0% found this document useful (0 votes)
11 views

Solved Questions For Data Link Part2

علعىعىعىخعىخغ

Uploaded by

Mo Mohamed
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
11 views

Solved Questions For Data Link Part2

علعىعىعىخعىخغ

Uploaded by

Mo Mohamed
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 8
1. What is another name for the OSI data link layer? A Layer B.Layer2 © Layers DiLayer 6 2. The IEEE 802 LAN/MAN data link layer consists of which two sublayers? (Choose two.) [A Network Control Protocol B. Logical Link Control . Media Access Control .Link Control Protocol 3. What is the responsibility of the MAC sublayer?, A. Adds Layer 3 addresses tothe frame 8B. Communicates with the network layer (Layer 3) ©. Provides the method to get the frame on and off the media, D. Transmits the bits on the media, 4, What Layer 2 function does a router perform? (Choose three.) 'A. Accepts a frame from a medium B, De-encapsulates the frame Refers to its Layer 3 routing table for a matching destination network D.Re-encapsulates the packet into a new frame 5. The media access control method used depends on which two criteria? A Layer 3 IP protocol B. Media sharing ©. Topology D. Transport layer protocol 6. Which organization defines standards for the network access layer (Le., the OSI physical and data link layers)? Cisco B.IANA IEEE D.tETe 7. Which topology displays networking device layer IP addresses? ‘A. Aerial topology 8. IP address topology ©. Logical topology .Physical topology 8, What kind of network would use point-to-point, hub and spoke, or mesh topologies? A PAN B.LAN WLAN WAN 9. Which LAN topology is a hybrid topology? Abus B. Extended star cing star 10. Which duplex communication method is used in WLANs? | Fullduplex 8. Half-duplex simplex 111. Which media access control method is used in legacy Ethernet LANs? ‘A Carter sense muftiple access/colision annoyance 8. Carrier sense multiple access/colision avoidance ©. Carrier sense mutiple access/colision destruction . Cartier sense multiple access/collision detection 112. What does the data link layer add to a Layer 3 packet to create a frame? (Choose two.) A Flags B. Sequence number ©. Header b. Trail 113. What is the function ofthe last field in a data link layer frame? [A To determine whether the frame experienced transmission errors 8. To identity special ow control services such as quality of service (208) ©. To identity the begining and end init ofthe frame .To identity the Layer 3 protocol inthe data ld 114, Which lists the Layer 2 and Layer 3 address fields in the correct order? A. Destination NIC address, source NIC adress, source IP adress, destination IP address 8. Source NC address, destination NIC adress, source IP adress, destination IP adress €. Destination NC adress, source NIC address destination IP adress, source IP adress Source NIC address, destination NIC address, destination IP address, source IP adress 15, Which of the following are data link layer protocols? (Choose three) a.g02.11 B.ethemet cur, D.PPP. upp, 16. What identifier Is used atthe data link layer to uniquely identify an Ethernet device? ‘A. UDP port number 8B. Sequence number Mac address D.iPaddress TOP port number 17. What atribute of a NIC would place it atthe data link ayer of the OSI model? ARMS port B.P aceress attached Ethernet cable D.MAC adress E-TOPIIP protocol stack 18. Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.) ‘A Internet Society (ISOC) £8. Intemational Telecorsmunication Union (ITU) Intute of Electrical and Electrons Engineers (IEEE) D.Electonic Industries Alliance (EIA) E intemet Assigned Numbers Authority (IANA) 19, What is true concerning physical and logical topologies? ‘A. Physical topologies display the P addressing scheme of each network. 8. Physical topologies are concemed with how a network tansfrs frames ©. The logical topology is always the same asthe physical topology. . Logical topologies refer to how a network transfers data between devices. 20. What method is used to manage contention-based access on a wireless network? A.csmarco 8. Token passing c.csMaica ©. Priority ordering 21. A technician has been asked to develop a physical topology for a network that provides 2a high level of redundancy. Which physical topology requires that every node is attached to ‘every other node on the network? A.Mesh 8. star c.bus . Hierarchical E Ring 22, Which statement describes the half-duplex mode of data transmission? ‘A Date that i transmitted over the network flows in one direction to many diferent destinations simultaneously, £2, Data that ie transmitted over the network flows in one direction ata time. . Data that is transmitted over the network fous in both directions atthe same time. . Data that is tranemitted over the network can only flow in one drction. 23, Which isa funetion of the Logical Link Control (LLC) sublayer? ‘A To provide data lnk layer aderessing 8B. To identity which network layer protocol ie being used To define the media access processes that ae performed by the hardware To accept segments and package them nto data units that are called packets 24, Which data link layer media access control method does Ethernet use with legacy Ethernet hubs? A.csmavco 8 Token passing Turn taking Determinism 25. What are the two sublayers of the OSI model data link layer? (Choose two.) A Internet BLL ©. Transport D.Physical EMAC 26. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? 1 Application 8. Physical C. Transport D. Datalink 27. What type of physical topology can be created by connecting all Ethernet cables to a central device? ARing B Mesh star .Bus 28. What are two services performed by the data link layer of the OSI model? (Choose two.) ‘Att determines the path to forward packets. B. It provides media access control and performs error detection. it fragments data packets nto the MTU size, 1. It monitors the Layer 2 communication by building @ MAC address table. Ett accepts Layer 2 packets and encapeulates them into frames. 29. Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary? A. The use of Gigabit Ethemet speeds The virtually unlimited availabilty of IPv6 addresses ©. These of ful-duplex capable Layer 2 switches . The use of CSMA/CA The development of half-duplex switch operation

You might also like