0% found this document useful (0 votes)
176 views13 pages

Past Paper Networking

1) The document contains a past paper for an exam with multiple choice questions covering topics about data transmission, networking protocols, encryption, IP addressing and network design. 2) It includes questions about characteristics of transmission media, protocols like TCP and UDP, encryption using cipher text, IP subnetting, and proposing a network design for an internet browsing center. 3) The questions assess knowledge of fundamental networking and cybersecurity concepts as well as the ability to analyze scenarios and propose logical network designs based on given requirements.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
176 views13 pages

Past Paper Networking

1) The document contains a past paper for an exam with multiple choice questions covering topics about data transmission, networking protocols, encryption, IP addressing and network design. 2) It includes questions about characteristics of transmission media, protocols like TCP and UDP, encryption using cipher text, IP subnetting, and proposing a network design for an internet browsing center. 3) The questions assess knowledge of fundamental networking and cybersecurity concepts as well as the ability to analyze scenarios and propose logical network designs based on given requirements.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

WORKBOOK

CHAPTER XI
SECTION VIII | PAST PAPER
AL 2021

1. Which of the following is/are correct with respect to guided media used for data transmission?
A. Denoted by a square wave.
B. Contains a continuous range of values.
C. Uses discrete values to represent information.

1) A only 3) C only 5) A and C only


2) B only 4) A and B only

2. Which of the following is/are correct with respect to guided media used for data transmission?
A. A physical path is used for data transmission.
B. Signal is broadcast through air.
C. Example: Radio waves.

1) A only 3) A and C only 5) All A, B and C


2) A and B only 4) B and C only

3. Which of the following could be used to digitally represent analog signals?


1) Attenuation 3) Distortion 5) Synchronization
2) Decoding 4) Pulse code modulation

4. Read the following sentence:


When devices send and receive data over a network, a protocol is used uniquely identify the
sender interface and the correct delivery of the data to the receiver’s interface.

What is the protocol that the writer in above sentence is referring to?

1) FTP 3) MAC 5) UDP


2) HTTP 4) TCP

5. Given below are some characteristics of Transmission Control Protocol (TCP) and User
Datagram Protocol (UDP):
A. Best suited for applications that need high reliability and where the transmission time is
less critical.
B. Faster and requires fewer resources.
C. Guarantees that no packets are missing.
D. Packets may not arrive in order.
E. Used for voice communications over internet.

Which of the above are the characteristics of UDP?

1) A, B, and C only 3) A, D and E only 5) B, D and E only


2) A, C and E only 4) B, C and D only

6. Which of the following is/are examples for the use of the Client-Server model?
A. A user orienting a document using a printer connected to her computer.
B. A bank customer accessing online banking services with a web browser.
C. A cashier of a shop that accepts payments by credit cards.

1) A only 3) C only 5) B and C only


2) B only 4) A and C only

WORK BOOK | RIYAS RUSHARD 99


7. Sender A wants to send the message HELLO to receiver B. Before sending the message, it is
converted to IFMMP. Which of the following is correct with respect to this scenario?

A. HELLO is the plain text while IFMMP is the cipher text


B. IFMMP is the result of applying the ASCII code to HELLO
C. +1 is the encryption key while -1 is the decryption key
1) A only 3) A and C only 5) All A, B, and C only
2) A and B only 4) B and C only

8. Consider the following paragraph with three blank labelled A, B and C:

When there are multiple computers in an office, each computer can be given a private IP
address. The router in the office gets a ….A…. IP address, and each of the computers
connected to that router through guided/ unguided media gets a private IP address from the
….B…. via the ….C…. protocol.
1) A – Private, B – File server, C – HTTP
2) A – Private, B – Internet, C – DHCP
3) A – Private, B – Router, C – FTP
4) A – Public, B – File server, C – FTP
5) A – Public, B – Router, C – DHCP

9.
a. Parity Check is a simple technique to detect errors on data communication.
Assume the seven bits 1010110 need to be transmitted. Explain how the odd parity check
can be performed to detect any error in its transmission.

b. The ABC Company has two main divisions, namely Production and Marketing. Under the
Production division, there are three units, namely Stores, Supplies and Operations
having 12 and 18 computers, respectively. Marketing division has 40 computers. ABC
Company has been given the 192.174.19.0/25 IP address block. All the computers of the
ABC Company are to be assigned IP addresses after making the subnets from this address
block.

The following incomplete table shows the sub netting. Copy it to your answer sheet and fill
the empty entries.

Unit Network ID Broadcast ID SNM Nodes Range

Marketing 192.174.19.0 64

Stores 192.174.19.79 16

Supplies 192.174.19.96 16

Operations 192.174.19.159 32

WORK BOOK | RIYAS RUSHARD 100


c. Mohan has ten (10) desktop computers and a router having 2 ports with a 64 Mbps
Internet connection. Each computer has an adequate number of network interface cards.
HE also has sufficient number of RJ 45 connected twisted pair cables.

Mohan wants to start an Internet Browsing Center with the above equipment and seeks
your advice for it, He informs you that he is not in a position to invest money for any new
equipment.

I. Which network topology will you suggest for Mohan?

II. Draw the logical arrangement of the network that you propose.

III. Mohan would like to improve the connection speed to the clients while saving the
existing bandwidth of the Internet connection. Further he needs to have the
control of the Internet access while ensuring the privacy of the client. What is the
technical suggestion you would give for this?

IV. There is a need to protect this private network by filtering the communication
traffic and blocking outsiders from gaining unauthorized access. What mechanism
will you suggest to achieve this?

V. Include the solutions that you proposed for (III) and (IV) above in the logical
network arrangement that you drew for (II).

WORK BOOK | RIYAS RUSHARD 101


AL 2020

10. Which of the following statement regarding guided and unguided media are correct?
A – Guided media transmission support higher data speed than unguided media transmission
B – Guided media is subjected to less interference than unguided media.
C – Unguided media transmission is more secure than guided media transmission
D- Unguided Media transmission uses low bandwidth than guided media transmission
i. A, B and C only iii. A, C and D only v. All above
ii. A, B and D only iv. B, C and D only

11. What is the process carried out in the modulation technique in data transmission?
i. Encoding information in transmitted signal
ii. Encoding signals in transmitted information
iii. Extracting signal from the transmitted information
iv. Transfer information with minimum distortion

12. Which of the following statement about bus topology are incorrect?
A- Computers and network devices are connected to a single cable
B- All traffic flows are either clockwise or anti clockwise
C- Each node is connected to two of its neighbors
i. A and B only iii. B and C only v. C and D only
ii. A and D only iv. B and D only

13. Consider the following statement with a blank


A media access control (MAC) address is usually represented in ……………………… numbers.
Which of the following is suitable to fill the blank?
i. Binary iii. Hexadecimal v. Octal
ii. Decimal iv. Natural

14. You are requested to create 16 subnets with a class C IP. Which subnet mask is suitable to
create the subnet?
i. 255.255.255.240 iii. 255.255.255.250 v. 255.2552.55.224
ii. 255.255.255.248 iv. 255.255.255.252

15. Consider the following Scenario:

The PQR Company has three departments namely, Finance, Marketing and Human Resource
(HR).
At Present all the activities of the PQR Company are conducted manually. The Company
decided to computerize all their activities by establishing an IT Unit with a computer lab for
staff training.
Resources will be allocated for each department and the IT unit as follows.

Resource
Department
Computers Printer Type Software Server

Finance 28 01 Network Printer Accounting Info Sys

HR 40 01 Network Printer Human Resource Sys

IT Unit 50 01 Printer Learning Management Sys

Marketing 35 01 Network Printer Marketing Info Sys

WORK BOOK | RIYAS RUSHARD 102


The company proposed the followings:
§ A Local area network (LAN) for each department and the IT unit in order to share specific
software and resources
§ LANs in each department to be interconnected via IT unit
§ All computer to be given efficient Internet Connectivity with the help of DNS (Domain name
System) and Proxy Server
§ An Internet Service Provider (ISP) to supply the Internet Connectivity to the IT unit
§ The Entire Network to be protected through a firewall

a) Which network topology is the most suitable to satisfy all the above-mentioned
requirements? Give on reason to justify your answer

b) The Network administrator has received 192.168.14.0/24 as the IP address block for the
company
The IP address for the nodes is to be allocated after making four subnets from this address
block for each department/Unit.

The following incomplete table shows the sub-netting. Write down the missing IP address for each
department/Unit using the following table format. (Assume that subnetting is done under
consideration of future expansion of each department/Unit.)

NETWORK ID BROADCAST ID SUBNET MASK ADDRESS RANGE

255.255.255.192

FINANCE
192.168.14.63 192.168.14.1 -
192.168.14.0
192.168.14.62
255.255.255.192

192.168.14.127 192.168.14.65
192.168.14.64
-192.168.14.12

HR
6
255.255.255.192

192.168.14.128 192.168.14.191

IT UNIT
192.168.14.129
255.255.255.192 -192.168.14.19
0

MARKETING
192.168.14.192 192.168.14.255 255.255.255.192

192.168.14.193

c) Showing clearly the connection topology and the devices, Draw the logical arrangement for
The company network that the network administrator can implement to fulfill the
company’s requirement (Assume that additional IP address can be obtained)

Network Administrator decides to dynamically manage the IP address of the entire


network. Write down the mechanism that needs to be implemented to achieve this task.

WORK BOOK | RIYAS RUSHARD 103


AL 2019

16. Consider the following Scenario:


A School has acquired the following resources to its Administrative (Admin) , Laboratory (Lab)
and Library (Lib) building.
§ Admin: 5 Computers, 1 Printer
§ Lab: 40 Computers, 1 Printer
§ Lib: 10 Computers, 1 Printer

A school computer network has to be created to fulfill the following requirement:


• Each building needs to have its own LAN in order to share the printer
• The above three network are also to be interconnected so that the school information
system SIS which is running on one computer in the admin building and the library
information system LIS running on one computer in the Lib building are accessible
from all computers
• All computers is to be given efficient internet connectivity as well. For this purpose, the
school has subscribed to an ISP Internet service Provider who is to supply the internet
connectivity to the lab building. The lab building is separated from the other two
building by approximately 500m. One computer in the Lab building is to be used as the
DNS server. Another computer in lab building is to be used as the proxy server
• The entire network is to be protected through a firewall

c. The principal has received the 192.248.16.0/24 IP address block for the school. The IP
addresses for the computer are to be allocated after making three subnets from this
address block for the three buildings
Assume such subnetting is done; write down the relevant network address, subnet mask
and the allocated range of IP address using the following table format to present your
answer

Network Addresses Subnet Mask IP addresses range


ADMIN
LAB
LIBRARY

d. Give one reason as to why a fully connected network topology is not suitable for this
school computer network

e. The lab administrator who is responsible to setup the school computer network has
requested for switches and a router.
Showing clearly the network connection topology and the devices, draw the network
diagram to represent the logical arrangement for the school computer network that the
lab administrator can implement to fulfill the school requirement.

f. Give one reason as to why TCP Is preferred over UDP as the transport protocol for the
school computer network.

WORK BOOK | RIYAS RUSHARD 104


AL 2018

17. Consider the following statements.


A – In public key encryption systems each pair of communicating entities share a single key for
encryption and decryption
B – Phishing is a type of social engineering attack often used to steal user data such as
username and password
C – Port Scanning is a method which can be used by attackers to identify open ports or
services on a network host
D – Digital signature can be used for email message authentication
Which of the above statements are correct?
a. B and C only c. A,C and D only e. All above
b. A, B and C only d. B, C and D only

18. Consider the following statements


A – DHCP server in an IP network dynamically allocates IP address to network devices
B – DNS server translate domain names to IP address
C – FTP server caches the recently accessed web pages
Which of the above statements are correct?
a. A only c. A and B only e. All above
b. B only d. B and C only

19. Consider the following statements


A – TCP is a connection oriented and reliable protocol
B – UDP is a connectionless and unreliable protocol
C – TCP and UDP are transport layer protocol
Which of the above statements are correct?
a. A only c. A and B only e. All above
b. B only d. B and C only

20. In the OSI reference model, the network layer is responsible for …………………………
communication.
Which of the following is suitable to fill the blank in the above statements?
a. Node to Node
b. Switch to Router
c. Source to Destination
d. Process to Process
e. Hop to Hop

21. Which of the following network classes does the IP address 192.248.254.1belongs?
a. A b. B c. C d. D e. E

22. In the OSI reference model, a protocol data unit of the network layer is referred to as a
……………………
a. Frame c. Window e. Packet
b. Segment d. Message

23. Consider the following scenario

(a) The XYZ Company has six departments namely Production, Accounts, Sales, Administration,
Maintenance and IT Service. The following table shows the number of computers available
in each of the departments.

WORK BOOK | RIYAS RUSHARD 105


Department No Department No of Computers

D01 Production 25
D02 Accounts 30
D03 Sales 18
D04 Administration 30
D05 Maintenance 25
D06 IT Service 28

Each Department needs to have their own local area network. Network administrator has received
a class C IP address block 192.248.154.0/24. It is required to subnet the IP address block to satisfy
the requirements of each department and allocate IP address to them.
i. How many addresses are available in the IP address Block?

ii. What are the first and last addresses of the IP address Block

iii. How Many Host Bits are required to create the required subnets?

iv. After subnetting, write the relevant Network Address, Subnet Mask and Allocated range
of IP for each department

Department No Network Address Subnet Mask IP Address Range

D01

D02

D03

D04

D05

D06

(b) The XYZ Company links the five departments and connects those departments to the
internet through the IT Service Department. The network has been completed by laying the
cables and installing six switches, a router and a firewall. All six departments are situated in
six separate buildings.

The Administrator allows all subnets to access the Internet through a proxy server. The
proxy server and the DNS server are located in the IT Service Department, Draw a Labelled
Network Diagram.

(c) After setting up the network any employee of any department was able to access the URL
http://www.nie.lk through a web browser in a computer. However, one day an employee
finds that he cannot access the website from computer in his department
Write three possible reasons for the above problem.

WORK BOOK | RIYAS RUSHARD 106


AL 2017

24. In electronic mail systems, the protocol used by the mail clients to retrieve message from the
mail server is
a. SMTP
b. FTP
c. ICMP – Internet control Message Protocol
d. IMAP – Internet Message Access Protocol
e. Telnet

25. The Transport layer protocol User Datagram Protocol (UDP) can be used for
a. Reliable communication
b. Guaranteed Delivery
c. Connection Oriented Communication
d. Ordered Delivery
e. Exchanging state information among routers

26. Which of the following statements regarding MAC addresses is correct?


a. Every network has a unique MAC address
b. Every network host has a unique MAC address
c. Every network interface has a unique MAC address
d. It is assigned for a device at the time of installation
e. It is used for routing

27. The first and the Last IP address of a subnet are 192.192.48.0 and 192.192.63.255 respectively.
Which of the followings is the subnet mask of this subnet?
a. 255.255.255.0
b. 255.255.192.0
c. 255.255.255.192
d. 255.255.240.0
e. 255.240.0.0

28. 172.168.48.200/24 is a
a. host address in a class B network
b. network address of a class C network
c. host address in 172.16.48.0/24 subnet
d. Network address of a subnet with 255 hosts
e. Host address with 8 network bits

29. In TCP/IP computer networks, Transport Protocol Data Unit (PDU) is referred to as a
a. Packet
b. Frame
c. Segment
d. Window
e. Message

WORK BOOK | RIYAS RUSHARD 107


123.45.67.1/27

123.45.67.3/27
123.45.67.2/27

NA 10.0.0.0/10
Part B
30. A “DEMILITARIZED ZONE - DMZ” is a subnet that contains and exposes an organization’s
external facing services such as web servers (Public IP addresses) to the Internet while hiding
away the rest of the network behind a firewall (Using Local IP Addresses)

A network with a DMZ belonging to an organization has been assigned the public IP address
NA 10.192.0.0/10 range 123.45.67.0 with subnet mask 255.255.255.224. The DMZ contains the web server and
the mail server. It has 4 additional subnets for internal use having the private IP address range
NA 10.64.0.0/10 NA 10.128.0.0/10 10.0.0.0 with the subnet mask 255.0.0.0. Computers in each subnet can access resources in all
other subnets. The organization decided to connect the 4 subnets to the Internet through a
proxy server. There is also an application server for its internal clients.

Identify the devices required to establish this network and draw a network diagram to show
the logical arrangement of the organization’s computer network.

Show all the elements of the network with appropriate IP addresses. Clearly show all
calculations stating assumptions you made.
Further, it is also required to explain the changes done to an IP packet released by a computer
to a subnet by the proxy server when it travels to the Internet.

WORK BOOK | RIYAS RUSHARD 108


AL 2016

31. “An analog signal is sampled at regular intervals and represented as 16 bits values”
Which of the following is best described by the above statement?
a. Amplitude Modulation AM d. Phase Modulation PM
b. Frequency Modulation FM e. Pulse width Modulation PWM
c. Pulse code Modulation PCM

32. Two Machines with the IP addresses 192.248.16.30 and 192.248.16.90 are connected to a local
area network (LAN). Which of the following is a suitable subnet mask for this network?
a. 192.255.255.255. c. 255.255.255.224 e. 255.255.255.255
b. 192.248.16.0 d. 255.255.255.128

33. In a public Key Cryptographic System, the private Key of a person X is given by the function
Private(X) and the public key is given by the function Pub(X)
Consider the following Statements:
a. Private(X) and Pub(X) should be the same for better security
b. A Message encrypted using Pub(X) can be Decrypted using Pub(X)
c. The Person X knows both Private(X) and Pub(X)
Which of the above statements is/are correct?

34. LAN has 500 network Devices. What is the most appropriate subnet mask for this computer
network?
a. 255.255.255.0 c. 255.255.255.192 e. 255.255.254.0
b. 255.255.255.128 d. 355.255.255.254

Part B
35. There are two Local Area Networks (LANs) L1 and L2 which are connected only by a router R.
These LANs are not connected to any other networks. Machines P and Q are connected to
LANs L1 and L2 respectively. The machine P has successfully delivered an IP packet IP1 to
machine Q.

In a LAN, an IP packet is sent from the source device to the destination device by inserting it
into a frame, generated in the data link layer at the source device. In that LAN, source and
destination devices are uniquely identified by the MAC addresses in that frame.

An IP address is recognized by the network layer but it is not recognized by the data link layer.

(a) Draw a network diagram to depict the network described above using commonly used
symbols and notations.

(b) State whether the destination IP address of the packet IP1 is the IP address of Q or R when
it is going through LAN Ll. Justify your answer.

(c) Assume that the IP packet ·1Pl was in a frame F2 in LAN L2. State whether the source MAC
address of frame F2 is the MAC address of P or R. Justify your answer.

WORK BOOK | RIYAS RUSHARD 109


AL 2015

36. …………………… is used for analog signal to digital signal conversion.


Which of the following is best described by the above statement?
a. Frequency Modulation FM c. Phase Modulation PM
b. Pulse code Modulation PCM d. Time Division Modulation TDM

37. A company in a network is configured with the IP address 192.248.16.91 and the subnet mask
255.255.255.128
Which of the following IP address cannot be assigned to a computer in the same network?
a. 192.248.16.161 c. 192.248.16.110 e. 192.248.16.120

PIZZA BUNDLE!!!! b. 192.248.16.78 d. 192.148.16.75

38. Which of the following statements is correct with respect to the Transmission Control Protocol
(TCP)?
A Network has been assigned a. TCP is a network layer protocol

with a Subnet Mask of 255.255.248.0 b. TCP guarantees that each byte sent is received at the receiver
c. Only one application at a time can use TCP in a computer
d. HTTP uses TCP
e. TCP uses UDP as the Transport Protocol
Find out How many Host per Subnet
can be allocated for the above network 39. A LAN uses the subnet Mask 255.255.240.0. How many different IP address can be assigned to
devices in this LAN?
a. 254 b. 256 c. 1024 d. 2046 e. 4094

40. Which of the following statements is correct with respect to routing in the Internet?
a. There can be at most one router in any given LAN
b. A router can have more than one network interface
c. Routing is a functionality of the transport layer
d. All routers function as HTTP proxies

41. In a public Key Cryptographic System, the private Key of a person X is given by the function
Private(X) and the public key is given by the function Pub(X).
a. Pub(x) is used to encrypt a message that can only be decrypted using priv(x)
b. Pub(x) is used to sign a message to be sent to x
c. A message encrypted using pub(x) can be destroyed using pub(x)
Which of the above statements is/are correct?
1. A only 3. C only 5. B and C
2. B only 4. A and B

42. Consider the following statements regarding a server with the domain name www.bogus.lk.
A : The server www.bogus.lk can be located anywhere in the world
B : www.bogus.lk must be a web server
C : The domain names www.bogus.lk and www.bogus.com can be resolved to the same IP
address.
Which of the above statements is/are correct?
a. A only c. C only e. A and C
b. B only d. A and B

WORK BOOK | RIYAS RUSHARD 110

You might also like