1.2 OSI Model Concepts Review Cybersecurity Associate

1.2 OSI Model Concepts Review Cybersecurity Associate

12th Grade

20 Qs

quiz-placeholder

Similar activities

IT Concepts 3

IT Concepts 3

12th Grade - University

25 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Soal Ulangan Internet 8.7

Soal Ulangan Internet 8.7

8th Grade - University

20 Qs

سوالات امنیت فناوری و شبکه

سوالات امنیت فناوری و شبکه

12th Grade

19 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

CodeHS Principles of Computing 6.8.1 The Internet Quiz

CodeHS Principles of Computing 6.8.1 The Internet Quiz

9th - 12th Grade

15 Qs

Understanding Network and Cloud Security

Understanding Network and Cloud Security

12th Grade

20 Qs

INFORMATIKA SEKARANG DAN MASA DEPAN

INFORMATIKA SEKARANG DAN MASA DEPAN

12th Grade

22 Qs

1.2 OSI Model Concepts Review Cybersecurity Associate

1.2 OSI Model Concepts Review Cybersecurity Associate

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

Kyle Hatfield

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which OSI layer does a router mainly operate when making decisions about where to forward packets?

Layer 1

Layer 2

Layer 3

Layer 4

Answer explanation

Explanation: Routers operate at the Network layer (Layer 3), where they use IP addresses to determine the best path for data packets to travel.
Real-World Scenario: When you browse a website hosted in another country, your router communicates with other routers using Layer 3 IP addresses to ensure your data reaches the correct server across the internet.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network admin finds that a client computer is misidentifying data packets, treating an email packet as if it were web traffic. This is most likely a problem at which OSI process?

The client computer isn’t receiving any packets.

The client receives an email packet but interprets it as web traffic

The client processes VoIP packets correctly.

The client cannot connect to port 80.

The client is only experiencing slowness from congestion.

Answer explanation

Explanation: This is a Transport layer (Layer 4) de-multiplexing issue. The port numbers that separate services (email vs. web) are being misinterpreted.
Real-World Scenario: If your laptop mistakes Outlook email traffic for a web browser request, it’s because Layer 4 port assignment has gone wrong, similar to mailing a letter to the wrong department at the same office.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following devices and security tools operate at OSI Layer 4 to strengthen network defenses?

Intrusion Detection Systems (IDS) that analyze traffic for suspicious behavior

Antivirus software on a host computer

Firewalls performing stateful packet inspection

Routers filtering IP packets

Switches dividing collision domains

Answer explanation

Explanation: Both IDS and stateful firewalls analyze traffic at Layer 4 (Transport), using TCP/UDP ports and session data to determine suspicious or unauthorized activity.
Real-World Scenario: A firewall might block unusual attempts to connect to TCP port 23 (Telnet), while IDS monitors and alerts when repeated suspicious login attempts happen.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three are valid layers in the OSI reference model?

Presentation Layer

Transmission Layer

Session Layer

Application Layer

WAN Layer

Answer explanation

Explanation: The OSI model has 7 defined layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application. The distractors (WAN, Encryption, etc.) are not official layers.
Real-World Scenario: When you stream Netflix, the Presentation layer handles video format, the Session layer keeps your stream stable, and the Application layer delivers the app itself.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

At which OSI layer does physical addressing (MAC addresses) occur?

Physical layer

Data Link layer

Session layer

Application layer

Answer explanation

Explanation: The Data Link layer (Layer 2) is where physical addressing takes place, using MAC addresses burned into NICs to identify devices.
Real-World Scenario: When two laptops connect over Wi-Fi, their NICs use unique MAC addresses to communicate within the same local network.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which organization developed the OSI reference model?

ITU

IETF

IEEE

ISO

Answer explanation

Explanation: The OSI model was created by ISO (International Organization for Standardization) to provide a universal framework for network communication.
Real-World Scenario: Just like ISO sets standards for screw sizes so hardware fits globally, it also standardized OSI so networks could interoperate worldwide.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OSI layer is responsible for defining the physical network medium, such as cables and signals?

Layer 5

Layer 1

Layer 3

Layer 7

Answer explanation

Explanation: The Physical layer (Layer 1) deals with tangible elements like cabling, connectors, and signaling methods.
Real-World Scenario: If an Ethernet cable is cut, it’s a Layer 1 failure — the problem is with the physical medium itself.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?