CCNA - OSI Model

  1. Segmentation of a data stream happens at which layer of the OSI model?
    Layer 4 - Transport layer
  2. This layer is responsible for the delivery of the messages between two or more networked hosts?
    Layer 4 - Transport layer
  3. This layer provides the interface for email, telnet, and ftp apps and file transfers
    Layer 7 - Application
  4. This layer utilizes the virtual circuits created by the Transport layer to establish communication
    Layer 5 - Session layer
  5. The specifications of this layer include:
    -Physical layout of the network
    -Voltage changes & timing of voltage changes
    -Data rates
    -Maximum transmission distances
    -Physical connectors to transmission medium
    Layer 1 - Physical layer
  6. This layer is enables the movement of data over a link from one to device to another by defining the interface between the network medium & the software on the computer
    Layer 2 - Data Link layer
  7. Routers operate at this layer which can commonly be divided into three sub-layers:
    -subnetwork access
    -subnetwork dependent convergence
    -subnetwork independent convergence
    Layer 3 - Network layer
  8. This layer's primary responsibility of this protocol is to define the syntax that network hosts use to communicate
    Layer 6 - Presentation layer
  9. This layer is used in applications that make use of remote procedure calls
    Layer 5 - Session layer
  10. This layer is divided into 2 sublayers: LLC & MAC
    -Logical Link Control maintains the logical link used for communications between devices
    -LLC includes error checking, frame synchronization and flow control
    -Media Access Control controls the transmission of packets from one NIC to another over a shared media channel.
    -Common MAC methods; token passing and CSMA/Collision Detection and Avoidance
    Layer 2 - Data Link layer
  11. Common protocols for this layer of the OSI model include the following:
    - FTP
    -Simple Mail Transfer Protocol (SMTP)
    -Internet Message Access Protocol (IMAP)
    -HyperText Transfer Protocol (HTTP)
    -Simple Network Management Protocol (SNMP)
    - Network News Transfer Protocol (NNTP)
    Layer 7 - Application layer
  12. The following functions performed at this layer:
    - traffic direction to the end destination
    - addressin; logical network & service address
    - routing functions; route discovery & selection
    - packet switching
    - packet sequence control
    - end-to-end error detection, from data sender to receiver of data
    - congestion control
    - flow control & error control
    - gateway services
    Layer 3 - Network layer
  13. Important functions performed at this layer to enable network communication are:
    - guaranteed data delivery
    - name resolution
    - flow control
    - error detection
    - error recovery
    Layer 4 - Transport layer
  14. This layer is sometimes referred to as the "syntax" layer and is responsible for transforming information or data into formats the application layer can use
    Layer 6 - Presentation layer
  15. The following are associated with this layer:
    - network connection types and how cable is attached to the Network Interface Card
    - data encoding
    - bit synchronization
    - multiplexing
    - termination
    Layer 1 - Physical layer
  16. The following protocols used at this layer:
    - tcp  connection oriented
    - udp connectionless
    Layer 4 - Transport layer
  17. Compression and encryption fall into the function of this layer
    Layer 6 - Presentation layer
  18. This layer is primary responsible for establishing the paths used for transfer of data packets between devices on the network
    Layer 3 - Network layer
  19. This layer manages the ordering of bits, packets, to and from data segments ensuring results called frames
    Layer 2 - Data Link
  20. This layer verifies that each end of the network connection can start the data transfer process
    Layer 4 - Transport layer
  21. Ensures that frames are transmitted from one computer to another with no errors & it establishes an error free connection between two devices
    Layer 2 - Data Link
  22. All devices that function at this layer handle signaling and are handled in bits (1's & 0's)
    Layer 1 - Physical layer
  23. This layer maintains connections between two computers to enable communications
    Layer 2 - Data Link layer
  24. This layer is hardware specific and deals with the actual physical connection between the computer and the network medium.
    Layer 1 - Physical layer
  25. The responsibilities of this layer include the following:
    - packet addressing
    - media access control
    - format used to encapsulate data
    - error notification on the physical later
    - managing of error messages specific to the delivery of packets
    Layer 2 - Data Link layer
  26. This layer is primarily responsible for communications between adjacent network nodes
    Layer 2 - Data Link layer
  27. This layer of the OSI model provides the interface between the network protocol and the software running on the computer
    Layer 7 - Application layer
  28. This layer establishes process to process communications between two or more networked hosts
    Layer 5 - Session layer
  29. The following functions are performed at this layer
    - protocol conversion
    - data translation
    - data encryption & decryption
    - data compression
    - character set conversion
    - interpretation of graphics commands
    Layer 6 - Presentation layer
  30. This layer handles the bit level transmission between two or more network nodes
    Layer 1 - Physical layer
  31. Components in this layer include connectors, cables types, pin-outs, and voltages
    Layer 1 - Physical layer
  32. Network switches & hubs operate at this layer which may also correct errors generated in the physical layer
    Layer 2 - Data Link layer
  33. This layer receives packets from the network layer and structures these packets into frames.
    Layer 2 - Data Link layer
  34. This layer handles fragmentation and reassembly of messages & controls the reliability of a given link
    Layer 4 - Transport layer
  35. This layer transmits raw bit streams over a physical medium & deals with establishing a connection between computers to enable communication.
    Layer 1 - Physical layer
  36. The layer at which each computer verifies that the application transmitting the data is actually allowed to access the network.
    Layer 4 - Transport layer
  37. The following are performed at this layer:
    - establishes, terminates & monitors communication between applications
    - name lookup and security function
    - data synchronization
    - placement of the header information in a packet which determines the point where a message starts and where it ends
    - controls whether communication or messages are transmitted as full duplex or half duplex
    Layer 5 - Session layer
  38. Too many hosts in a broadcast domain, broadcast storms, multicasting, and low bandwidth are all possible causes of?
    LAN traffic congestion
  39. The Ethernet term used to describe a network collection of devices in which one particular device sends a packet on a network segment, forcing every other device on that same segment to pay attention to it?
    Collision domain
  40. The term used to describe a set of all devices on a network segment hearing all broadcasts sent on that segment
    Broadcast domain
  41. Describe the difference between a hub, a bridge, a switch and a router.
    • hubs create one collision domain and one broadcast domain
    • bridges break up collision domains but create one large broadcast domain and use hardware addresses to filter the network
    • switches break up collision domains but create one large broadcast domain by default and like bridges they also use hardware addresses to filter the network
    • routers break up broadcast domains (and collision domains) and use logical addressing to filter the network
  42. Describe the difference between connection-oriented and connectionless network services
    • connection-oriented services use acknowledgements and flow control to create a reliable session (tcp)
    • connectionless uses more overhead and are used to send data with no acknowledgements or flow control. (udp)
  43. How do you connect a console cable from a PC to a router?
    use a rolled cable (rollover) and connect it from the COM port of the host to the console port of a router. start hyperterm and set the BPS to 9600 and flow control to NONE.
  44. Name the three layers in the Cisco three-layer hierarchical model.
    • core
    • distribution
    • access layer
  45. What networking devices can you use to connect a CROSSOVER CABLE with? Describe pin settings
    • switch to switch
    • hub to hub
    • host to host
    • switch to hub
    • router direct to host
    • pin settings are 1-3 and 2-6
Card Set
CCNA - OSI Model
CCNA Exam - OSI Model