* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Computer Networks Sample Questions
Dynamic Host Configuration Protocol wikipedia , lookup
Asynchronous Transfer Mode wikipedia , lookup
Distributed firewall wikipedia , lookup
TCP congestion control wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Internet protocol suite wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Computer Networks Sample Questions Q. 1 Choose the correct answer. 1- Which physical topology allows only one-way flow of data across the media? a. Buss. b.Star. c. Ring. d.Mesh. 2.The IP address can be understood at the: a. Physical Layer. b.Data Link Layer. c. Network Layer. d.Transport Layer. 3.The user data at Transport Layer is called : a. Segment. b.Packet. c. Frame. d.Message. 4.A twisted adapter will have a(n)__________connector. a. RJ-11. b.BNC. c. AUI. d.RJ-45. 5.Which of the following cable types is the best against noise and interference. a. Coaxial Cable. b.UTP. c. STP. d.Fiber Optic. 6.The TCP/IP model consists of : a.4 layers. b. 7 layers. c. 5 layers. d. 6 layers. 7. Which of the following describes a network that connects computers at the same floor. a. LAN. b. MAN. c. BN. d. WAN. 8 . Data Link Layer can understand : a. MAC. b. IP c. NW number. d. BC number. 9. Which of the following best describe peer-to-peer network: a. It requires centralized and dedicated server. b. It requires at least one administrator to provide centralized resources. c. it provide extensive user and resource security. d. it provides each user the ability to to manage his own shared resources. 10. Your company has several computers, which store sensitive data that should not be accessed by everyone on the network. Which network model will most appropriate? a. peer-t0-peer. b. workgroup network. c. client/server network. d. server based with each computer acting as both client and server. 11. Four building from rough square. Nearly 500 m on a side. Which of the following cable types could you use without additional equipment to connect the four building? a. Thin coaxial cable. b. UTP. c. STP. d. Fiber-Optic. 12. Which of the following Layers is the same in both models OSI and TCP. a. Transport Layer. b. Application Layer. c. Network Layer. d. Data Link Layer. 13- Which device is considered a multi-port bridge? A-hub B-router C-switch D-repeater 14- When new network media is installed, why should optical fiber be considered in place of UTP? A-optical fiber is less expensive B-optical fiber is easier to install C-optical fiber has greater bandwidth D-optical fiber supports only half-duplex 15- Which layer of the OSI model deals with the bit time and timing? A-application B-session C-data link D-physical 16- Which of the following are copper UTP based technologies? A-10BASE-T B-10BASE5 C-10BASE2 D-100BASE-FX 17- What purpose is served by the destination MAC address in an Ethernet frame? A-to request media access control address from the specified address. B-to identify the network interface for frame delivery. C-to determine the route required to reach the destination. D-to avoid collisions if the destination is already busy. 18 10base5 can also be called : a. Outdoor. b. Thick Network. c. Thin Network. d. a and b. 19- The single mode and multimode in FDDI: a. Have the same speed. b. Multimode is faster than Single mode. c. Single mode is faster than Multimode. d. Have the same cable length. 20- the 10based2 has: a. speed of 10 Mbps an 500 m max length b. speed of 100 Mbps an 200 m max length c. speed of 100 Mbps an 185 m max length d. speed of 10 Mbps an 185 m max length 21- The Crossover cable is used to connect : a. DTE and DTE. b. DCE and DCE. c. DTE and DCE. d. DCE and DNS. 22- Which of the following are copper Coax based technologies? a- 10BASE-T b- 10BASE5 c- 10BASE-TX d- 100BASE-FX 23- Which Ethernet LAN device can allow bandwidth utilization to approach 100%? a- A bridge b- A hub c- A router d- A switch 24- In Straight cable of UTP the connection is as follows: a- 2 with 6, 1 with 3. b- 1 with 2. 3 with 4. c- 1 with 8, 2 with 7, 3 with 6. 4 with 5, 5 with 4, 6 with 3, 7 with 2. 8 with 1 d- 1 with 1, 2 with 2, 3 with 3. 4 with 4, 5 with 5, 6 with 6, 7 with 7. 8 with 8 25-Which of the following Access Methods listens to the transmission line for network traffic before sending data. a. CSMA/CA. b.Token Passing.. c. CSMA/CD. d.Demand Priority. 26-Which of the following devices works at the Data Link Layer? e. Hub f. Repeater . g.Bridge. h.Modem. 27- The collision domain can be segmented by: a. Bridge. b. Switch. c. Router. d. All of above. 28- Which of the following can divide broadcast domain: a. switch. b. Bridge. c. Router. d. Modem. 29- When the Router finds that the subnet mask of the destination is the same as subnet mask of the network connected to the port at which it received the packet, it-----a. Broadcasts the data packet. b. Forwards the data packet. c. Blocks the data packets. d. Discards the data packet. 30- When is a DNS request made? a- To translate the URL of Destination to IP address. b- To translate the URL of Destination to MAC address. c- To translate the MAC address of Destination to URL. d- To translate the IP address of Destination to URL. 31 The Host applies to _________to get the IP address of Destination a- ARP. b- Bootp. c- DNS. d- DHCP 32 In Straight cable of UTP the connection is as follows: a- 2 with 6, 1 with 3. b- 1 with 2. 3 with 4. c- 1 with 8, 2 with 7, 3 with 6. 4 with 5, 5 with 4, 6 with 3, 7 with 2. 8 with 1 d- 1 with 1, 2 with 2, 3 with 3. 4 with 4, 5 with 5, 6 with 6, 7 with 7. 8 with 8 33 - At which layer of the OSI model do hubs operate? a- Physical. b- Session c- Transport d- Network 34- Which Ethernet LAN device can allow bandwidth utilization to approach 100%? a- A bridge b- A hub c- A router d- A switch 35 Which of the following are copper Coax based technologies? a- 10BASE-T b- 10BASE5 c- 10BASE-TX d- 100BASE-FX 36 Switches and Bridges can be used to divide : a- Broadcast Domain b- Collision Domain c- Multicast Domain d- Network Group. 37 When the hubs are used they usually lead to expansion of: a. Broadcast Domain and Collision Domain b. Broadcast Domain Multicast Domain c. Collision Domain and Multicast Domain d. Collision Domain and Network Group. 38 The Crossover cable is used to connect : a. DTE and DTE. b. DCE and DCE. c. DTE and DCE. d. DCE and DNS. 39 The IP address can be assigned to host: a. Statically . b. Dynamically. c. By the manufacturer. d. a and b. 40 the 10based2 has: a. speed of 10 Mbps an 500 m max length b. speed of 100 Mbps an 200 m max length c. speed of 100 Mbps an 185 m max length d. speed of 10 Mbps an 185 m max length 41 DHCP is used to: a. Statically assign IP to hosts. b. Dynamically assign IP to hosts. c. Dynamically assign MAC to hosts. d. Statically assign MAC to hosts. 42 The Host releases IP address by logging off from network when it is assigned by: a. DNS. b. ARP. c. DHCP. d. RARP. 43 The single mode and multimode in FDDI: a. Have the same speed. b. Multimode is faster than Single mode. c. Single mode is faster than Multimode. d. Have the same cable length. 44 10base5 can also be called : a. Outdoor. b. Thick Network. c. Thin Network. d. a and b. 45- What purpose is served by the destination MAC address in an Ethernet frame? A-to request media access control address from the specified address. B-to identify the network interface for frame delivery. C-to determine the route required to reach the destination. D-to avoid collisions if the destination is already busy. 46- Which of the following are copper UTP based technologies? A-10BASE-T B-10BASE5 C-10BASE2 D-100BASE-FX 47- Which layer of the OSI model deals with the bit time and timing? A-application B-session C-data link D-physical 48- When new network media is installed, why should optical fiber be considered in place of UTP? A-optical fiber is less expensive B-optical fiber is easier to install C-optical fiber has greater bandwidth D-optical fiber supports only half-duplex 49- Which of the following is a network type that is widely used in dialup networking? A-shared media B-point-to-point C-extended shared media D-point-to-multipoint 50- Which device is considered a multi-port bridge? A-hub B-router C-switch D-repeater 51- Which of the following is private IP address? A-10.1.1.1 B-170.32.5.2 C-197.167.10.10 D-178.16.4.4 52- Which of the following is a feature of IPv6? A-uses a 32 bit address B-uses a 128 bit address C-improved host naming conventions D-Same addressing scheme as IPv4 53- Which address is an example for a Class B network with the default subnet mask? A-147.1.1.1 B-147.13.0.0 C-147.14.255.0 D-147.14.255.255 54- What is the destination address of a frame containing an ARP request? A-a broadcast IP address B-a broadcast MAC address C-the default gateway IP address D- the default gateway MAC address 55-When talking with a person whose primary language is different from yours you may need to repeat your words and speak more slowly which TCP functions are analogous to these communication strategies: a- segmentation and PAR b- Reliability and flow control c- Unreliable transport and buffers d- Synchronization and expectation acknowledgements 56- Which of the following are primary duties of the OSI transport layer? (Choose two) a- path determination b- End –to-end connectivity c- Flow control d- Security control e- Data representation f- Encryption of data 57-Which of the following protocols use the layer UDP protocols? (Choose three) a- SMTP b- SNMP c- FTP d- DNS e- TFTP f- HTTP 58- which of the following is a feature of TCP? a- Exchanges datagrams without acknowledgments. b- Error processing handled through other protocols. c- Connectionless. d- Windowing. 59- which of the following describes TCP windowing? a- a technique used by network administrators in determining the size of segments sent through a network. b- A means of determining the number of segments sent to a destination through an administratively defined time window. c- A dynamic means to establish the number of segments sent to a destination on before acknowledgment. d- A technique to calculate the number of e-mail segment that can be sent through a router during a given time slot. 60- what is the purpose of the TCP three-way handshake? a- To adjust the size of the sliding window. b- To establish the presence of the destination host c- To confirm the availability of the destination port. d- To synchronize sequence numbers prior to data transmission. 61- all of the following are characteristics of TCP except: a- Connection oriented. b- Re-sends data not received. c- Provides best effort delivery. d- divides outgoing messages into segments. 62-what is the primary function of routing protocols? a- They are used by hosts to exchange user data. b- They enable router to exchange routing tables. c- They are used by routers to exchange user data. d- They enable router to communicate with bridge and hubs. 63-when is a RARP request made? a- When a source knows its MAC address but not its IP address. b- When a source knows its IP address but not its MAC address. c- When a source knows the destination MAC address but not the IP address. d- When a source knows the destination IP address but not the MAC address. 64- What is the destination address of an ARP request? a- A broadcast IP address. b- A broadcast MAC address. c- The default gateway IP address. d- The default gateway MAC address. 65- John has been hired as the network administrator of a local company and has decided to add more hubs to the company's existing network. Which of the following has been caused by John's inexperience? a- Collision domain extended. b- An increased number of collision domains. c- Increased network performance. d- Increased bandwidth. e- Extended bandwidth. 66- "CompA" is trying to locate a new computer named "CompB" on the network. Which of the following does "CompA" broadcast to find the MAC address of "CompB"? a- MAC request b- ARP request c- Ping d- Telnet e- Proxy ARP Q2 A. Define the following terms: NIC , FDDI , TCP/IP, Star Topology, Ring Toplogy, token , switch , MAN , router , hub. Q3 Compare between the Bus topology and Star topology? Bus topology Star topology Server-based network Peer-to-Peer network Q4: State the types of transmission media with short notes? Q5 State True or False with your comment (Comments for only false answers): 1- Client server networks is more secure than peer to peer networks ( ) Comment: 2- The maximum length of the UTP cables is 500 meters ( ) Comment: 3- We can extend the network using maximum 3 repeaters ( ) Comment: 4- CSMA/CD is a technique used only to detect the collision ( ) Comment: 5- Token is container for data transmission and used in the Ring topology ( ) Comment: 6- The coaxial cables are usually used to connect computers in the FDDI networks ( ). 7- Only one token can be found in the token ring network ( ). 8- We can extend the thick network to maximum 2000 meters. ( ). 9- Terminators are used in the Token Ring networks. ( ). 10 The Broadcast address is used to send a message to all LAN computers. ( ). Questions & Answers TCP/IP Sample questions I. IP protocol: 1. What is the purpose of IP protocol? To deliver the message to the end node 2. What OSI layer is IP protocol occupying ? Network 3. Given the IP address 126.110.16.7 what class of address is it? A 4. Given a netmask of 255.255.255.0 how many subnets are available for a Class B IP address? 2**8 - 2 5. How many hosts can we attached to each subnet? 2**8 - 2 6. What is the decimal equivalent of hex number f0 ? 240 7. Each protocol consists of a header and data. What is the most important part of IP header? Source and Destination IP addresses 8. What goes into IP data? TCP or UDP header and the message 9. Explain the IP Address Exhaustion problem. Running out of class B 10. What are the current methods of dealing with the IP Address Exhaustion problem? CIDR, NAT, IP v6 11. Every active NIC card will have a corresponding IP address.[T/F] False. NIC card can be connected to Novell node 12. Every active IP address has a corresponding NIC card address.[T/F] True II. TCP protocol 1. What OSI layer is TCP protocol occupying? Transport 2. What is the purpose of TCP protocol? To deliver the message to the proper application within the node 3. What is the most important info in TCP header? Source and Destination Port Number 4. What goes into TCP data? The message 5. TCP is connection less protocol [T / F] False III. UDP protocol 1. What OSI layer is UDP protocol occupying? Transport 2. What is the purpose of UDP protocol? Same as TCP 3. What is the most important info in UDP header? Same as TCP 4. What goes into UDP data? Same as TCP 5. UDP is an connection less protocol [T / F] True