questions with verified answers
Chp 1 | The OSI Model
This layer accepts and structures the messages for the application. It is also
responsible for data encryption and compression. Ans✓✓✓-Presentation layer
Chp 1 | The OSI Model
This layer accepts outgoing messages and combines messages or segments into
packets. It also adds a header for routing information. Ans✓✓✓-Network layer
Chp 1 | The OSI Model
This layer handles error recovery, flow control and sequencing. Ans✓✓✓-Data
Link layer
Chp 1 | The OSI Model
This layer is concerned with message integrity between source and destination. It
reassembles packets and handles flow control. Ans✓✓✓-Transport layer
Chp 1 | The OSI Model
This layer provides the control functions necessary to establish, manage and
terminate the connections to satisfy the user request. Ans✓✓✓-Session layer
Chp 2 | Cabling
What is horizontal cabling? Ans✓✓✓-Cabling that extends from the
telecommunications closet and into the LAN work area
, Chp 4 | Wireless
In what Wifi protocols is DSSS used? Ans✓✓✓-802.11 b/g/n
Chp 4 | Wireless
In what Wifi protocols is OFDM used? Ans✓✓✓-802.11 a/g/n
Chp 4 | Wireless
What does 'last mile' mean, relative to telecommunications? Ans✓✓✓-This is the
last part of the connection from the telecom provider to the customer.
Chp 4 | Wireless
What does CSMA/CA stand for? Ans✓✓✓-Carrier Sense Multiple Access/
Collision Avoidance
Chp. 7
A malicious piece of software that, when opened, starts attacking the computer is
called what? Ans✓✓✓-A virus.
Chp. 7
A secure protocol that encrypts the entire protocol stack Ans✓✓✓-SSL (Secure
Socket Layer)
Chp. 7
A standardized network protocol that encrypts data at the Network layer
Ans✓✓✓-IPsec (IP Security)