) Application
b) Transport
c) Internet
d) Network Access
Answer: c
Difficulty Medium
Section Reference: TCP/IP Model
Explanation: Whereas the OSI model is based on an idealized network environment and does not match
any real protocol suites, the TCP/IP model is built around the TCP/IP protocol suite.
29. At which OSI layer would a hub operate?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: a
Difficulty: Easy
Section Reference: Physical Layer
Explanation: The Physical layer deals with all aspects of physically moving data from one computer to
the next, including cables and hubs.
29. At which OSI layer would a switch operate?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: b
Difficulty: Easy
Section Reference: Data-Link Layer
Explanation: The Data-Link layer is concerned with moving data from one computer to another. Because
switches forward traffic based on the MAC address, it operates at the Data-Link layer.
30. At which OSI layer do routers operate?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: c
Difficulty: Easy
Section Reference: Network Layer
Explanation: The Network layer routes data in the form of packets from one end of the network to the
other.
31. At which OSI layer do HTTP and FTP operate?
a) Transport
b) Session
c) Presentation
d) Application
Answer: d
Difficulty: Easy
Section Reference: Application Layer
Explanation: The Application layer contains all the services and protocols, including HTTP and FTP,
needed by application software or the operating system to communicate on the network.
32. Which layer is the fourth layer of the OSI model?
a) Transport
b) Data-Link
c) Physical
d) Application
Answer: a
Difficulty: Easy
Section Reference: Transport Layer
Explanation: The next layer up from Network is Transport. The Transport layer takes data from higher
levels of the OSI model and breaks it down into smaller pieces, called segments, which are sent to lower
level layers for actual transmission.
33. Which OSI layer is responsible for reliable delivery of sent data?
a) Transport
b) Data-Link
c) Physical
d) Application
Answer: a
Difficulty: Easy
Section Reference: Transport Layer
Explanation: The Transport layer ensures that sent data safely arrives at its destination.
34. At which OSI layer are port addresses used?
a) Transport
b) Data-Link
c) Physical
d) Application
Answer: a
Difficulty: Easy
Section Reference: Transport Layer
Explanation: The Transport layer uses port addressing to ensure that data reaches its proper destination
applications, services, or protocols.
35. OSI was created by __________.
a) Adobe
b) the ISO
b) Microsoft
d) Intel
Answer: b
Difficulty: Easy
Section Reference: Introduction to the OSI Model
Explanation: The OSI model was created by the International Organization for Standardization.to
describe the steps that data must go through to be transmitted across a data network.
36. What TCP/IP model layer contains Ethernet and 802.11 wireless network device protocols?
a) Application
b) Transport
c) Internet
d) Network Access
Answer: d
Difficulty Medium
Section Reference: TCP/IP Model
Explanation: The TCP/IP protocol suite relies on standards created by various standards organizations
concerning different media. These standards explain how to encode bits onto them to do the work on this
layer of the TCP/IP model. Ethernet, the 802.11 wireless standards, and various WAN media standards
make up the protocols found on lowest the TCP/IP model, the Network Access layer.
37. What TCP/IP model layer defines HTTP and FTP?
a) Application
b) Transport
c) Internet
d) Network Access
Answer: a
Difficulty: Medium
Section Reference: TCP/IP Model
Explanation: The top layer of the TCP/IP model is the Application layer, which simply deals with
providing the protocols and/or services needed by the operating system and application software to
communicate with the network.
38. At which OSI layer do the CSMA/CD and CSMA/CA operate?
a) Physical
b) Data-Link
c) Network
d) Transport
Answer: b
Difficulty: Easy
Section Reference: Data-Link Layer
Explanation: One of the primary functions of the MAC sublayer (part of the Data-Link layer) is to
determine which computer has access to network media at any given time. In a LAN environment, the
MAC sublayer makes this determination by using Carrier Sensing Media Access/Collision Detection
(CSMA/CD) in the wired world and Carrier Sensing Media Access/Collision Avoidance (CSMA/CA) in
the wireless world.
39. At which OSI layer do POP3 and Telnet operate?
a) Transport
b) Session
c) Presentation
d) Application
Answer: d
Difficulty: Easy
Section Reference: Application Layer
Explanation: The Application layer contains all the services and protocols, including POP3 and Telnet,
needed by application software or the operating system to communicate on the network.
Fill in the Blank
40. What is the physical address known as on a host or device?
Answer: MAC address
Difficulty: Medium
Section Reference: Data-Link Layer
Explanation: To move data around a network, a computer must know the address of the computer it is
trying to communicate with. As such, the Data-Link layer contains an addressing mechanism for finding
that computer, called a MAC address or a physical address. This address is referred to as a physical
address because it is hard coded into the network device. Each device to be communicated with on a
network segment must have a unique physical address.
41. A __________ is a predefined and widely accepted set of rules that describe exactly how a specific
task is to work in a network environment.
Answer: protocol
Difficulty: Medium
Section Reference: Data-Link Layer
Explanation: A protocol is a predefined and widely accepted set of rules that describe exactly how a
specific task is to work in a network environment. For communication to occur, both hosts must agree on
the same protocol.
42. The _____________ protocol asks for verification that a packet has successfully reached its
destination.
Answer: connection-oriented
Difficulty: Hard
Section Reference: Network Layer
Explanation: Connection-oriented protocols ask for verification that a packet has successfully reached its
destination before sending another packet out. Most Network layer protocols used in modern networks,
such as IP, are of the connectionless variety. However, TCP, one of the most widely used protocols at the
Transport layer, is actually a connection-oriented protocol.
Short Answer
43. How many well-known ports are there?
Answer: 1,024
Difficulty: Easy
Section Reference: Port Addressing
Explanation: Port addresses apply to the TCP and UDP protocols and are divided into three categories or
ranges: well-known, registered, and dynamic. Well-known ports range from 0 through 1,023 and are preassigned by the Internet Corporation for Assigned Names and Numbers (ICANN) for the use of major
networking protocols. Well-known ports do not change, no matter what computer or operating system
you use.
44. What protocol defines the LLC and MAC sublayers?
Answer: 802.2
Difficulty: Hard
Section Reference: Data-Link Layer
Explanation: The protocol that defines these two sublayers in the Data-Link layer is known as IEEE
802.2, defined in the greater IEEE 802 protocol set. The IEEE 802 protocols are written this way because
they were first proposed by a standards organization known as the Institute of Electrical and Electronic
Engineers.
45. What are dynamic address ports also known as?
Answer: Private ports or ephemeral ports
Difficulty: Medium
Section Reference: Port Addressing
Explanation: Dynamic ports range from 49,152 through 65,535 and are available for any application to
use to communicate with any other application. Dynamic ports are also sometimes known as private ports
and emphemeral ports
46. List the four layers of the TCP/IP model.
Answer: Application, Transport, Internet, and Network Access
Difficulty: Hard
Section Reference: TCP/IP Model
Explanation: Whereas the OSI model is based on an idealized network environment and does not match
any real protocol suites, the TCP/IP model is built around the TCP/IP protocol suite. It includes the
Application, Transport, Internet, and Network Access layers.
47. What is the opposite of encapsulation?
Answer: decapsulation
Difficulty: Easy
Section Reference: Encapsulation
Explanation: In networking, encapsulation is the process of taking data from a higher layer of the OSI
model and carrying it down into the next layer. The reverse of this process is called de-encapsulation.
48. When data is encapsulated, what is added at the beginning of data before it is sent to the next layer?
Answer: A header
Difficulty: Easy
Section Reference: Encapsulation
Explanation: Each layer adds its own header in front of the header from the previous layer. This header
contains information that describes what each layer of the OSI model is to do with the data.
49. List at least one mnemonic used to describe the OSI model and match the corresponding OSI layers.
Answers:
All People Seem to Need Data Processing (Application Presentation Session Transport Network DataLink Physical)
or
Please Do Not Throw Sausage Pizza Away (Physical Data-Link Network Transport Session Presentation
Application)
Difficulty: Hard
Section Reference: Introduction to the OSI model
Explanation: Mnemonics are used as a way to remember not-so-easy lists. In this case, each letter of the
phase is the same letter for layer in the OSI model
Essay
50. Explain what the OSI model is designed for.
Answer: The Open Systems Interconnection (OSI) model was created by the International Standards
Organization to describe the steps that data must go through to be transmitted across a data network. The
OSI model was never intended to define how data moves across networks; instead the OSI model was
intended to describe how data is formatted and processed. It is used to define and classify the various
technologies and protocols that make a network operate.
Difficulty: Medium
Section Reference: Introduction to the OSI Model
Explanation: The OSI Model was created as a framework and reference model for understanding how
different networking technologies work together and interact. In this capacity, the OSI Model is an
excellent place to start when trying to understand all the processes that are necessary for data to be moved
around a data network.
Download