In a complex network architecture, data flows through multiple devices: modem → switch → router → firewall → server. Which device primarily operates at Layer 3?
AModem
BSwitch
CRouter
DFirewall
Correct Answer:
C. Router
Explanation:
Routers operate at Layer 3 (Network Layer) to route packets based on IP addresses, while other devices operate at lower layers.
A network protocol analyzer shows that frames are arriving at a computer but being dropped at the Network Layer. What is the most likely cause?
APhysical cable disconnection
BIncorrect IP address or routing table entry
CMAC address table overflow
DApplication software crash
Correct Answer:
B. Incorrect IP address or routing table entry
Explanation:
If frames arrive at Layer 2 but are dropped at Layer 3, the issue involves IP addressing, routing tables, or network configuration at the Network Layer.
An organization implements network segmentation using VLANs. At which OSI layer does VLAN tagging primarily operate, and which layer processes these tags?
ALayer 4; Layer 3
BLayer 2; Layer 2
CLayer 3; Layer 4
DLayer 1; Layer 2
Correct Answer:
B. Layer 2; Layer 2
Explanation:
VLAN tagging operates at Layer 2 (Data Link Layer) using 802.1Q tags, and switches process these tags at Layer 2 to isolate traffic.
Consider a scenario where SSL/TLS encryption is implemented. At which OSI layer is the encryption applied, and through which layer does encrypted traffic pass without modification?
ALayer 4; Layers 1-3
BLayer 6; Layers 1-5
CLayer 7; Layers 1-6
DLayers 4-6; Layer 7 only
Correct Answer:
C. Layer 7; Layers 1-6
Explanation:
SSL/TLS operates at Layer 7 (Application Layer), encrypting application data. Lower layers (1-6) transparently carry encrypted data without understanding its content.
In a load-balancing scenario, traffic is distributed across multiple servers based on source IP addresses. At which OSI layer does this decision-making primarily occur?
AData Link Layer
BNetwork Layer
CTransport Layer
DApplication Layer
Correct Answer:
B. Network Layer
Explanation:
Load balancing based on IP addresses operates at the Network Layer (Layer 3) for Layer 3 load balancing, though advanced load balancers work at higher layers.
A network architect must design a system where two applications on the same computer communicate without leaving the system. Which OSI layers are bypassed in this internal communication?
ALayers 1 and 2
BLayers 2 and 3
CLayers 1, 2, and 3
DNo layers are bypassed; all are used
Correct Answer:
C. Layers 1, 2, and 3
Explanation:
Internal inter-process communication (IPC) bypasses physical transmission and network routing, skipping Layers 1-3, and operates at Layers 4-7.
When implementing network monitoring with packet sniffing at multiple layers, which combination accurately represents the data structures captured at each layer?
Which layer of the OSI model is responsible for routing and logical addressing?
ANetwork Layer (Layer 3)
BData Link Layer (Layer 2)
CTransport Layer (Layer 4)
DApplication Layer (Layer 7)
Correct Answer:
A. Network Layer (Layer 3)
Explanation:
The Network Layer (Layer 3) handles routing decisions and logical addressing using IP addresses. It determines the best path for data packets to travel across networks.