Networking
Aptitude · Reasoning · English · CS — Corporate & Campus Interview Prep
29 Questions 10 Topics Take Test
Advertisement
Showing 11–20 of 29 questions
Q.11 Hard OSI Model
A security researcher discovers that malware on an infected system is manipulating ARP (Address Resolution Protocol) responses. At which OSI layer does this attack occur, and what is its impact on network communication?
A Layer 1; causes physical signal degradation
B Layer 2; enables MAC spoofing and man-in-the-middle attacks by mapping IP addresses to incorrect MAC addresses
C Layer 3; disrupts IP routing tables
D Layer 4; blocks port-based filtering
Correct Answer:  B. Layer 2; enables MAC spoofing and man-in-the-middle attacks by mapping IP addresses to incorrect MAC addresses
Explanation:

ARP operates at Layer 2 (Data Link Layer). ARP spoofing maps IP addresses to attacker-controlled MAC addresses, enabling man-in-the-middle attacks and traffic redirection.

Take Test
Q.12 Hard OSI Model
A financial institution requires compliance with data protection regulations that mandate end-to-end encryption. At which OSI layer(s) should encryption be implemented to ensure comprehensive protection while maintaining optimal performance?
A Layer 1 only; encrypt all physical signals
B Layer 2 only; encrypt all frames
C Layers 6-7 for end-to-end encryption, with optional Layer 2 for link-level encryption
D Layer 4 only; encrypt all transport layer data
Correct Answer:  C. Layers 6-7 for end-to-end encryption, with optional Layer 2 for link-level encryption
Explanation:

End-to-end encryption is best implemented at Layer 6-7 (Presentation/Application) to ensure data remains encrypted from source to destination. Additional Layer 2 encryption protects link-level transmission.

Take Test
Q.13 Hard OSI Model
In analyzing a network protocol stack, an engineer observes that data undergoes multiple transformations at different OSI layers before transmission. Which sequence correctly represents these transformations?
A Data → Segments → Packets → Frames → Bits
B Data → Packets → Segments → Frames → Bits
C Bits → Frames → Packets → Segments → Data
D Data → Frames → Packets → Segments → Bits
Correct Answer:  A. Data → Segments → Packets → Frames → Bits
Explanation:

The correct sequence during encapsulation is: Layer 7 (Data) → Layer 4 (Segments) → Layer 3 (Packets) → Layer 2 (Frames) → Layer 1 (Bits).

Take Test
Q.14 Hard OSI Model
A network protocol analyzer shows that frames are arriving at a computer but being dropped at the Network Layer. What is the most likely cause?
A Physical cable disconnection
B Incorrect IP address or routing table entry
C MAC address table overflow
D Application software crash
Correct Answer:  B. Incorrect IP address or routing table entry
Explanation:

If frames arrive at Layer 2 but are dropped at Layer 3, the issue involves IP addressing, routing tables, or network configuration at the Network Layer.

Take Test
Q.15 Hard OSI Model
An organization implements network segmentation using VLANs. At which OSI layer does VLAN tagging primarily operate, and which layer processes these tags?
A Layer 4; Layer 3
B Layer 2; Layer 2
C Layer 3; Layer 4
D Layer 1; Layer 2
Correct Answer:  B. Layer 2; Layer 2
Explanation:

VLAN tagging operates at Layer 2 (Data Link Layer) using 802.1Q tags, and switches process these tags at Layer 2 to isolate traffic.

Take Test
Advertisement
Q.16 Hard OSI Model
Consider a scenario where SSL/TLS encryption is implemented. At which OSI layer is the encryption applied, and through which layer does encrypted traffic pass without modification?
A Layer 4; Layers 1-3
B Layer 6; Layers 1-5
C Layer 7; Layers 1-6
D Layers 4-6; Layer 7 only
Correct Answer:  C. Layer 7; Layers 1-6
Explanation:

SSL/TLS operates at Layer 7 (Application Layer), encrypting application data. Lower layers (1-6) transparently carry encrypted data without understanding its content.

Take Test
Q.17 Hard OSI Model
In a load-balancing scenario, traffic is distributed across multiple servers based on source IP addresses. At which OSI layer does this decision-making primarily occur?
A Data Link Layer
B Network Layer
C Transport Layer
D Application Layer
Correct Answer:  B. Network Layer
Explanation:

Load balancing based on IP addresses operates at the Network Layer (Layer 3) for Layer 3 load balancing, though advanced load balancers work at higher layers.

Take Test
Q.18 Hard OSI Model
A network architect must design a system where two applications on the same computer communicate without leaving the system. Which OSI layers are bypassed in this internal communication?
A Layers 1 and 2
B Layers 2 and 3
C Layers 1, 2, and 3
D No layers are bypassed; all are used
Correct Answer:  C. Layers 1, 2, and 3
Explanation:

Internal inter-process communication (IPC) bypasses physical transmission and network routing, skipping Layers 1-3, and operates at Layers 4-7.

Take Test
Q.19 Hard OSI Model
When implementing network monitoring with packet sniffing at multiple layers, which combination accurately represents the data structures captured at each layer?
A Layer 2: Frames; Layer 3: Packets; Layer 4: Segments/Datagrams
B Layer 1: Bits; Layer 2: Packets; Layer 3: Frames
C Layer 3: Datagrams; Layer 4: Packets; Layer 5: Messages
D Layer 2: Segments; Layer 3: Frames; Layer 4: Packets
Correct Answer:  A. Layer 2: Frames; Layer 3: Packets; Layer 4: Segments/Datagrams
Explanation:

Layer 2 creates Frames with MAC addresses, Layer 3 creates Packets with IP addresses, and Layer 4 creates Segments (TCP) or Datagrams (UDP).

Take Test
Q.20 Hard OSI Model
A security incident reveals that an attacker exploited a vulnerability at Layer 5 (Session Layer). Which attack vector most likely matches this layer?
A IP spoofing
B Session hijacking
C DNS poisoning
D SSL downgrade attack
Correct Answer:  B. Session hijacking
Explanation:

Session hijacking targets the Session Layer (Layer 5) by intercepting and taking control of established sessions between applications.

Take Test
IGET
iget AI
Online · Ask anything about exams
Hi! 👋 I'm your iget AI assistant.

Ask me anything about exam prep, MCQ solutions, study tips, or strategies! 🎯
UPSC strategy SSC CGL syllabus Improve aptitude NEET Biology tips