Learning Center
Plans & pricing Sign in
Sign Out

III - Building a Network with OSI


									                                  STRAYER UNIVERSITY
                                        CIS 175
                                     Mid- term Exam

Summer, 2007
Time: 45 min.
                                                                               H. keshavarznia

Name: …………………………………                         ……………………….………………

1. The Internet model consists of _______ layers.

 A) Three
 B) Five
 C) Seven
 D) Eight

2. The process-to-process delivery of the entire message is the responsibility of the _______

 A) Network
 B) Transport
 C) Application
 D) Physical

3. The _______ layer is the layer closest to the transmission medium.

 A) Physical
 B) Data link
 C) Network
 D) Transport

4. Mail services are available to network users through the _______ layer.

 A) Data link
 B) Physical
 C) Transport
 D) Application
5. As the data packet moves from the upper to the lower layers, headers are _______.

 A) Added
 B) Removed
 C) Rearranged
 D) Modified

6. The _______ layer lies between the network layer and the application layer.

 A) Physical
 B) Data link
 C) Transport
 D) None of the above

7.Layer 2 lies between the physical layer and the _______ layer.

 A) Network
 B) Data link
 C) Transport
 D) None of the above

8.When data are transmitted from device A to device B, the header from A's layer 4 is read by
B's _______ layer.

 A) Physical
 B) Transport
 C) Application
 D) None of the above

9.The _______ layer changes bits into electromagnetic signals.

 A) Physical
 B) Data link
 C) Transport
 D) None of the above

10.Which of the following is an application layer service?

 A) Remote log-in
 B) File transfer and access
 C) Mail service
 D) All the above
 11. What is the maximum number of computers that a single network, connected to a single
     10baseT hub, can support?
     a. 16                                  c. 256
     b. 32                                  d. 1,000

 12. Routers have which of the following capabilities?
     a. They allow you to assign a MAC          c. They allow you to connect
        address to each computer                    computers with different frame
     b. They allow you to assign an IP address d. They allow you to set up wireless
        to each computer                            networks.

 13. Which of the following statements best describes an IP address?
     a. It is a unique identifier burned into the c. It is a number shared by all computers
        NIC when it is manufactured                  on the same network
     b. It is a unique dotted-octet number        d. It is a number assigned only to routers,
        assigned to every network node               identifying their priority ratings.

 14. All of the following statements are true about the OSI model EXCEPT ____________.
     a. The OSI model encourages modular         c. The OSI model provides a common
         design in networking.                        jargon to describe the function of any
                                                      network protocol.
     b. Each protocol needs to understand d. Each layer of the OSI model addresses
         all of the protocols handling all the        an essential network task.
         other layers.

 15. Which of the following statements about ASCII is false?
     a. All Windows systems store text as      c. ASCII stands for the American
        ASCII codes                               Standard Code for Information
     b. Windows 9x uses ASCII to store text, d. ASCII is an 8-bit code for storing text
        but Windows NT, 2000, and XP use

16.Which kind of cable provides the least protection against EMI?
     a. UTP                                        c. Thick coax
     b. STP                                        d. Thin coax

 17. All of the following are advantages of UTP cabling except _________________.
     a. It is inexpensive                       c. It is not susceptible to electro-
                                                    magnetic interference
     b. It is easy to install                   d. It provides protection against crosstalk.
18. Which kind of cable works best for long distance transmissions?
    a. Coax                                    c. STP
    b. UTP                                     d. Fiber

19. The numeric designator on fiber optic cables refers to what?
    a. its bandwidth and throughput            c. its maximum length and maximum
                                                    number of nodes per segment
    b. the size of the fiber and the size of   d. its Ohms rating and its Category rating
       the cladding measured in microns

20. Which kind of cabling provides the highest transfer rate?
    a. Coax                                    c. STP
    b. UTP                                     d. Fiber optic

21. File Transfer Protocol (FTP) uses which port(s)?
    a. 80                                      c. 25 and 110
    b. 20 and 21                               d. 23

22. Which protocol is often used for transferring files between servers and clients without
    requiring a user login?
    a. HTTP                                     c. TFTP
    b. FTP                                      d. SMTP

23. Which protocol handles outgoing e-mail?
    a. POP3                                      c. SNMP
    b. SMTP                                      d. TFTP

24. If your system receives packets on ports 110 and 25, where does it send them?
    a. To the DHCP server                       c. To the web browser
    b. To the DNS server                        d. To the e-mail application

25. What is the length of addresses in IPv6?
    a. 32 bits                                   c. 128 bits
    b. 64 bits                                   d. 256 bits
26.What is the maximum cable length for the 1000BaseT network?
     a. 100 meters                              c. 400 meters
     b. 200 meters                              d. 2000 meters

 27. 1000BaseT Ethernet is defined by the IEEE ______________ standard.
     a. 802.3                                  c. 802.11g
     b. 802.11                                 d. 802.3ab

 28. Which of these devices allows for full-duplex transmissions?
     a. repeater                                 c. amplifier
     b. Hub                                      d. switch

29.If you have a 100BaseT switched Ethernet network, what is the theoretical maximum bandwidth
       using full duplex NICs?
       a. 10 Mbps                               c. 200 Mbps
       b. 100 Mbps                              d. 1000 Mbps

 30. If you have a Switched Ethernet connection running over UTP, how many machines make up
     a segment?
     a. 1                                       c. 4
     b. 2                                       d. not enough information to answer this

To top