#1
Which of the following devices operates at the Data Link Layer of the OSI model?
Switch
ExplanationSwitch operates at the Data Link Layer.
#2
Which of the following is a function of the Network Interface Card (NIC)?
Managing network traffic
ExplanationNIC manages network traffic.
#3
What is the role of a repeater in networking?
To regenerate and amplify signals
ExplanationA repeater regenerates and amplifies signals in networking.
#4
Which of the following is NOT a valid type of Ethernet cable?
RG-6
ExplanationRG-6 is not a valid type of Ethernet cable.
#5
Which protocol is used for automatic IP address allocation in a network?
DHCP (Dynamic Host Configuration Protocol)
ExplanationDHCP is used for automatic IP address allocation in a network.
#6
Which device operates at Layer 2 of the OSI model?
Switch
ExplanationSwitch operates at Layer 2 of the OSI model.
#7
What is the primary function of the Data Link Layer?
Physical addressing, framing, and error detection
ExplanationData Link Layer handles physical addressing, framing, and error detection.
#8
Which of the following protocols is commonly used for error detection at the Data Link Layer?
CRC
ExplanationCRC is commonly used for error detection at the Data Link Layer.
#9
What is the purpose of a MAC address in computer networking?
To uniquely identify a device on the network
ExplanationMAC address uniquely identifies a device on the network.
#10
What is the purpose of the ARP (Address Resolution Protocol) in computer networking?
To resolve MAC addresses to IP addresses
ExplanationARP resolves MAC addresses to IP addresses.
#11
Which of the following is NOT a characteristic of a MAC address?
It is a 32-bit address.
ExplanationMAC address is not a 32-bit address.
#12
In a wireless network, which protocol is commonly used for secure authentication and encryption?
WPA (Wi-Fi Protected Access)
ExplanationWPA is commonly used for secure authentication and encryption in wireless networks.
#13
Which of the following statements about Ethernet technology is true?
Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) as its access method.
ExplanationEthernet uses CSMA/CD as its access method.
#14
Which of the following is NOT a valid MAC address format?
001A:2B:3C:4D:5E
Explanation001A:2B:3C:4D:5E is not a valid MAC address format.
#15
What is the purpose of the LLC (Logical Link Control) sublayer in the Data Link Layer?
To identify different network layer protocols
ExplanationLLC sublayer identifies different network layer protocols.
#16
Which of the following is NOT a characteristic of Token Ring technology?
Operates at a higher data rate than Ethernet
ExplanationToken Ring does not operate at a higher data rate than Ethernet.
#17
Which of the following protocols is commonly used for link aggregation?
LAGP (Link Aggregation Control Protocol)
ExplanationLAGP is commonly used for link aggregation.