You are on page 1of 2

Data Link OSI layer 2 Quiz 1.

Which frame field is created by a source node and used by a destination node to ensure that a transmitted data signal has not been altered by interference, distortion, or signal loss? A. Transport Layer error check field B. Frame Check Sequence field C. User Datagram Protocol field D. Error correction E. Flow control field 2. Which Data Link Layer addressing scheme is used in a point-to-point logical topology? A. IPv4 addressing B. IPv6 addressing C. Ring addressing D. Multilayer addressing E. Layer 2 addressing not required for this topology 3. What do network hosts use Data Link Layer addresses for? A. Remote delivery B. Local and remote delivery C. Local delivery D. Remote delivery using routers 4. Which three basic parts are common to all frame types supported by the Data Link Layer? (Choose three.) A. header B. type field C. MTU size D. data E. trailer F. CRC value 5. What are two characteristics of the controlled media access method? (Choose two.) A. It is known as a deterministic access method. B. There are no collisions when this type of method is in use. C. Any station can transmit at any time. D. Bandwidth is more efficiently utilized than in a contention-based access method. E. Stations must determine if the media is carrying a signal before they can transmit. 6. Which of the following are sublayers of the Data Link Layer? A. ACL, LMC B. MAC, LAC C. MAC, LLC D. O S I, LLC 7. Which two of the following are Data Link Layer encapsulation details? (Choose two.) A. A header and trailer are added. B. Data is converted into packets. C. Packets are packaged into frames. D. Frames are divided into segments. E. Packets are changed into bits for Internet travel.

8. What is achieved by the encapsulation process at the Data Link Layer? A. Packets are put into frames. B. Data is packaged into a packet. C. Packets are divided into segments. D. Data is converted for Internet transmission. 9. Match the characteristic to the associated media access control method. (Not all characteristics are used.) Characteristics: Deterministic Ethernet Physical ring topology No collisions Non-deterministic Only one station can transmit at a time Stations can transmit at any time Token passing More efficient use of bandwidth Media access control methods: Controlled access Contention-based access 10. Match the characteristic to the topology type. (Not all characteristics are used.) Characteristics: Connects two nodes directly CSMA/CD Deterministic Logical virtual circuit Frame header not required Token passing Shared media Topology types: Point-to-Point Multi-access Ring

You might also like