CIS 175 Experience Tradition/uophelp.com CIS 175 Experience Tradition/uophelp.com | Page 6

10. Which of the following layers is NOT part of the TCP/IP protocol stack? 11. Which of the following is NOTalayer of the Open Systems Interconnect (OSI) reference model? 12. Which of the following is NOT a characteristic of the Media Access Control (MAC) sublayer of the data-link layer (Layer 2) of the OSI reference layered model? 13. Which OSI reference model layer is responsible for? (a) Setting up session (b) Maintaining a session (c) Tearing down a session 14. What layers of the OSI correspond to labels A and B? 15. John, the Network Administrator of XYZ Corporation, is interested in changing the format of text from American Standard Code for Information Interchange (ASCII) to Extended Binary Code Decimal Interchange Code (EBCDIC). In addition, his IT manager requested that all sensitive and confidential information on their servers should be protected by applying the appropriate encryption. What OSI reference model layer is responsible for data format such as encryption? 16. What is the purpose of a DNS server? 17. How fast can category 5e transfer data? 18. What is the purpose of a proxy server? 19. What is a virtual server? 20. What is the purpose of RTP in VoIP? 21. Which two types of media are twisted-pair cable? 22. What is the purpose of a virtual desktop? 23. How many broadcast domains are there in the diagram? 24. How fast is standard Ethernet? 25. What is the actual distance of 10Base 2? 26. You can configure user authentication at Layer 2 of the OSI. What IEEE standard would you use for this? 27. What is the IEEE standard for PoE? 28. How is a switch selected as a root bridge for spanning tree if the bridge priorities are the same? 29. What is the purpose of the trunk in the diagram?