Home Subjects Networking

Networking

OSI, TCP/IP, protocols, routing, security

100 Q 1 Topics Take Test
Advertisement
Difficulty: All Easy Medium Hard 61–70 of 100
Topics in Networking
All OSI Model 100
Q.61 Easy OSI Model
Which layer of the OSI model is responsible for routing packets across different networks?
A Network Layer (Layer 3)
B Data Link Layer (Layer 2)
C Transport Layer (Layer 4)
D Application Layer (Layer 7)
Correct Answer:  A. Network Layer (Layer 3)
EXPLANATION

The Network Layer (Layer 3) handles routing, IP addressing, and logical addressing to forward packets across different networks using routers.

Take Test
Q.62 Hard OSI Model
In analyzing a network protocol stack, an engineer observes that data undergoes multiple transformations at different OSI layers before transmission. Which sequence correctly represents these transformations?
A Data → Segments → Packets → Frames → Bits
B Data → Packets → Segments → Frames → Bits
C Bits → Frames → Packets → Segments → Data
D Data → Frames → Packets → Segments → Bits
Correct Answer:  A. Data → Segments → Packets → Frames → Bits
EXPLANATION

The correct sequence during encapsulation is: Layer 7 (Data) → Layer 4 (Segments) → Layer 3 (Packets) → Layer 2 (Frames) → Layer 1 (Bits).

Take Test
Q.63 Hard OSI Model
A financial institution requires compliance with data protection regulations that mandate end-to-end encryption. At which OSI layer(s) should encryption be implemented to ensure comprehensive protection while maintaining optimal performance?
A Layer 1 only; encrypt all physical signals
B Layer 2 only; encrypt all frames
C Layers 6-7 for end-to-end encryption, with optional Layer 2 for link-level encryption
D Layer 4 only; encrypt all transport layer data
Correct Answer:  C. Layers 6-7 for end-to-end encryption, with optional Layer 2 for link-level encryption
EXPLANATION

End-to-end encryption is best implemented at Layer 6-7 (Presentation/Application) to ensure data remains encrypted from source to destination. Additional Layer 2 encryption protects link-level transmission.

Take Test
Q.64 Hard OSI Model
A security researcher discovers that malware on an infected system is manipulating ARP (Address Resolution Protocol) responses. At which OSI layer does this attack occur, and what is its impact on network communication?
A Layer 1; causes physical signal degradation
B Layer 2; enables MAC spoofing and man-in-the-middle attacks by mapping IP addresses to incorrect MAC addresses
C Layer 3; disrupts IP routing tables
D Layer 4; blocks port-based filtering
Correct Answer:  B. Layer 2; enables MAC spoofing and man-in-the-middle attacks by mapping IP addresses to incorrect MAC addresses
EXPLANATION

ARP operates at Layer 2 (Data Link Layer). ARP spoofing maps IP addresses to attacker-controlled MAC addresses, enabling man-in-the-middle attacks and traffic redirection.

Take Test
Q.65 Hard OSI Model
During a network migration, an organization must maintain service continuity while transitioning from IPv4 to IPv6. At which OSI layer would the primary compatibility challenges arise, and what approach would address them?
A Layer 2; requires replacing all switches
B Layer 3; may require dual-stack implementation or tunneling protocols
C Layer 4; TCP and UDP must be completely rewritten
D Layer 7; all applications must be redesigned
Correct Answer:  B. Layer 3; may require dual-stack implementation or tunneling protocols
EXPLANATION

IPv4 and IPv6 operate at Layer 3 (Network Layer). Dual-stack (running both simultaneously) or tunneling (encapsulating IPv6 in IPv4) addresses compatibility during migration.

Take Test
Q.66 Hard OSI Model
A cloud service provider implements a middleware solution that monitors and optimizes traffic based on application type and user behavior. This solution operates across multiple OSI layers. Which layers would be primarily involved, and why?
A Layers 1-2 for physical optimization
B Layers 3-5 for routing and session management
C Layers 4-7 for understanding traffic patterns and optimizing based on application requirements
D Layer 7 exclusively for application-level optimization
Correct Answer:  C. Layers 4-7 for understanding traffic patterns and optimizing based on application requirements
EXPLANATION

Effective traffic optimization requires understanding at Layer 4 (TCP/UDP characteristics), Layer 5 (session management), and Layer 7 (application protocols and patterns) to make informed decisions.

Take Test
Q.67 Hard OSI Model
A network experiences frame corruption on a specific link. Which OSI layer mechanism would detect this error, and what would typically happen to the corrupted frame?
A Layer 1 detects it; the frame is automatically retransmitted
B Layer 2 detects it using CRC; the frame is typically discarded
C Layer 3 detects it using checksums; routing is adjusted
D Layer 4 detects it and initiates connection reset
Correct Answer:  B. Layer 2 detects it using CRC; the frame is typically discarded
EXPLANATION

The Data Link Layer (Layer 2) uses CRC (Cyclic Redundancy Check) to detect frame corruption. Corrupted frames are discarded; higher layers handle retransmission if necessary.

Take Test
Q.68 Medium OSI Model
In a scenario where a web server receives requests from multiple clients simultaneously, at which OSI layer would connection management and multiplexing be handled to ensure proper session isolation?
A Layer 3 - Network Layer
B Layer 4 - Transport Layer
C Layer 5 - Session Layer
D Layer 7 - Application Layer
Correct Answer:  B. Layer 4 - Transport Layer
EXPLANATION

The Transport Layer (Layer 4) uses port numbers to manage multiple simultaneous connections and ensures proper multiplexing and demultiplexing of data streams.

Take Test
Q.69 Medium OSI Model
A packet sniffer tool captures data at Layer 2. Which information would be visible in the captured frames?
A IP addresses and port numbers
B MAC addresses and frame structure
C Application-level data and HTTP headers
D DNS queries and domain names
Correct Answer:  B. MAC addresses and frame structure
EXPLANATION

Layer 2 (Data Link Layer) operates with MAC addresses and frames. IP addresses (Layer 3) and application data (Layer 7) would not be directly visible at Layer 2 without further analysis.

Take Test
Q.70 Medium OSI Model
Which of the following statements correctly describes the role of the Session Layer (Layer 5) in the OSI model?
A It handles physical transmission of data over network media
B It manages conversations between applications, including establishing, maintaining, and terminating sessions
C It converts data into appropriate formats for different operating systems
D It performs routing and logical addressing of data packets
Correct Answer:  B. It manages conversations between applications, including establishing, maintaining, and terminating sessions
EXPLANATION

The Session Layer (Layer 5) manages dialogues between applications, handling session establishment, maintenance, synchronization, and termination.

Take Test
IGET
iget AI
Online · Ask anything about exams
Hi! 👋 I'm your iget AI assistant.

Ask me anything about exam prep, MCQ solutions, study tips, or strategies! 🎯
UPSC strategy SSC CGL syllabus Improve aptitude NEET Biology tips