Front
Back
Objective 1.1 – OSI Model Concepts
What is the primary purpose of the OSI Reference Model?
- To define IP addressing ranges
- To provide a conceptual framework for understanding and standardizing network interactions
- To replace the TCP/IP model in modern networks
- To configure hardware at Layer 1
Answer: To provide a conceptual framework for understanding and standardizing network interactions
Explanation: The OSI model divides communication into seven layers to standardize design, improve interoperability, and simplify troubleshooting.
Practical Example: During troubleshooting, you can check Layer 1 cabling before investigating Layer 3 routing.
Objective: 1.1
Follow-up: Why is interoperability important in multi-vendor networks?
Objective 1.1 – OSI Model Concepts
Which OSI layer is responsible for transmitting raw bits over physical media?
- Layer 7 (Application)
- Layer 1 (Physical)
- Layer 3 (Network)
- Layer 5 (Session)
Answer: Layer 1 (Physical)
Explanation: The Physical Layer deals with cables, connectors, signal types (electrical/light), and physical standards for sending raw bits.
Practical Example: A damaged Ethernet cable or wrong transceiver type causes a Layer 1 failure.
Objective: 1.1
Follow-up: Name two devices that operate primarily at Layer 1.
Objective 1.1 – OSI Model Concepts
What is the main role of the Data Link Layer?
- Logical addressing and routing packets between networks
- Node-to-node communication, error detection/correction, and framing
- Establishing, maintaining, and ending user sessions
- Encrypting and compressing data for secure transmission
Answer: Node-to-node communication, error detection/correction, and framing
Explanation: Layer 2 provides reliable transfer across a single link, using frames and MAC addresses.
Practical Example: Switches forward frames to the correct port based on MAC address tables.
Objective: 1.1
Follow-up: What are the two sublayers of the Data Link Layer?
Objective 1.1 – OSI Model Concepts
Which function belongs to the Media Access Control (MAC) sublayer of the Data Link Layer?
- Encrypting session data
- Managing protocol access to the physical medium using MAC addresses
- Translating application data into usable formats
- Determining the best path for packets across networks
Answer: Managing protocol access to the physical medium using MAC addresses
Explanation: The MAC sublayer handles addressing and channel access to the shared medium.
Practical Example: Wi‑Fi clients take turns transmitting based on MAC rules to reduce collisions.
Objective: 1.1
Follow-up: How do MAC methods (e.g., CSMA/CA) help reduce contention?
Objective 1.1 – OSI Model Concepts
What is the role of the Logical Link Control (LLC) sublayer?
- Provides flow and error control, enabling multiple protocols to coexist
- Handles physical signal transmission
- Determines IP routing paths
- Encrypts application-layer data for secure transmission
Answer: Provides flow and error control, enabling multiple protocols to coexist
Explanation: LLC interfaces between higher-level protocols and the hardware, offering multiplexing, flow, and error control.
Practical Example: An interface carrying both IPv4 and IPv6 traffic over the same Ethernet link.
Objective: 1.1
Follow-up: How does LLC pass protocol information to Layer 3?
Objective 1.1 – OSI Model Concepts
Which OSI layer is responsible for logical addressing and routing packets across networks?
- Layer 2 (Data Link)
- Layer 3 (Network)
- Layer 4 (Transport)
- Layer 6 (Presentation)
Answer: Layer 3 (Network)
Explanation: The Network Layer uses logical addresses and routing protocols to forward packets between networks.
Practical Example: A router forwarding traffic to a remote subnet based on its routing table.
Objective: 1.1
Follow-up: Name two routing protocols that operate at this layer.
Objective 1.1 – OSI Model Concepts
What is the responsibility of the Transport Layer in the OSI model?
- Formatting and translating data for applications
- Ensuring reliable end-to-end delivery with segmentation, flow control, and error checking
- Providing physical connectivity between devices
- Managing user authentication and sessions
Answer: Ensuring reliable end-to-end delivery with segmentation, flow control, and error checking
Explanation: Layer 4 provides error recovery and flow control; TCP is reliable, UDP is connectionless and faster.
Practical Example: TCP retransmits lost segments during a file transfer.
Objective: 1.1
Follow-up: In what scenarios might UDP be preferred over TCP?
Objective 1.1 – OSI Model Concepts
Which OSI layer manages the setup, maintenance, and termination of connections between applications?
- Layer 5 (Session)
- Layer 2 (Data Link)
- Layer 4 (Transport)
- Layer 7 (Application)
Answer: Layer 5 (Session)
Explanation: The Session Layer coordinates dialogues between hosts (e.g., half/full‑duplex), including setup and teardown.
Practical Example: Establishing and ending a video conference session.
Objective: 1.1
Follow-up: How can checkpoints/checkpointing help during long file transfers?
Objective 1.1 – OSI Model Concepts
What is the primary role of the Presentation Layer?
- Encrypting and compressing data between application and network formats
- Managing routing paths across multiple networks
- Establishing and ending user sessions
- Handling MAC addresses and framing
Answer: Encrypting and compressing data between application and network formats
Explanation: Layer 6 translates, encrypts, and compresses data for secure and efficient exchange.
Practical Example: TLS encrypts web traffic before it’s transmitted.
Objective: 1.1
Follow-up: Give an example of a data format conversion handled at this layer.
Objective 1.1 – OSI Model Concepts
Which OSI layer serves as the interface between the user and network services?
- Layer 1 (Physical)
- Layer 4 (Transport)
- Layer 7 (Application)
- Layer 3 (Network)
Answer: Layer 7 (Application)
Explanation: The Application Layer provides end-user services such as HTTP/HTTPS, SMTP, DNS, and FTP.
Practical Example: A user browsing the web via HTTPS or sending email via SMTP.
Objective: 1.1
Follow-up: Name three protocols commonly used at this layer.
Objective 1.1 – OSI Model (Intermediate)
Which data units correspond to Layers 1–4 in the OSI model?
- Frame, Bit, Packet, Segment
- Bit, Frame, Packet, Segment
- Segment, Frame, Bit, Packet
- Packet, Frame, Bit, Segment
Answer: Bit, Frame, Packet, Segment
Explanation: Each OSI layer has a corresponding data unit: Physical = Bits, Data Link = Frames, Network = Packets, Transport = Segments.
Practical Example: In Wireshark, analyzing errors at the frame vs. packet level helps determine whether corruption occurred at Layer 2 or Layer 3.
Objective: 1.1
Follow-up: What data units are used at Layers 5–7?
Objective 1.1 – OSI Model (Intermediate)
How many layers are in the TCP/IP model, and how do they map to the OSI model?
- 7 layers; direct mapping
- 5 layers; Application covers OSI Layers 5–7
- 4 layers; Application covers OSI Layers 5–7
- 6 layers; Presentation and Session merged
Answer: 4 layers; Application covers OSI Layers 5–7
Explanation: The TCP/IP model uses 4 layers: Application, Transport, Internet, and Network Access. Its Application layer combines OSI Layers 5–7.
Practical Example: SMTP troubleshooting in TCP/IP falls under the Application layer, but in OSI you’d consider Session, Presentation, and Application separately.
Objective: 1.1
Follow-up: Which OSI layers align with the TCP/IP Internet layer?
Objective 1.1 – OSI Model (Intermediate)
Which of the following are Transport Layer protocols?
- HTTP, HTTPS
- IP, ICMP
- TCP, UDP
- ARP, RARP
Answer: TCP, UDP
Explanation: TCP provides reliable, connection-oriented communication, while UDP provides fast, connectionless communication.
Practical Example: TCP is used for file downloads (error-checked), UDP for VoIP (speed prioritized).
Objective: 1.1
Follow-up: Which OSI layer ensures error correction if TCP is not used?
Objective 1.1 – OSI Model (Intermediate)
Which tasks are performed at the Network Layer?
- Logical addressing and path determination
- Framing and MAC addressing
- Segmentation and reassembly
- Encoding signals on wire
Answer: Logical addressing and path determination
Explanation: The Network Layer (Layer 3) assigns IP addresses and uses routing protocols to determine best paths.
Practical Example: Routers forward packets across different networks based on logical addressing.
Objective: 1.1
Follow-up: What device primarily operates at Layer 3?
Objective 1.1 – OSI Model (Intermediate)
Which of the following is an example of a Session Layer function?
- TLS encryption
- Checkpointing during file transfer
- IP address assignment
- Converting ASCII to EBCDIC
Answer: Checkpointing during file transfer
Explanation: The Session Layer (Layer 5) manages communication sessions and ensures data streams can restart if interrupted.
Practical Example: Video conferencing resuming a stream after a brief connection loss.
Objective: 1.1
Follow-up: Which OSI layer is responsible for encryption?
Objective 1.1 – OSI Model (Intermediate)
Which of these occurs at the Presentation Layer?
- Data compression and translation
- Logical routing
- Segmenting data streams
- Framing data with MAC addresses
Answer: Data compression and translation
Explanation: The Presentation Layer (Layer 6) handles format translation, encryption, and compression.
Practical Example: TLS encrypts HTTPS data before sending to the Transport Layer.
Objective: 1.1
Follow-up: What is the difference between Presentation Layer and Application Layer encryption?
Objective 1.1 – OSI Model (Intermediate)
Which protocols operate at the OSI Application Layer?
- DNS, SMTP, FTP
- IP, ICMP, ARP
- TCP, UDP
- Ethernet, Wi-Fi
Answer: DNS, SMTP, FTP
Explanation: The Application Layer provides network services directly to end users and their applications.
Practical Example: DNS resolves www.google.com into an IP address before the request is sent to the Network Layer.
Objective: 1.1
Follow-up: Which OSI layer does SSL/TLS operate in practice?
Objective 1.1 – OSI Model (Advanced)
At which OSI layer does a router primarily operate?
- Layer 2 – Data Link
- Layer 3 – Network
- Layer 4 – Transport
- Layer 7 – Application
Answer: Layer 3 – Network
Explanation: Routers forward packets based on IP addresses, which operate at the Network Layer.
Practical Example: Routers send packets between VLANs or external networks.
Exam Trickiness: CompTIA may list Layer 2 switches and routers together. Remember: routers = Layer 3, classic switches = Layer 2.
Objective: 1.1
Follow-up: What extra capability does a Layer 3 switch provide beyond a Layer 2 switch?
Objective 1.1 – OSI Model (Advanced)
Which OSI layer is responsible for error detection and correction at the node-to-node level?
- Layer 1 – Physical
- Layer 2 – Data Link
- Layer 3 – Network
- Layer 4 – Transport
Answer: Layer 2 – Data Link
Explanation: The Data Link Layer detects and sometimes corrects errors in frame delivery between adjacent nodes.
Practical Example: Ethernet CRC checks catching a corrupted frame.
Exam Trickiness: Don’t confuse this with Transport Layer reliability (TCP). Layer 2 = local node-to-node, Layer 4 = end-to-end.
Objective: 1.1
Follow-up: Which sublayer of Data Link manages flow control and multiplexing?
Objective 1.1 – OSI Model (Advanced)
A user cannot load a webpage, but can ping the site’s IP address. Which OSI layer is most likely at fault?
- Layer 1 – Physical
- Layer 3 – Network
- Layer 4 – Transport
- Layer 7 – Application
Answer: Layer 7 – Application
Explanation: IP connectivity proves Layers 1–3 are fine. Failure occurs when the HTTP request at Application layer fails.
Practical Example: A web server with port 80 blocked by firewall rules.
Exam Trickiness: CompTIA may list “Layer 3” since IP is involved. Eliminate lower layers first.
Objective: 1.1
Follow-up: Which port and protocol are typically used for HTTPS?
Objective 1.1 – OSI Model (Advanced)
Which OSI layer adds logical addressing to packets and determines best path routing?
- Layer 2 – Data Link
- Layer 3 – Network
- Layer 4 – Transport
- Layer 5 – Session
Answer: Layer 3 – Network
Explanation: The Network Layer provides logical addressing (IP) and uses routing protocols for path selection.
Practical Example: OSPF determines shortest paths using link-state algorithms.
Exam Trickiness: Don’t confuse logical addressing (IP, Layer 3) with physical addressing (MAC, Layer 2).
Objective: 1.1
Follow-up: What’s the main difference between IPv4 and IPv6 addressing?
Objective 1.1 – OSI Model (Advanced)
Which of the following occurs at the Presentation Layer?
- Encrypting, compressing, or translating data
- Routing packets across networks
- Establishing sessions between applications
- Defining MAC addressing
Answer: Encrypting, compressing, or translating data
Explanation: Layer 6 ensures data is in usable form between network and applications.
Practical Example: SSL/TLS encryption occurs here conceptually, though implemented at lower layers.
Exam Trickiness: CompTIA may suggest “Application Layer” for encryption. Presentation handles the format, Application uses the data.
Objective: 1.1
Follow-up: How is ASCII-to-UTF8 conversion an example of Presentation Layer functionality?
Objective 1.1 – OSI Model (Advanced)
Which OSI layer is responsible for maintaining dialog control between systems?
- Layer 4 – Transport
- Layer 5 – Session
- Layer 6 – Presentation
- Layer 7 – Application
Answer: Layer 5 – Session
Explanation: The Session Layer establishes, manages, and terminates communication sessions.
Practical Example: Checkpointing in long file transfers so they can resume if interrupted.
Exam Trickiness: Often confused with Transport (end-to-end reliability). Session = dialog management, Transport = delivery assurance.
Objective: 1.1
Follow-up: How does full-duplex vs half-duplex communication relate to this layer?