OSI-TCP-layers

Question 1
Assume that source S and destination D are connected through five intermediate routers R1, R2,R3,R4 and R5. Determine how many times each packet has to visit the Network layer and the Data Link layer during transmission from S to D?
A
Network Layer: 7 times, Data Link Layer: 12 times
B
Network Layer: 5 times, Data Link Layer: 12 times
C
Network Layer: 12 times, Data Link Layer: 12 times
D
Network Layer: 7 times, Data Link Layer: 7 times
Question 1 Explanation: 
The packet will visit network layer 7 times(5 times at router and 1 time at source and another time at destination) , once at each node [S, R, R,R,R,R, D] and packet will visit Data Link layer 12 times. One time at S and one time at D, then two times for each intermediate router R[5*2=10] as data link layer is used for link to link communication.
Question 2
Which of the following statements about Secure Shell Protocol (SSH) is FALSE?
A
SSH cannot be used for file transfer and e-mail tasks.
B
SSH provides a secure client/server communication.
C
SSH runs on top of the TCP/IP layer.
D
SSH is a network protocol.
Question 2 Explanation: 
→Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. → Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
Question 3
Match the following:
A
(a)-(iv), (b)-(iii), (c)-(i), (d)-(ii)
B
(a)-(iii), (b)-(iv), (c)-(ii), (d)-(i)
C
(a)-(iv), (b)-(ii), (c)-(iii), (d)-(i)
D
(a)-(iv), (b)-(iii), (c)-(ii), (d)-(i)
Question 3 Explanation: 
Data link layer→ Framing
Network layer→ Routing
Transport layer→ Connection control
Presentation layer→ Encryption
Question 4
Encryption and decryption of data is performed in ---------------
A
Presentation layer
B
Physical layer
C
Data link layer
D
Session layer
Question 4 Explanation: 
Encryption and Decryption of data is performed in presentation layer.
Question 5

The physical layer of a network _________

A
Defines the electrical characteristics of signals passed between the computer and communication devices
B
Controls error detection and corrector
C
Constructs packets of data and sends them across the network
D
All the given options
Question 5 Explanation: 
The physical layer of a network defines the electrical characteristics of signals passed between the computer and communication devices.
Question 6

End-to End connectivity is provided from host-to-host in _________

A
Session Layer
B
Network Layer
C
Data link Layer
D
Transport Layer
Question 6 Explanation: 
Transport layer provides end to end connectivity.
Network layer provides host to host connectivity.
Data link layer provides hop to hop connectivity.
Question 7

Which layer is associated with log in and log out from the network?

A
Presentation
B
Transport
C
Data link
D
Session
Question 7 Explanation: 
Login and Logout is done for authentication of the user, and authentication and authorization is the responsibility of session layer.
Question 8
Match the following

A
a-iv, b-i, c-ii, d-iii
B
a-i, b-iv, c-ii, d-iii
C
a-iv, b-i, c-iii, d-ii
D
a-iv, b-ii, c-i, d-iii
Question 8 Explanation: 
Session layer → Manage dialogue control
Application layer → Virtual terminal software
Presentation layer → Semantics of the information transmitted
Transport layer → Flow control
There are 8 questions to complete.

Access quiz wise question and answers by becoming as a solutions adda PRO SUBSCRIBER with Ad-Free content

Register Now

If you have registered and made your payment please contact solutionsadda.in@gmail.com to get access