Networking
Aptitude · Reasoning · English · CS — Corporate & Campus Interview Prep
45 Questions 10 Topics Take Test
Advertisement
Showing 11–20 of 45 questions
Q.11 Medium OSI Model
A network administrator needs to implement a solution to prevent unauthorized access to sensitive data transmitted over the network. Which OSI layer would be most appropriate for implementing encryption?
A Layer 2 - Data Link Layer
B Layer 4 - Transport Layer
C Layer 6 - Presentation Layer
D Layer 7 - Application Layer
Correct Answer:  C. Layer 6 - Presentation Layer
Explanation:

The Presentation Layer (Layer 6) is responsible for data encryption, decryption, compression, and translation, making it the appropriate layer for implementing encryption services.

Take Test
Q.12 Medium OSI Model
In a corporate network, certain applications require guaranteed delivery and error checking, while others prioritize speed. Which Layer 4 protocols would best serve these requirements respectively?
A TCP for speed; UDP for guaranteed delivery
B UDP for both; TCP for neither
C TCP for guaranteed delivery; UDP for speed
D Both TCP and UDP provide identical services
Correct Answer:  C. TCP for guaranteed delivery; UDP for speed
Explanation:

TCP provides reliable, ordered delivery with error checking; UDP prioritizes speed with minimal overhead. Choice of protocol depends on application requirements.

Take Test
Q.13 Medium OSI Model
A manufacturing facility's IoT devices communicate using raw bit transmission over twisted pair cables. Which OSI layer(s) are being utilized?
A Layers 1 and 2
B Layer 1 only
C Layers 2 and 3
D Layers 3, 4, and 5
Correct Answer:  A. Layers 1 and 2
Explanation:

Raw bit transmission over physical media (twisted pair cables) involves Layer 1 (Physical Layer). Data Link Layer (Layer 2) protocols handle the framing and transmission rules for these bits.

Take Test
Q.14 Medium OSI Model
Which of the following statements correctly describes the role of the Session Layer (Layer 5) in the OSI model?
A It handles physical transmission of data over network media
B It manages conversations between applications, including establishing, maintaining, and terminating sessions
C It converts data into appropriate formats for different operating systems
D It performs routing and logical addressing of data packets
Correct Answer:  B. It manages conversations between applications, including establishing, maintaining, and terminating sessions
Explanation:

The Session Layer (Layer 5) manages dialogues between applications, handling session establishment, maintenance, synchronization, and termination.

Take Test
Q.15 Medium OSI Model
A packet sniffer tool captures data at Layer 2. Which information would be visible in the captured frames?
A IP addresses and port numbers
B MAC addresses and frame structure
C Application-level data and HTTP headers
D DNS queries and domain names
Correct Answer:  B. MAC addresses and frame structure
Explanation:

Layer 2 (Data Link Layer) operates with MAC addresses and frames. IP addresses (Layer 3) and application data (Layer 7) would not be directly visible at Layer 2 without further analysis.

Take Test
Advertisement
Q.16 Medium OSI Model
In a scenario where a web server receives requests from multiple clients simultaneously, at which OSI layer would connection management and multiplexing be handled to ensure proper session isolation?
A Layer 3 - Network Layer
B Layer 4 - Transport Layer
C Layer 5 - Session Layer
D Layer 7 - Application Layer
Correct Answer:  B. Layer 4 - Transport Layer
Explanation:

The Transport Layer (Layer 4) uses port numbers to manage multiple simultaneous connections and ensures proper multiplexing and demultiplexing of data streams.

Take Test
Q.17 Medium OSI Model
An organization implements Quality of Service (QoS) policies for video streaming. At which OSI layer would bandwidth prioritization rules primarily be enforced?
A Physical Layer
B Data Link Layer
C Transport Layer
D Application Layer
Correct Answer:  C. Transport Layer
Explanation:

QoS policies are typically enforced at the Transport Layer using protocols like DSCP and traffic shaping techniques to prioritize critical traffic.

Take Test
Q.18 Medium OSI Model
A network administrator notices that devices can connect physically but cannot communicate. After checking cables and signals, the issue remains. Which layers should be investigated?
A Layers 1 and 2 only
B Layers 3 and 4 only
C Layers 2 and 3
D All layers from 1 to 7
Correct Answer:  C. Layers 2 and 3
Explanation:

Physical connectivity (Layer 1) works, so the issue is likely at Layer 2 (MAC addressing/switching) or Layer 3 (IP routing/addressing).

Take Test
Q.19 Medium OSI Model
When a web browser displays encrypted HTTPS content correctly on the user's screen, which layers have successfully completed their functions in the correct sequence?
A Layers 4, 5, 6, 7 only
B Layers 1 through 7
C Layers 3, 4, 5, 6, 7 only
D Layers 2, 4, 6, 7 only
Correct Answer:  B. Layers 1 through 7
Explanation:

All seven layers must function correctly: physical transmission (1), framing (2), routing (3), TCP connection (4), session (5), decryption (6), and HTML rendering (7).

Take Test
Q.20 Medium OSI Model
Which statement correctly describes the relationship between protocols and OSI layers?
A Each protocol operates at only one OSI layer
B Some protocols span multiple OSI layers
C All protocols operate at the Application Layer
D Protocols cannot cross layer boundaries
Correct Answer:  B. Some protocols span multiple OSI layers
Explanation:

Protocols like TCP/IP stack operate across multiple layers; HTTP spans layers 6-7, while TCP operates at layer 4.

Take Test
IGET
iget AI
Online · Ask anything about exams
Hi! 👋 I'm your iget AI assistant.

Ask me anything about exam prep, MCQ solutions, study tips, or strategies! 🎯
UPSC strategy SSC CGL syllabus Improve aptitude NEET Biology tips