#1
Which of the following devices operates at the Data Link Layer of the OSI model?
#2
Which of the following is a function of the Network Interface Card (NIC)?
Assigning IP addresses to devices
Managing network traffic
Modulating and demodulating signals
Converting digital data to analog signals
#3
What is the role of a repeater in networking?
To connect multiple networks together
To regenerate and amplify signals
To route packets between networks
To provide security for network traffic
#4
Which of the following is NOT a valid type of Ethernet cable?
#5
Which protocol is used for automatic IP address allocation in a network?
DNS (Domain Name System)
DHCP (Dynamic Host Configuration Protocol)
NAT (Network Address Translation)
FTP (File Transfer Protocol)
#6
Which device operates at Layer 2 of the OSI model?
Router
Switch
Firewall
Gateway
#7
What is the primary function of the Data Link Layer?
Ensuring error-free transmission of data
Routing packets to their destination
Establishing, maintaining, and terminating connections
Physical addressing, framing, and error detection
#8
Which of the following protocols is commonly used for error detection at the Data Link Layer?
#9
What is the purpose of a MAC address in computer networking?
To uniquely identify a device on the network
To route packets between networks
To encrypt data for secure transmission
To assign IP addresses dynamically
#10
What is the purpose of the ARP (Address Resolution Protocol) in computer networking?
To translate domain names to IP addresses
To resolve MAC addresses to IP addresses
To establish a secure tunnel for data transmission
To authenticate users for network access
#11
Which of the following is NOT a characteristic of a MAC address?
It is unique to each network interface.
It is assigned by the manufacturer.
It is a 32-bit address.
It is used for local communication only.
#12
In a wireless network, which protocol is commonly used for secure authentication and encryption?
WPA (Wi-Fi Protected Access)
HTTP (Hypertext Transfer Protocol)
SMTP (Simple Mail Transfer Protocol)
FTP (File Transfer Protocol)
#13
Which of the following statements about Ethernet technology is true?
Ethernet operates exclusively at the Physical Layer of the OSI model.
Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) as its access method.
Ethernet frames are not susceptible to collisions.
Ethernet requires a point-to-point connection between devices.
#14
Which of the following is NOT a valid MAC address format?
00:1A:2B:3C:4D:5E
00-1A-2B-3C-4D-5E
001A2B3C4D5E
001A:2B:3C:4D:5E
#15
What is the purpose of the LLC (Logical Link Control) sublayer in the Data Link Layer?
To perform error detection and correction
To provide error-free transmission of data
To manage communication between devices on the same network
To identify different network layer protocols
#16
Which of the following is NOT a characteristic of Token Ring technology?
Uses a token-passing access method
Supports variable-length frames
Devices are connected in a logical ring topology
Operates at a higher data rate than Ethernet
#17
Which of the following protocols is commonly used for link aggregation?
STP (Spanning Tree Protocol)
LAGP (Link Aggregation Control Protocol)
RIP (Routing Information Protocol)
OSPF (Open Shortest Path First)