adplus-dvertising
71. Frame boundaries are recognized and created by ....................
a. Application layer
b. Data Link layer
c. Session layer
d. Network layer
Answer: (c).Session layer

72. Token Management is the function of ....................
a. Application layer
b. Data Link layer
c. Session layer
d. Network layer
Answer: (d).Network layer

73. The function of Physical Layer?
a. Error correction and Detection
b. Piggybacking
c. Flow Control
d. Determine number of volts to represent 1 or 0
Answer: (d).Determine number of volts to represent 1 or 0

74. As the data packet moves from the lower to the upper layers then headers are?
a. added
b. subtracted
c. rearranged
d. modified
Answer: (a).added

75. In OSI network architecture, the routing is performed by ..................
a. network layer
b. data link layer
c. transport layer
d. session layer
Answer: (a).network layer

76. How many OSI layers are covered in the X.25 standard?
a. Two
b. Three
c. Seven
d. Six
Answer: (b).Three

77. Layer one of the OSI model is .................
a. physical layer
b. link layer
c. transport layer
d. internet work layer
Answer: (a).physical layer

78. The X.25 standard specifies a ...............
a. technique for start-stop data
b. technique for dial access
c. DTE/DCE interface
d. None of above
Answer: (c).DTE/DCE interface

79. Which of the following are session layer check points?
a. allow just a portion of a file to be resent
b. detect and recover errors
c. control the addition of headers
d. are involved in dialog control
Answer: (a).allow just a portion of a file to be resent

80. Which of the following technique is used for encapsulation?
a. one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
b. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
c. a technique used in best-effort delivery systems to avoid endlessly looping packets
d. all of the above
Answer: (b).a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame