0 ratings0% found this document useful (0 votes) 45 views8 pagesSolved Questions For Data Link Part2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
1. What is another name for the OSI data link layer?
A Layer
B.Layer2
© Layers
DiLayer 6
2. The IEEE 802 LAN/MAN data link layer consists of which two sublayers? (Choose two.)
[A Network Control Protocol
B. Logical Link Control
. Media Access Control
.Link Control Protocol
3. What is the responsibility of the MAC sublayer?,
A. Adds Layer 3 addresses tothe frame
8B. Communicates with the network layer (Layer 3)
©. Provides the method to get the frame on and off the media,
D. Transmits the bits on the media,
4, What Layer 2 function does a router perform? (Choose three.)
'A. Accepts a frame from a medium
B, De-encapsulates the frame
Refers to its Layer 3 routing table for a matching destination network
D.Re-encapsulates the packet into a new frame5. The media access control method used depends on which two criteria?
A Layer 3 IP protocol
B. Media sharing
©. Topology
D. Transport layer protocol
6. Which organization defines standards for the network access layer (Le., the OSI physical
and data link layers)?
Cisco
B.IANA
IEEE
D.tETe
7. Which topology displays networking device layer IP addresses?
‘A. Aerial topology
8. IP address topology
©. Logical topology
.Physical topology
8, What kind of network would use point-to-point, hub and spoke, or mesh topologies?
A PAN
B.LAN
WLAN
WAN9. Which LAN topology is a hybrid topology?
Abus
B. Extended star
cing
star
10. Which duplex communication method is used in WLANs?
| Fullduplex
8. Half-duplex
simplex
111. Which media access control method is used in legacy Ethernet LANs?
‘A Carter sense muftiple access/colision annoyance
8. Carrier sense multiple access/colision avoidance
©. Carrier sense mutiple access/colision destruction
. Cartier sense multiple access/collision detection
112. What does the data link layer add to a Layer 3 packet to create a frame? (Choose two.)
A Flags
B. Sequence number
©. Header
b. Trail113. What is the function ofthe last field in a data link layer frame?
[A To determine whether the frame experienced transmission errors
8. To identity special ow control services such as quality of service (208)
©. To identity the begining and end init ofthe frame
.To identity the Layer 3 protocol inthe data ld
114, Which lists the Layer 2 and Layer 3 address fields in the correct order?
A. Destination NIC address, source NIC adress, source IP adress, destination IP address
8. Source NC address, destination NIC adress, source IP adress, destination IP adress
€. Destination NC adress, source NIC address destination IP adress, source IP adress
Source NIC address, destination NIC address, destination IP address, source IP adress
15, Which of the following are data link layer protocols? (Choose three)
a.g02.11
B.ethemet
cur,
D.PPP.
upp,
16. What identifier Is used atthe data link layer to uniquely identify an Ethernet device?
‘A. UDP port number
8B. Sequence number
Mac address
D.iPaddress
TOP port number17. What atribute of a NIC would place it atthe data link ayer of the OSI model?
ARMS port
B.P aceress
attached Ethernet cable
D.MAC adress
E-TOPIIP protocol stack
18. Which two engineering organizations define open standards and protocols that apply to
the data link layer? (Choose two.)
‘A Internet Society (ISOC)
£8. Intemational Telecorsmunication Union (ITU)
Intute of Electrical and Electrons Engineers (IEEE)
D.Electonic Industries Alliance (EIA)
E intemet Assigned Numbers Authority (IANA)
19, What is true concerning physical and logical topologies?
‘A. Physical topologies display the P addressing scheme of each network.
8. Physical topologies are concemed with how a network tansfrs frames
©. The logical topology is always the same asthe physical topology.
. Logical topologies refer to how a network transfers data between devices.
20. What method is used to manage contention-based access on a wireless network?
A.csmarco
8. Token passing
c.csMaica
©. Priority ordering21. A technician has been asked to develop a physical topology for a network that provides
2a high level of redundancy. Which physical topology requires that every node is attached to
‘every other node on the network?
A.Mesh
8. star
c.bus
. Hierarchical
E Ring
22, Which statement describes the half-duplex mode of data transmission?
‘A Date that i transmitted over the network flows in one direction to many diferent destinations
simultaneously,
£2, Data that ie transmitted over the network flows in one direction ata time.
. Data that is transmitted over the network fous in both directions atthe same time.
. Data that is tranemitted over the network can only flow in one drction.
23, Which isa funetion of the Logical Link Control (LLC) sublayer?
‘A To provide data lnk layer aderessing
8B. To identity which network layer protocol ie being used
To define the media access processes that ae performed by the hardware
To accept segments and package them nto data units that are called packets
24, Which data link layer media access control method does Ethernet use with legacy
Ethernet hubs?
A.csmavco
8 Token passing
Turn taking
Determinism25. What are the two sublayers of the OSI model data link layer? (Choose two.)
A Internet
BLL
©. Transport
D.Physical
EMAC
26. Which layer of the OSI model is responsible for specifying the encapsulation method
used for specific types of media?
1 Application
8. Physical
C. Transport
D. Datalink
27. What type of physical topology can be created by connecting all Ethernet cables to a
central device?
ARing
B Mesh
star
.Bus
28. What are two services performed by the data link layer of the OSI model? (Choose two.)
‘Att determines the path to forward packets.
B. It provides media access control and performs error detection.
it fragments data packets nto the MTU size,
1. It monitors the Layer 2 communication by building @ MAC address table.
Ett accepts Layer 2 packets and encapeulates them into frames.29. Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?
A. The use of Gigabit Ethemet speeds
The virtually unlimited availabilty of IPv6 addresses
©. These of ful-duplex capable Layer 2 switches
. The use of CSMA/CA
The development of half-duplex switch operation