0% found this document useful (0 votes)
33 views6 pages

Computer - Networks - Midterm Exam 2024 - Model 1

Uploaded by

ehabsherif75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views6 pages

Computer - Networks - Midterm Exam 2024 - Model 1

Uploaded by

ehabsherif75
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Assiut University 4th Level – 1st Semester

Faculty of Commerce Model 1


Business Information Systems (BIS) (Computer Networks)

Name: _______________________ Group ___________________________


Choose the correct answer for each question of the following:

1- IF the switch did not find the destination MAC address in the switching
table (MAC address table) it will _________
A Drop the packet and send B Send the packet out of all ports
“Destination host is unreachable to except the one received from
the source”
C Send the packet out of all ports D Non of the previous

2- The transmission delay of a file of size equals 5 Mbyte if transmitted


over a link with transmission rate of 1 Mbps equals________
A 40 Second B 40 millisecond
C 5 millisecond C 5 m second

3- A company connecting two of its branches using ADSL connection


through the internet where each branch has a Download rate of 10
Mbps and upload throughput of 1 Mbps. If a branch needs to download
a file from the other branch, in the best scenario, the net throughput will
be ____.
A 10 Mbps B 1 Mbps
C 5 Mbps D Non of the previous

4- Two switches separated by 350 meters apart to be connected together.


Which of the following is suitable type of cables to be used
A Fiber optic cable B UTP
C STP D B and C

5- One of the main disadvantages of the fiber optical cable is ____


A Not immune to EMI B Limited distance

C Does not have proper shield D Consider relatively fragile

Page - 1 - of 6
6- The protocol responsible of associating a MAC address with a specific IP address is
A RARP protocol C ARP protocol
B NetBIOS protocol D All of the previous

7- IF 15 devices are to be connected in a full mesh topology, ____


connections are needed.
A 150 C 15
B 105 D 30

8- In the OSI model, the ________ define how actual data are transmitted
from node to node
A bottom 3 layers (1 to 3) C upper 3 layers ( 5 to 7)
B bottom 4 layers ( 1 to 4) D upper 4 layers ( 4 to 7)

9- When the data is passed from one layer to another each layer add its
own header. This process is called ________ process.
A encapsulation B Decapsulation
c Framing D Layering

10- switches use ______to make forwarding decisions.


A Destination MAC addresses B Source MAC addresses
C Both source and destination MAC D Non of the previous
address

11- Which of the following fields of the TCP frame is used to check
the correctness (integrity) of the received data
A Error recovery B Error detection
C checksum D HEC

Page - 2 - of 6
12- Which of the following protocols utilizes destination port number
to distinguish the type of transmitted traffic it requests.
A TCP B UDP

C Both A and B D Non of the previous answers

13- Which one of the following services can use UDP to transmit its
packets ?
A Voice over IP (VoIP) B File transfer

C Email D Non of the above

14- Which of the following commands are used to identify the


different Layer 3 hops between the source and destination?
A ping B Trace route (tracert)

C Nslookup D Ipconfig

15- If class C network is sub-netted with a /28 subnet mask,


the number of usable IP ( can be assigned to hosts) equals ____ .
A 16 B 8

C 32 D Non of the previous

16- IF class A network is sub-netted with a /20 subnet mask,


the number of resulted subnets equal _________.
A 210 B 220

C 28 D Non of the previous

17- ______ is used to assign IP address to hosts automatically


A DNS server B DHCP server

C ARP Server D Non of the previous

18- The TTL field in the IP header identify ______

Page - 3 - of 6
A The maximum number of L3 hops B Set to one if L3 loop occurs in the path
the packet can pass through before
dropped
C TTL = Time Too Large = The D Non of the previous
maximum time before the packet is
dropped

19- Which of the following is NOT a valid subnet mask (note: the
sub-netmask is written in binary format)
A 11111111.11111111.11000000.00000000 B 11111111.00000000.00000000. 00000000

C 11111111.11111111.11000000.00001111 D All of the above

20- In class C networks (classful subnetting), the number of hosts per


network equals
A 256 B 254

C 250 D Non of the previous

21- The default subnet mask of class A is _____


A 255.0.0.0 B 255.255.255.0

C 256.0.0.0 D Non of the previous

22- _____________is the time it takes to transmit all of the packet's


bits into the link.
A Propagation delay B Transmission delay
C Queuing delay D Processing delay

Page - 4 - of 6
23- In the network shown there are _________

A Single broadcast domain and single B Three collision domains and single
collision domains broadcast domain
c Three broadcast domains and single D Three collision domains and three
collision domain broadcast domain

24- If a host want to send a packet to another host which is not in its
network, then it forwards it first to the____.
A DNS server B Network Switch

C Default gateway D Non of the previous

True of False
25- MAC addresses have a hierarchical structure.
A True B False

26- As UDP does not have a retransmission technique so it uses flow and congestion control
mechanisms to ensure the best effort in delivering the packets from source to destination
A True B False

27- It is acceptable to use STP or UTP cable to connect two switches separated by 80 meter
from each other.
A True B False

Page - 5 - of 6
28- If two devices in the same collision domain, they can not transmit successfully at the
same time.
A True B False

29- Generally, using OSI network model does not allow change in one layer from affecting
other layers design
A True B False

30- Both the switch and router can identify the MAC address of the received frames.
A True B False

31- The main drawback of the hub is that can read up to layer 2 only in the incoming frame
making all ports in the same collision domain.
A True B False

32- The MAC address ( hardware address) is unique per interface


A True B False

33- When a client requests an a webpage from a webserver ( using HTTP protocol) the
source port and destination port must be equal 80
A True B False

34- In ADSL connection, both Voice and Data are transmitted simultaneously in an analog
form over the phone line
A True B False

35- Basic Start Topology is considered a single point of failure.


A True B False

Best Wishes
Dr Mohamed Medhat

Page - 6 - of 6

You might also like