1. What is another name for the OSI data link layer?
- A. Layer 1
- B. Layer 2
- C. Layer 3
- D. Layer 6
2. The IEEE 802 LAN/MAN data link layer consists of which two sublayers? (Choose two.)
- A. Network Control Protocol
- B. Logical Link Control
- C. Media Access Control
- D. Link Control Protocol
3. What is the responsibility of the MAC sublayer?
- A. Adds Layer 3 addresses to the frame
- B. Communicates with the network layer (Layer 3)
- C. Provides the method to get the frame on and off the media
- D. Transmits the bits on the media
4. What Layer 2 function does a router perform? (Choose three.)
- A. Accepts a frame from a medium
- B. De-encapsulates the frame
- C. Refers to its Layer 3 routing table for a matching destination network
- D. Re-encapsulates the packet into a new frame
5. The media access control method used depends on which two criteria?
- A. Layer 3 IP protocol
- B. Media sharing
- C. Topology
- D. Transport layer protocol
6. Which organization defines standards for the network access layer (i.e., the OSI physical and data link layers)?
- A. Cisco
- B. IANA
- C. IEEE
- D. IETF
7. Which topology displays networking device layer IP addresses?
- A. Aerial topology
- B. IP address topology
- C. Logical topology
- D. Physical topology
8. What kind of network would use point-to-point, hub and spoke, or mesh topologies?
- A. PAN
- B. LAN
- C. WLAN
- D. WAN
10. Which duplex communication method is used in WLANs?
- A. Full-duplex
- B. Half-duplex
- C. Simplex
11. Which media access control method is used in legacy Ethernet LANs?
- A. Carrier sense multiple access/collision annoyance
- B. Carrier sense multiple access/collision avoidance
- C. Carrier sense multiple access/collision destruction
- D. Carrier sense multiple access/collision detection
12. What does the data link layer add to a Layer 3 packet to create a frame? (Choose two.)
- A. Flags
- B. Sequence number
- C. Header
- D. Trailer
13. What is the function of the last field in a data link layer frame?
- A. To determine whether the frame experienced transmission errors
- B. To identify special flow control services such as quality of service (QoS)
- C. To identify the beginning and end limits of the frame
- D. To identify the Layer 3 protocol in the data field
14. Which lists the Layer 2 and Layer 3 address fields in the correct order?
- A. Destination NIC address, source NIC address, source IP address, destination IP address
- B. Source NIC address, destination NIC address, source IP address, destination IP address
- C. Destination NIC address, source NIC address, destination IP address, source IP address
- D. Source NIC address, destination NIC address, destination IP address, source IP address
15. Which of the following are data link layer protocols? (Choose three)
- A. 802.11
- B. Ethernet
- C. IP
- D. PPP
- E. UDP
16. What identifier is used at the data link layer to uniquely identify an Ethernet device?
- A. UDP port number
- B. Sequence number
- C. MAC address
- D. IP address
- E. TCP port number
Ethernet frames are identified at the data link layer by their MAC addresses, which are unique to each NIC. IP addresses are used at the network layer, and TCP and UDP port numbers are used at the transport layer. Sequence numbers are fields in TCP headers.
17. What attribute of a NIC would place it at the data link layer of the OSI model?
- A. RJ-45 port
- B. IP address
- C. Attached Ethernet cable
- D. MAC address
- E. TCP/IP protocol stack
The data link layer describes media access and physical addressing. The encoding of a MAC address on a NIC places it at that layer. Ports and cables are placed at the physical layer of the OSI model. IP addresses are placed at the network layer. The TCP/IP protocol stack describes a different model.
18. Which two engineering organizations define open standards and protocols that apply to the data link layer? (Choose two.)
- A. Internet Society (ISOC)
- B. International Telecommunication Union (ITU)
- C. Institute of Electrical and Electronics Engineers (IEEE)
- D. Electronic Industries Alliance (EIA)
- E. Internet Assigned Numbers Authority (IANA)
The IANA is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers. The EIA is an international standards and trade alliance for electronics organizations, and is best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment. IEEE defines open standards and protocols that apply to the network access layer.
19. What is true concerning physical and logical topologies?
- A. Physical topologies display the IP addressing scheme of each network.
- B. Physical topologies are concerned with how a network transfers frames
- C. The logical topology is always the same as the physical topology.
- D. Logical topologies refer to how a network transfers data between devices.
Physical topologies show the physical interconnection of devices. Logical topologies show the way the network will transfer data between connected nodes.
20. What method is used to manage contention-based access on a wireless network?
- A. CSMA/CD
- B. Token passing
- C. CSMA/CA
- D. Priority ordering
Carrier sense multiple access with collision avoidance (CSMA/CA) is used with wireless networking technology to mediate media contention. Carrier sense multiple access with collision detection (CSMA/CD) is used with wired Ethernet technology to mediate media contention. Priority ordering and token passing are not used (or not a method) for media access control.
21. A technician has been asked to develop a physical topology for a network that provides a high level of redundancy. Which physical topology requires that every node is attached to every other node on the network?
- A. Mesh
- B. Star
- C. Bus
- D. Hierarchical
- E. Ring
The mesh topology provides high availability because every node is connected to all other nodes. Mesh topologies can be found in WANs. A partial mesh topology can also be used where some, but not all, end points connect to one another.
22. Which statement describes the half-duplex mode of data transmission?
- A. Data that is transmitted over the network flows in one direction to many different destinations simultaneously.
- B. Data that is transmitted over the network flows in one direction at a time.
- C. Data that is transmitted over the network flows in both directions at the same time.
- D. Data that is transmitted over the network can only flow in one direction.
The data that is transmitted over the network can flow using one of three modes: o Simplex – Data can only flow in one direction. o Half-duplex – Data flows in one direction at a time. o Full-duplex – Data flows in both directions at the same time.
23. Which is a function of the Logical Link Control (LLC) sublayer?
- A. To provide data link layer addressing
- B. To identify which network layer protocol is being used
- C. To define the media access processes that are performed by the hardware
- D. To accept segments and package them into data units that are called packets
Defining the media access processes that are performed by the hardware and providing data link layer addressing are functions of the MAC sublayer. The data link layer accepts Layer 3 packets and packages them into data units that are called frames.
24. Which data link layer media access control method does Ethernet use with legacy Ethernet hubs?
- A. CSMA/CD
- B. Token passing
- C. Turn taking
- D. Determinism
CSMA/CD is used by Ethernet networks using legacy Ethernet hubs. CSMA/CA is used by 802.11-based wireless networks.
25. What are the two sublayers of the OSI model data link layer? (Choose two.)
- A. Internet
- B. LLC
- C. Transport
- D. Physical
- E. MAC
The data link layer of the OSI model is divided into two sublayers: the Media Access Control (MAC) sublayer and the Logical Link Control (LLC) sublayer.
26. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?
- A. Application
- B. Physical
- C. Transport
- D. Data link
Encapsulation is a function of the data link layer. Different media types require different data link layer encapsulation.
27. What type of physical topology can be created by connecting all Ethernet cables to a central device?
- A. Ring
- B. Mesh
- C. Star
- D. Bus
Devces connected to the Ethernet star topology connect to either a hub or a switch.
28. What are two services performed by the data link layer of the OSI model? (Choose two.)
- A. It determines the path to forward packets.
- B. It provides media access control and performs error detection.
- C. It fragments data packets into the MTU size.
- D. It monitors the Layer 2 communication by building a MAC address table.
- E. It accepts Layer 3 packets and encapsulates them into frames.
The data link layer is responsible for the exchange of frames between nodes over a physical network media. Specifically the data link layer performs two basic services: o It accepts Layer 3 packets and encapsulates them into frames. o It provides media access control and performs error detection. Path determination is a service provided at Layer 3. A Layer 2 switch builds a MAC address table as part of its operation, but path determination is not the service that is provided by the data link layer.
29. Although CSMA/CD is still a feature of Ethernet, why is it no longer necessary?
- A. The use of Gigabit Ethernet speeds
- B. The virtually unlimited availability of IPv6 addresses
- C. The use of full-duplex capable Layer 2 switches
- D. The use of CSMA/CA
- E. The development of half-duplex switch operation
The use of Layer 2 switches operating in full-duplex mode eliminates collisions, thereby eliminating the need for CSMA/CD.