Networking
OSI, TCP/IP, protocols, routing, security
45 Questions 10 Topics Take Test
Advertisement
Showing 31–40 of 45 questions
Q.31 Medium OSI Model
A packet sniffer tool captures data at Layer 2. Which information would be visible in the captured frames?
A IP addresses and port numbers
B MAC addresses and frame structure
C Application-level data and HTTP headers
D DNS queries and domain names
Correct Answer:  B. MAC addresses and frame structure
EXPLANATION

Layer 2 (Data Link Layer) operates with MAC addresses and frames. IP addresses (Layer 3) and application data (Layer 7) would not be directly visible at Layer 2 without further analysis.

Take Test
Q.32 Medium OSI Model
Which of the following statements correctly describes the role of the Session Layer (Layer 5) in the OSI model?
A It handles physical transmission of data over network media
B It manages conversations between applications, including establishing, maintaining, and terminating sessions
C It converts data into appropriate formats for different operating systems
D It performs routing and logical addressing of data packets
Correct Answer:  B. It manages conversations between applications, including establishing, maintaining, and terminating sessions
EXPLANATION

The Session Layer (Layer 5) manages dialogues between applications, handling session establishment, maintenance, synchronization, and termination.

Take Test
Q.33 Medium OSI Model
A manufacturing facility's IoT devices communicate using raw bit transmission over twisted pair cables. Which OSI layer(s) are being utilized?
A Layers 1 and 2
B Layer 1 only
C Layers 2 and 3
D Layers 3, 4, and 5
Correct Answer:  A. Layers 1 and 2
EXPLANATION

Raw bit transmission over physical media (twisted pair cables) involves Layer 1 (Physical Layer). Data Link Layer (Layer 2) protocols handle the framing and transmission rules for these bits.

Take Test
Q.34 Medium OSI Model
In a corporate network, certain applications require guaranteed delivery and error checking, while others prioritize speed. Which Layer 4 protocols would best serve these requirements respectively?
A TCP for speed; UDP for guaranteed delivery
B UDP for both; TCP for neither
C TCP for guaranteed delivery; UDP for speed
D Both TCP and UDP provide identical services
Correct Answer:  C. TCP for guaranteed delivery; UDP for speed
EXPLANATION

TCP provides reliable, ordered delivery with error checking; UDP prioritizes speed with minimal overhead. Choice of protocol depends on application requirements.

Take Test
Q.35 Medium OSI Model
A network administrator needs to implement a solution to prevent unauthorized access to sensitive data transmitted over the network. Which OSI layer would be most appropriate for implementing encryption?
A Layer 2 - Data Link Layer
B Layer 4 - Transport Layer
C Layer 6 - Presentation Layer
D Layer 7 - Application Layer
Correct Answer:  C. Layer 6 - Presentation Layer
EXPLANATION

The Presentation Layer (Layer 6) is responsible for data encryption, decryption, compression, and translation, making it the appropriate layer for implementing encryption services.

Take Test
Q.36 Medium OSI Model
What is the relationship between the TCP/IP model and the OSI model in terms of functionality?
A They are completely independent and serve different purposes
B The TCP/IP model's Application Layer encompasses OSI Layers 5, 6, and 7
C The TCP/IP model is a replacement that performs identically to the OSI model
D The TCP/IP model operates only at Layers 1-3 of the OSI model
Correct Answer:  B. The TCP/IP model's Application Layer encompasses OSI Layers 5, 6, and 7
EXPLANATION

The TCP/IP model's Application Layer combines the functionality of OSI Layers 5 (Session), 6 (Presentation), and 7 (Application).

Take Test
Q.37 Medium OSI Model
During a network audit, it is discovered that HTTP traffic is being intercepted and modified. At which minimum OSI layer would a device need to operate to perform this attack?
A Layer 3 - Network Layer
B Layer 4 - Transport Layer
C Layer 5 - Session Layer
D Layer 7 - Application Layer
Correct Answer:  D. Layer 7 - Application Layer
EXPLANATION

HTTP is an Application Layer (Layer 7) protocol. To intercept and modify HTTP traffic, an attacker must operate at Layer 7 where the actual content is accessible.

Take Test
Q.38 Medium OSI Model
A company experiences intermittent network connectivity issues. When troubleshooting, an administrator discovers that the issue occurs only when data passes through a specific gateway. At which OSI layer(s) should the administrator focus their investigation?
A Layers 1 and 2 only
B Layers 3 and 4 primarily, with possible involvement of Layer 7
C Layer 2 only
D Layer 1 only
Correct Answer:  B. Layers 3 and 4 primarily, with possible involvement of Layer 7
EXPLANATION

A gateway typically operates at Layer 3 (routing) and Layer 4 (protocol conversion), and may involve Layer 7 for application-level filtering. Issues at the gateway level suggest Layer 3-4 problems.

Take Test
Q.39 Medium OSI Model
Which of the following scenarios requires Layer 7 (Application Layer) involvement?
A Converting binary data to decimal format
B Establishing a secure HTTPS connection to a website
C Assigning IP addresses to devices
D Creating physical connections using Ethernet cables
Correct Answer:  B. Establishing a secure HTTPS connection to a website
EXPLANATION

HTTPS (web browsing) is an Application Layer protocol. A, C, and D belong to Presentation, Network, and Physical layers respectively.

Take Test
Q.40 Medium OSI Model
A packet arrives at a router with a damaged frame header. At which OSI layer should this be detected?
A Physical Layer
B Data Link Layer
C Network Layer
D Transport Layer
Correct Answer:  B. Data Link Layer
EXPLANATION

The Data Link Layer (Layer 2) uses CRC (Cyclic Redundancy Check) to detect frame errors and corruption in the frame header.

Take Test
IGET
iget AI
Online · Ask anything about exams
Hi! 👋 I'm your iget AI assistant.

Ask me anything about exam prep, MCQ solutions, study tips, or strategies! 🎯
UPSC strategy SSC CGL syllabus Improve aptitude NEET Biology tips