The document contains a series of questions and answers related to networking concepts, particularly focusing on the OSI model and network communication types. Key topics include multicast communication, the responsibilities of the Network Layer, intranet usage, and 2-factor authentication methods. It also addresses routing protocols and algorithms, emphasizing the importance of logical addressing and path determination in network management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
19 views4 pages
3-Network Layer MCQ
The document contains a series of questions and answers related to networking concepts, particularly focusing on the OSI model and network communication types. Key topics include multicast communication, the responsibilities of the Network Layer, intranet usage, and 2-factor authentication methods. It also addresses routing protocols and algorithms, emphasizing the importance of logical addressing and path determination in network management.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
1.
What type of communication will send a message to a group on a local area
network? a. Broadcast b. Multicast c. Unicast d. Anycast Answer: b. Multicast (Explanation: Multicast sends a message to a specific group of devices, whereas broadcast sends to all devices on the network.) 2. Which OSI layer is responsible for managing source and destination logical addressing? a. Physical Layer b. Data Link Layer c. Network Layer d. Application Layer Answer: c. Network Layer 3. Which OSI layer is responsible for logical addressing? a. Physical Layer b. Data Link Layer c. Network Layer d. Transport Layer Answer: c. Network Layer 4. An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? a. An intranet b. The Internet c. An extranet d. A local area network Answer: a. An intranet (Explanation: An intranet is a private network accessible only to an organization’s employees, ideal for internal data like pricing information.) 5. Which configuration mode allows a user to configure a Cisco device so that the configuration impacts the entire device rather than a particular port, interface, or mode? a. Global Configuration mode b. Interface Configuration mode c. User EXEC mode d. Privileged EXEC mode Answer: a. Global Configuration mode 6. A network administrator is upgrading a small business network to give high priority to real-time applications traffic. What two types of network services is the network administrator trying to accommodate? a. Voice, video b. Instant messaging c. FTP d. SNMP Answer: a. Voice, video (Explanation: Real-time applications like voice (e.g., VoIP) and video require high priority due to low latency needs.) 7. The Company Sun System and Consultants has a private network which is only accessed and utilized only by their company's employees, this network is called, a. The Broadband b. The intranet c. The WWW d. The Extranet Answer: b. The intranet 8. In order to protect their network from network-based attacks, the security administrator suggests using a combination of 2-factor authentication at least. What might be that combination for 'what you have' and 'what you are' type authentication? a. Cards and Fingerprints b. Password and PIN c. Cash and Voice command d. ID card and Dress Answer: a. Cards and Fingerprints (Explanation: 'What you have' = card; 'What you are' = biometric like fingerprints.) 9. What routing protocol do you need to use if PC-A has IP address 172.16.12.10/25 and PC-B has IP Address 192.168.10.12/25 and both are connected to the Router RTR0501? a. We have to use a static routing b. We don’t need any routing protocol c. We use RIP V2 d. We can use BGP Routing Answer: a. We have to use a static routing (Explanation: The PCs are on different subnets (172.16.12.0/25 and 192.168.10.0/25), requiring routing. Static routing is simplest for a small setup with one router.) 10. In order to protect their network from network-based attacks, the security administrator suggests using a combination of 2-factor authentication at least. What might be that combination for 'what you have' and 'what you are' type authentication? a. Cards and Fingerprints b. Password and PIN c. Cash and Voice command d. ID card and Dress Answer: a. Cards and Fingerprints (Note: This is a repeat of Q8 with identical options and context.) 11. What is the primary function of the Network Layer in the OSI model? a. To provide error detection and correction b. To route packets across different networks c. To manage end-to-end communication d. To format data for presentation Answer: b. To route packets across different networks 12. In the Network Layer, data is transmitted in the form of: a. Frames b. Bits c. Packets d. Segments Answer: c. Packets 13. Which protocol is primarily associated with the Network Layer? a. TCP b. UDP c. IP d. HTTP Answer: c. IP 14. Which layer of the OSI model is directly above the Network Layer? a. Data Link Layer b. Transport Layer c. Application Layer d. Session Layer Answer: b. Transport Layer 15. What does the term "logical addressing" refer to in the context of the Network Layer? a. Physical addresses used to identify devices on a local network b. IP addresses used to identify devices across networks c. MAC addresses used for data link layer communication d. None of the above Answer: b. IP addresses used to identify devices across networks 16. In which scenario would you primarily use the Network Layer? a. When two applications on different hosts need to communicate directly b. When sending bits over a physical medium c. When routing data from one network to another d. When establishing a session between two applications Answer: c. When routing data from one network to another 17. What is one of the key responsibilities of the Network Layer regarding packet delivery? a. Ensuring that packets are delivered in order b. MAC addresses used for data link layer communication c. Determining the best path for packet delivery d. Encrypting packet data for security Answer: c. Determining the best path for packet delivery 18. Which of the following is NOT a routing protocol? a. RIP b. OSPF c. EIGRP d. TCP Answer: d. TCP (Explanation: TCP is a Transport Layer protocol, not a routing protocol.) 19. Which of the following routing algorithms uses hop count as a metric? a. OSPF b. RIP c. BGP d. EIGRP Answer: b. RIP 20. What is the primary responsibility of the Network Layer in the OSI model? a. Reliable data transmission b. Path determination and logical addressing c. Error-free delivery of frames d. Physical transmission of data Answer: b. Path determination and logical addressing