Deck 2: Network Layer and OSI Model

Full screen (f)
exit full mode
Question
Which protocol assigns IP address to the client connected in the internet?

A)dhcp
B)ip
C)rpc
D)rsvp
Use Space or
up arrow
down arrow
to flip the card.
Question
Which one of the following is not used in media access control?

A)ethernet
B)digital subscriber line
C)fiber distributed data interface
D)packet switching
Question
Data in network layer is transferred in the form of                          

A)layers
B)packets
C)bytes
D)bits
Question
The network layer contains which hardware device?

A)routers, bridges
B)bridges only
C)bridges and switches
D)routers, bridges and switches
Question
Network layer protocol exits in                    

A)host
B)switches
C)packets
D)bridges
Question
What are the common protocols associated with the network layer?

A)address resolution protocol
B)reverse address resolution protocol
C)internet protocol
D)neighbour discovery protocol
Question
The network layer responds to request from which layer?

A)transport layer
B)data layer
C)application layer
D)session layer
Question
The network layer issues request to which layer?

A)transport layer
B)data layer
C)application layer
D)session layer
Question
Does network layer in TCP/IP and OSI Model are same.
Question
What are called routers?

A)the devices that operates at session layer
B)the devices that operates at data layer
C)the devices that operates at application layer
D)the devices that operates at network
Question
ICMP stands for                      

A)internet coordinate message protocol
B)internet control message protocol
C)interconnect control message protocol
D)interconnect coordinate message protocol
Question
Packets will be transferred in how many types?

A)5 types
B)4 types
C)2 types
D)3 types
Question
DDP stands for                    

A)datagram delivery protocol
B)device delivery protocol
C)datagram device protocol
D)device datagram protocol
Question
Which of the following is not physical layer vulnerability?

A)physical theft of data & hardware
B)physical damage or destruction of data & hardware
C)unauthorized network access
D)keystroke & other input logging
Question
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
Question
Which of the following is not a vulnerability of the data-link layer?

A)mac address spoofing
B)vlan circumvention
C)switches may be forced for flooding traffic to all vlan ports
D)overloading of transport-layer mechanisms
Question
------------ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

A)vlan attack
B)vlan circumvention
C)vlan compromisation method
D)data-link evading
Question
 ---------------may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

A)switches
B)routers
C)hubs
D)repeaters
Question
Which of the following is not a vulnerability of the network layer?

A)route spoofing
B)identity & resource id vulnerability
C)ip address spoofing
D)weak or non-existent authentication
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Network Layer and OSI Model
1
Which protocol assigns IP address to the client connected in the internet?

A)dhcp
B)ip
C)rpc
D)rsvp
dhcp
2
Which one of the following is not used in media access control?

A)ethernet
B)digital subscriber line
C)fiber distributed data interface
D)packet switching
packet switching
3
Data in network layer is transferred in the form of                          

A)layers
B)packets
C)bytes
D)bits
packets
4
The network layer contains which hardware device?

A)routers, bridges
B)bridges only
C)bridges and switches
D)routers, bridges and switches
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
Network layer protocol exits in                    

A)host
B)switches
C)packets
D)bridges
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
What are the common protocols associated with the network layer?

A)address resolution protocol
B)reverse address resolution protocol
C)internet protocol
D)neighbour discovery protocol
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
The network layer responds to request from which layer?

A)transport layer
B)data layer
C)application layer
D)session layer
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
The network layer issues request to which layer?

A)transport layer
B)data layer
C)application layer
D)session layer
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
Does network layer in TCP/IP and OSI Model are same.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
What are called routers?

A)the devices that operates at session layer
B)the devices that operates at data layer
C)the devices that operates at application layer
D)the devices that operates at network
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
ICMP stands for                      

A)internet coordinate message protocol
B)internet control message protocol
C)interconnect control message protocol
D)interconnect coordinate message protocol
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
Packets will be transferred in how many types?

A)5 types
B)4 types
C)2 types
D)3 types
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
DDP stands for                    

A)datagram delivery protocol
B)device delivery protocol
C)datagram device protocol
D)device datagram protocol
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is not physical layer vulnerability?

A)physical theft of data & hardware
B)physical damage or destruction of data & hardware
C)unauthorized network access
D)keystroke & other input logging
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
Loss of power and unauthorized change in the functional unit of hardware comes under problems and issues of the physical layer.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is not a vulnerability of the data-link layer?

A)mac address spoofing
B)vlan circumvention
C)switches may be forced for flooding traffic to all vlan ports
D)overloading of transport-layer mechanisms
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
------------ is data-link layer vulnerability where stations are forced to make direct communication with another station by evading logical controls.

A)vlan attack
B)vlan circumvention
C)vlan compromisation method
D)data-link evading
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
 ---------------may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.

A)switches
B)routers
C)hubs
D)repeaters
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is not a vulnerability of the network layer?

A)route spoofing
B)identity & resource id vulnerability
C)ip address spoofing
D)weak or non-existent authentication
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 19 flashcards in this deck.