Learn Mode

Data Link Layer and Network Connectivity Quiz

#1

Which of the following devices operates at the Data Link Layer of the OSI model?

Switch
Explanation

Switch operates at the Data Link Layer.

#2

Which of the following is a function of the Network Interface Card (NIC)?

Managing network traffic
Explanation

NIC manages network traffic.

#3

What is the role of a repeater in networking?

To regenerate and amplify signals
Explanation

A repeater regenerates and amplifies signals in networking.

#4

Which of the following is NOT a valid type of Ethernet cable?

RG-6
Explanation

RG-6 is not a valid type of Ethernet cable.

#5

Which protocol is used for automatic IP address allocation in a network?

DHCP (Dynamic Host Configuration Protocol)
Explanation

DHCP is used for automatic IP address allocation in a network.

#6

Which device operates at Layer 2 of the OSI model?

Switch
Explanation

Switch operates at Layer 2 of the OSI model.

#7

What is the primary function of the Data Link Layer?

Physical addressing, framing, and error detection
Explanation

Data Link Layer handles physical addressing, framing, and error detection.

#8

Which of the following protocols is commonly used for error detection at the Data Link Layer?

CRC
Explanation

CRC is commonly used for error detection at the Data Link Layer.

#9

What is the purpose of a MAC address in computer networking?

To uniquely identify a device on the network
Explanation

MAC address uniquely identifies a device on the network.

#10

What is the purpose of the ARP (Address Resolution Protocol) in computer networking?

To resolve MAC addresses to IP addresses
Explanation

ARP resolves MAC addresses to IP addresses.

#11

Which of the following is NOT a characteristic of a MAC address?

It is a 32-bit address.
Explanation

MAC address is not a 32-bit address.

#12

In a wireless network, which protocol is commonly used for secure authentication and encryption?

WPA (Wi-Fi Protected Access)
Explanation

WPA is commonly used for secure authentication and encryption in wireless networks.

#13

Which of the following statements about Ethernet technology is true?

Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) as its access method.
Explanation

Ethernet uses CSMA/CD as its access method.

#14

Which of the following is NOT a valid MAC address format?

001A:2B:3C:4D:5E
Explanation

001A:2B:3C:4D:5E is not a valid MAC address format.

#15

What is the purpose of the LLC (Logical Link Control) sublayer in the Data Link Layer?

To identify different network layer protocols
Explanation

LLC sublayer identifies different network layer protocols.

#16

Which of the following is NOT a characteristic of Token Ring technology?

Operates at a higher data rate than Ethernet
Explanation

Token Ring does not operate at a higher data rate than Ethernet.

#17

Which of the following protocols is commonly used for link aggregation?

LAGP (Link Aggregation Control Protocol)
Explanation

LAGP is commonly used for link aggregation.

Test Your Knowledge

Craft your ideal quiz experience by specifying the number of questions and the difficulty level you desire. Dive in and test your knowledge - we have the perfect quiz waiting for you!