0% found this document useful (0 votes)
19 views4 pages

3-Network Layer MCQ

The document contains a series of questions and answers related to networking concepts, particularly focusing on the OSI model and network communication types. Key topics include multicast communication, the responsibilities of the Network Layer, intranet usage, and 2-factor authentication methods. It also addresses routing protocols and algorithms, emphasizing the importance of logical addressing and path determination in network management.

Uploaded by

Suresh Khadka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

3-Network Layer MCQ

The document contains a series of questions and answers related to networking concepts, particularly focusing on the OSI model and network communication types. Key topics include multicast communication, the responsibilities of the Network Layer, intranet usage, and 2-factor authentication methods. It also addresses routing protocols and algorithms, emphasizing the importance of logical addressing and path determination in network management.

Uploaded by

Suresh Khadka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

What type of communication will send a message to a group on a local area


network?
a. Broadcast
b. Multicast
c. Unicast
d. Anycast
Answer: b. Multicast
(Explanation: Multicast sends a message to a specific group of devices, whereas
broadcast sends to all devices on the network.)
2. Which OSI layer is responsible for managing source and destination logical
addressing?
a. Physical Layer
b. Data Link Layer
c. Network Layer
d. Application Layer
Answer: c. Network Layer
3. Which OSI layer is responsible for logical addressing?
a. Physical Layer
b. Data Link Layer
c. Network Layer
d. Transport Layer
Answer: c. Network Layer
4. An employee at a branch office is creating a quote for a customer. In order to
do this, the employee needs to access confidential pricing information from
internal servers at the Head Office. What type of network would the
employee access?
a. An intranet
b. The Internet
c. An extranet
d. A local area network
Answer: a. An intranet
(Explanation: An intranet is a private network accessible only to an
organization’s employees, ideal for internal data like pricing information.)
5. Which configuration mode allows a user to configure a Cisco device so that
the configuration impacts the entire device rather than a particular port,
interface, or mode?
a. Global Configuration mode
b. Interface Configuration mode
c. User EXEC mode
d. Privileged EXEC mode
Answer: a. Global Configuration mode
6. A network administrator is upgrading a small business network to give high
priority to real-time applications traffic. What two types of network services
is the network administrator trying to accommodate?
a. Voice, video
b. Instant messaging
c. FTP
d. SNMP
Answer: a. Voice, video
(Explanation: Real-time applications like voice (e.g., VoIP) and video require
high priority due to low latency needs.)
7. The Company Sun System and Consultants has a private network which is
only accessed and utilized only by their company's employees, this network is
called,
a. The Broadband
b. The intranet
c. The WWW
d. The Extranet
Answer: b. The intranet
8. In order to protect their network from network-based attacks, the security
administrator suggests using a combination of 2-factor authentication at
least. What might be that combination for 'what you have' and 'what you are'
type authentication?
a. Cards and Fingerprints
b. Password and PIN
c. Cash and Voice command
d. ID card and Dress
Answer: a. Cards and Fingerprints
(Explanation: 'What you have' = card; 'What you are' = biometric like
fingerprints.)
9. What routing protocol do you need to use if PC-A has IP address
172.16.12.10/25 and PC-B has IP Address 192.168.10.12/25 and both are
connected to the Router RTR0501?
a. We have to use a static routing
b. We don’t need any routing protocol
c. We use RIP V2
d. We can use BGP Routing
Answer: a. We have to use a static routing
(Explanation: The PCs are on different subnets (172.16.12.0/25 and
192.168.10.0/25), requiring routing. Static routing is simplest for a small setup
with one router.)
10. In order to protect their network from network-based attacks, the security
administrator suggests using a combination of 2-factor authentication at
least. What might be that combination for 'what you have' and 'what you are'
type authentication?
a. Cards and Fingerprints
b. Password and PIN
c. Cash and Voice command
d. ID card and Dress
Answer: a. Cards and Fingerprints
(Note: This is a repeat of Q8 with identical options and context.)
11. What is the primary function of the Network Layer in the OSI model?
a. To provide error detection and correction
b. To route packets across different networks
c. To manage end-to-end communication
d. To format data for presentation
Answer: b. To route packets across different networks
12. In the Network Layer, data is transmitted in the form of:
a. Frames
b. Bits
c. Packets
d. Segments
Answer: c. Packets
13. Which protocol is primarily associated with the Network Layer?
a. TCP
b. UDP
c. IP
d. HTTP
Answer: c. IP
14. Which layer of the OSI model is directly above the Network Layer?
a. Data Link Layer
b. Transport Layer
c. Application Layer
d. Session Layer
Answer: b. Transport Layer
15. What does the term "logical addressing" refer to in the context of the
Network Layer?
a. Physical addresses used to identify devices on a local network
b. IP addresses used to identify devices across networks
c. MAC addresses used for data link layer communication
d. None of the above
Answer: b. IP addresses used to identify devices across networks
16. In which scenario would you primarily use the Network Layer?
a. When two applications on different hosts need to communicate directly
b. When sending bits over a physical medium
c. When routing data from one network to another
d. When establishing a session between two applications
Answer: c. When routing data from one network to another
17. What is one of the key responsibilities of the Network Layer regarding packet
delivery?
a. Ensuring that packets are delivered in order
b. MAC addresses used for data link layer communication
c. Determining the best path for packet delivery
d. Encrypting packet data for security
Answer: c. Determining the best path for packet delivery
18. Which of the following is NOT a routing protocol?
a. RIP
b. OSPF
c. EIGRP
d. TCP
Answer: d. TCP
(Explanation: TCP is a Transport Layer protocol, not a routing protocol.)
19. Which of the following routing algorithms uses hop count as a metric?
a. OSPF
b. RIP
c. BGP
d. EIGRP
Answer: b. RIP
20. What is the primary responsibility of the Network Layer in the OSI model?
a. Reliable data transmission
b. Path determination and logical addressing
c. Error-free delivery of frames
d. Physical transmission of data
Answer: b. Path determination and logical addressing

You might also like