Networking
OSI, TCP/IP, protocols, routing, security
29 Questions 10 Topics Take Test
Advertisement
Showing 1–10 of 29 questions
Q.1 Hard OSI Model
Consider a scenario where a company implements a network segmentation strategy using VLANs to isolate sensitive financial data. An employee in the accounting department cannot access a server despite having proper credentials. The network switch shows the correct VLAN assignment. At which layer is the inter-VLAN routing issue most likely to occur, and what fundamental OSI principle is being tested?
A Layer 2 - VLAN tagging allows switches to segment traffic at the data link layer, but inter-VLAN communication requires a Layer 3 device
B Layer 3 - The router must have routes configured between VLANs, demonstrating that network layer must work across boundaries
C Layer 4 - Transport layer protocols must establish connections before VLAN segmentation takes effect
D Layer 5 - Session layer encryption policies prevent VLAN-to-VLAN communication
Correct Answer:  B. Layer 3 - The router must have routes configured between VLANs, demonstrating that network layer must work across boundaries
EXPLANATION

VLANs operate at Layer 2 (Data Link) to segment ports logically, but inter-VLAN communication requires Layer 3 (Network Layer) routing. A router or Layer 3 switch must have routes configured between different VLANs with appropriate subnet masks and routing table entries. This tests the understanding that Layer 2 segmentation requires Layer 3 routing for cross-segment communication, a critical concept in modern network design.

Take Test
Q.2 Hard OSI Model
A network service requires authentication, encryption, and session management. These functions span across which OSI layers?
A Layers 4, 5, and 6
B Layers 5, 6, and 7
C Layers 2, 3, and 4
D Layers 6 and 7 only
Correct Answer:  B. Layers 5, 6, and 7
EXPLANATION

Authentication and encryption are Presentation Layer (6) functions, while session management is a Session Layer (5) function. Application Layer (7) coordinates these.

Take Test
Q.3 Hard OSI Model
In a complex network troubleshooting scenario, packets are being dropped at high rates despite connectivity. Which combination of layers should be investigated?
A Layers 1 and 2 only
B Layers 2, 3, and 4
C Layers 5, 6, and 7
D All layers from 1 to 7
Correct Answer:  B. Layers 2, 3, and 4
EXPLANATION

Packet drops can occur due to congestion (Layer 4), routing issues (Layer 3), or hardware problems (Layer 2). Investigation should span these layers.

Take Test
Q.4 Hard OSI Model
Which of the following is NOT a function of the Network Layer in the OSI model?
A IP addressing
B Routing
C MAC address resolution
D Logical addressing
Correct Answer:  C. MAC address resolution
EXPLANATION

MAC address resolution (ARP) is a Data Link Layer function. The Network Layer handles IP addressing, routing, and logical addressing.

Take Test
Q.5 Hard OSI Model
Consider a scenario where VoIP quality degrades due to excessive latency. Which of the following OSI layer mechanisms would BEST address this issue?
A Implementing error correction at Layer 2
B Optimizing routing algorithms at Layer 3
C Implementing priority queuing at Layer 4
D Increasing bandwidth at Layer 1
Correct Answer:  C. Implementing priority queuing at Layer 4
EXPLANATION

Priority queuing at the Transport Layer can prioritize VoIP packets, reducing latency. This is a QoS mechanism at Layer 4.

Take Test
Advertisement
Q.6 Hard OSI Model
In a scenario where a network admin needs to monitor traffic patterns and identify applications consuming bandwidth, at which layer should deep packet inspection (DPI) be implemented?
A Network Layer
B Data Link Layer
C Application Layer
D Transport Layer
Correct Answer:  C. Application Layer
EXPLANATION

DPI analyzes application-level data, which requires inspection at the Application Layer (Layer 7) to identify specific applications.

Take Test
Q.7 Hard OSI Model
In comparing network communication across OSI layers, which statement is most accurate regarding the concept of 'encapsulation'?
A Each layer adds its own header/footer, creating nested data structures as it moves down the layers
B Encapsulation only occurs at the Application Layer
C Encapsulation prevents data from being transmitted
D Only the Physical Layer performs encapsulation
Correct Answer:  A. Each layer adds its own header/footer, creating nested data structures as it moves down the layers
EXPLANATION

Encapsulation is the fundamental concept where each OSI layer wraps data from the layer above it with its own headers/footers. This creates nested structures: Data → Segments → Packets → Frames → Bits.

Take Test
Q.8 Hard OSI Model
A company implements QoS (Quality of Service) mechanisms for video streaming. At which OSI layer should QoS prioritization be primarily implemented for optimal results?
A Layer 6 - Presentation Layer
B Layer 4 - Transport Layer and Layer 3 - Network Layer
C Layer 2 - Data Link Layer only
D Layer 7 - Application Layer only
Correct Answer:  B. Layer 4 - Transport Layer and Layer 3 - Network Layer
EXPLANATION

QoS is implemented across both Layer 3 (IP precedence, DSCP) and Layer 4 (TCP/UDP port-based prioritization). This multi-layer approach ensures effective traffic prioritization for video streaming.

Take Test
Q.9 Hard OSI Model
A network engineer implements a VPN (Virtual Private Network) to secure data transmission. At which OSI layer(s) does VPN encryption primarily operate?
A Only at Layer 4
B Only at Layer 6
C Primarily between Layers 3 and 4, with aspects at Layer 6
D Only at Layer 2
Correct Answer:  C. Primarily between Layers 3 and 4, with aspects at Layer 6
EXPLANATION

VPN encryption operates across multiple layers. IPSec-based VPNs work at Layer 3, SSL/TLS-based VPNs at Layer 6-7. The encryption and tunneling create a secure overlay across network and higher layers.

Take Test
Q.10 Hard OSI Model
A security incident reveals that an attacker exploited a vulnerability at Layer 5 (Session Layer). Which attack vector most likely matches this layer?
A IP spoofing
B Session hijacking
C DNS poisoning
D SSL downgrade attack
Correct Answer:  B. Session hijacking
EXPLANATION

Session hijacking targets the Session Layer (Layer 5) by intercepting and taking control of established sessions between applications.

Take Test
IGET
iget AI
Online · Ask anything about exams
Hi! 👋 I'm your iget AI assistant.

Ask me anything about exam prep, MCQ solutions, study tips, or strategies! 🎯
UPSC strategy SSC CGL syllabus Improve aptitude NEET Biology tips