0% found this document useful (0 votes)
10 views3 pages

LAN Practice

Uploaded by

masters son
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

LAN Practice

Uploaded by

masters son
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Question 1.

Which of the following layers is an addition to OSI model when compared with TCP IP
model?
A. Application layer B. Presentation layer
C. Session and Presentation layer D. Session layer
Question 2. Application layer is implemented in ____________
A. End system B. NIC C. Ethernet D. Packet
transport
Question 3. An IP address of 192.168.0.100 /27 belongs to which of the following subnets?
A. 192.168.0.96 B. 192.168.0.64 C. 192.168.0.92 D.
192.168.0.128
Question 4. A local telephone network is an example of a _______ network.
A. Circuit switched B. Bit switched C. Packet switched D. Line
switched
Question 5. What is the range of assignable IP addresses for a subnet containing an IP address of
172.16.1.10/19?
A. 172.16.0.1 – 172.16.31.254 B. 172.16.0.0 – 172.16.31.255
C. 172.16.0.1 – 172.16.31.255 D. 172.16.0.1 – 172.16.63.254
Question 6. The number of layers in ISO OSI reference model is __________
A. 5 B. 10 C. 7 D. 6
Question 7. You are assigning IP addresses to hosts in the 192.168.4.0 /26 subnet. Which
the following IP addresses are assignable IP addresses that reside in that subnet?
A. 192.168.4.0 B. 192.168.4.62 C. 192.168.4.19 D.
192.168.4.63
Question 8. Data communication system spanning states, countries, or the whole world is ________
A. WAN B. MAN C. LAN D. PAN
Question 9. In the OSI model, as a data packet moves from the lower to the upper layers, headers are
_______
A. Removed B. Added C. Rearranged D.
Randomized
Question 10. Transport layer is implemented in ______________
A. End system B. Signal transmission
C. Ethernet D. NIC
Question 11. In computer network nodes are _________
A. the computer that routes the data
B. the computer that originates the data
C. the computer that terminates the data
D. all of the mentioned
Question 12. A list of protocols used by a system, one protocol per layer, is called ________
A. protocol architecture B. protocol suite
C. protocol stack D. protocol system
Question 13. The functionalities of the presentation layer include ____________
A. Data compression B. Data description
C. All of the mentioned D. Data encryption
Question 14. What is the directed broadcast address of a subnet containing an IP address of
172.16.1.10 /19?
A. 172.16.255.255 B. 172.16.15.255 C. 172.16.95.255 D.
172.16.31.255
Question 15. A host in your network has been assigned an IP address of 192.168.181.182 /25.
What is the subnet to which the host belongs?
A. 192.168.181.128 /25 B. 192.168.181.0 /25
C. 192.168.181.192 /25 D. 192.168.181.176 /25
Question 16. Which network topology requires a central controller or hub?
A. Mesh B. Ring C. Bus D. Star
Question 17. Communication channel is shared by all the machines on the network in ________
A. multicast network B. unicast network C. broadcast network D. anycast
network
Question 18. How many layers are present in the Internet protocol stack (TCP/IP model)?
A. 7 B. 6 C. 10 D. 5
Question 19. Two devices are in network if __________
A. a process in one device is able to exchange information with a process in another device
B. a process is active and another is inactive
C. a process is running on both devices
D. PIDs of the processes running of different devices are same
Question 20. WAN stands for __________
A. Wide area network B. World area network
C. Web area network D. Web access network
Question 21. In TDM, slots are further divided into __________
A. Bits B. Packets C. Seconds D. Frames
Question 22. What is the subnet address of the IP address 192.168.5.55 with a subnet mask of
255.255.255.224?
A. 192.168.5.16 /27 B. 192.168.5.48 /27 C. 192.168.5.32 /27 D.
192.168.5.0 /27
Question 23. Physical or logical arrangement of network is __________
A. Routing B. Topology C. Networking D. Control
Question 24. When collection of various computers seems a single coherent system to its client, then it is
called _________
A. mail system B. distributed system
C. networking system D. computer network
Question 25. Delimiting and synchronization of data exchange is provided by __________
A. Link layer B. Session layer C. Transport layer D.
Application layer
Question 26. Which of the following computer networks is built on the top of another network?
A. prime network B. prior network C. chief network D. overlay
network
Question 27. Bluetooth is an example of __________
A. personal area network B. local area network
C. wide area network D. virtual private network
Question 28. Network congestion occurs _________
A. when a system terminates
B. in case of traffic overloading
C. when connection between two nodes terminates
D. in case of transfer failure
Question 29. You are working for a company that will be using the 192.168.1.0 /24 private IP
address space for IP addressing inside their organization.
They have multiple geographical locations and want to carve up the 192.168.1.0 /24 address space
into subnets. Their largest subnet will need 13 hosts. What subnet mask should you use to
accommodate at least 13 hosts per subnet, while maximizing the number of subnets that can be
created?
A. 255.255.255.248 B. 255.255.255.252 C. 255.255.255.224 D.
255.255.255.240
Question 30. In OSI model, when data is sent from device A to device B, the 5th layer to receive data at
B is _________
A. Session layer B. Transport layer C. Link layer D.
Application layer
Question 31. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet
mask. How many subnets can be created by using this subnet mask?
A. 30 B. 32 C. 8 D. 16
Question 32. A __________ is a device that forwards packets between networks by processing the
routing information included in the packet.
A. firewall B. router C. hub D. bridge
Question 33. _______ topology requires a multipoint connection.
A. Star B. Ring C. Bus D. Mesh
Question 34. In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data
at B is ____________
A. Link layer B. Application layer C. Session layer D.
Transport layer
Question 35. Coaxial cable consists of _______ concentric copper conductors.
A. 2 B. 1 C. 4 D. 3
Question 36. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet
mask. How many assignable addresses are available in each of the subnets?
A. 16 B. 30 C. 14 D. 32
Question 37. You are working with a Class B network with the private IP address of 172.16.0.0/16.
You need to maximize the number of broadcast domains, where each broadcast domain can
accommodate 1000 hosts. What subnet mask should you use?
A. /24 B. /22 C. /25 D. /23
Question 38. _____ is the multiplexing technique that shifts each signal to a different carrier frequency.
A. TDM B. Both FDM & TDM C. FDM D. PDM
Question 39. Which of the following networks extends a private network across public networks?
A. virtual private network B. storage area network
C. enterprise private network D. local area network
Question 40. Data communication system within a building or campus is________
A. PAN B. MAN C. WAN D. LAN

You might also like