Network General Question
Network General Question
2. Computers:
24 x PCs (e.g., PC0 to PC23)
3. Cabling:
Ethernet cables (Straight-through cables for connecting PCs to the switch)
Assign static IP addresses to the server and dynamic IP addresses to clients (using DHCP if
available).
Example IP configuration:
Server: 192.168.1.1
Clients: 192.168.1.2 to 192.168.1.10
4. Testing:
Ensure clients can access the server's resources (e.g., shared files).
Each PC is configured to share its resources (files, printers) with other PCs.
No dedicated server is required; each PC can access resources from any other PC.
2. Network Configuration:
Ensure that PCs can access shared resources from each other.
Basic Differences Between Client-Server and Peer-to-Peer
Networks
| Feature | Client-Server Network | Peer-to-Peer Network |
|-----------------------------|------------------------------------------------|-------------------------------------
---------| | Architecture | Centralized; relies on a dedicated server. | Decentralized; all
devices are equal. | | Resource Management | Server manages resources and
services. | Each device manages its own resources. | | Scalability | More scalable; can
add more clients easily. | Limited scalability; performance may degrade with more
peers. | | Security | Generally more secure; centralized control. | Less secure; each
device must manage its own security. | | Cost | Higher initial cost due to server
hardware/software. | Lower cost; no need for dedicated server. | | Performance | Better
performance for large networks. | Performance can decrease as more devices are
added. | | Maintenance | Centralized maintenance; easier to manage. | More complex
maintenance; each device must be managed individually. |
2. Assign IP Addresses:
PC1:
IP Address: 192.168.1.2
Subnet Mask: 255.255.255.0
PC2:
IP Address: 192.168.1.3
Subnet Mask: 255.255.255.0
PC3:
IP Address: 192.168.1.4
Subnet Mask: 255.255.255.0
PC4:
IP Address: 192.168.1.5
Subnet Mask: 255.255.255.0
3. Configure TCP/IP Settings:
On Windows:
Go to Control Panel > Network and Sharing Center > Change adapter settings.
Right-click on the network adapter and select "Properties."
Select "Internet Protocol Version 4 (TCP/IPv4)" and click "Properties."
Choose "Use the following IP address" and enter the IP address and subnet mask.
On macOS:
Go to System Preferences > Network.
Select the active network interface and click "Advanced."
Go to the "TCP/IP" tab and set "Configure IPv4" to "Manually." Enter the IP address and
subnet mask.
On Linux:
Use the ifconfig command to set the IP address or edit the network configuration files
depending on the distribution.
4. Test Connectivity:
Use the ping command from each PC to test connectivity to the other PCs and the
switch.
Example command: ping 192.168.1.3 (from PC1 to PC2).
Here are the correct answers to the objective type questions you provided:
1. Which of the following is not the layer of TCP/IP protocol?
B) Session Layer
(The TCP/IP model consists of Application, Transport, Internet, and Network
Interface layers, but does not include a Session layer.)
2. Address use 7 bits for the ________ and 24 bits for the ________ portion of
the IP address.
A) Class A
(Class A addresses use 7 bits for the network portion and 24 bits for the host
portion.)
3. Addresses are reserved for multicasting.
C) Class D
(Class D addresses are used for multicast groups.)
4. Which of the following is an 802.3u specification?
C) 100BASE-TX
(100BASE-TX is the standard for Fast Ethernet, which is defined in the 802.3u
specification.)
5. Which of the following is a more appropriate choice for Ethernet connectivity?
B) Gigabit Ethernet as the link at the access layer to provide good
performance
(Gigabit Ethernet is a suitable choice for providing high performance at the
access layer.)
///////////////////////////////
"How DNS Works" by Computerphile: This video provides a clear explanation of the
DNS process.
"DNS Explained" by NetworkChuck: Offers a detailed overview of how DNS
functions.
Websites:
Cloudflare: They have a detailed explanation of how DNS works, often with diagrams
and animations.
DNS Made Easy: This site provides a visual representation of the DNS resolution
process.
Example of DNS Working Procedure
To visualize the working procedure of DNS, here’s a simplified step-by-step explanation:
1. User Enters URL: A user types a URL (e.g., www.example.com) into their web
browser.
2. DNS Query Initiation: The browser checks its local cache to see if it has the IP address
for the domain. If not, it sends a DNS query to a DNS resolver (usually provided by the
ISP).
3. Query to Root DNS Server: The DNS resolver queries a root DNS server to find out
which DNS server is responsible for the top-level domain (TLD) (.com in this case).
4. TLD DNS Server Response: The root server responds with the address of a TLD DNS
server that knows about the domain.
5. Query to Authoritative DNS Server: The resolver then queries the TLD server, which
responds with the address of the authoritative DNS server for the domain.
6. Final Response: The resolver queries the authoritative DNS server, which responds
with the IP address of the requested domain (e.g., 192.0.2.1).
7. Caching: The resolver caches the IP address for future requests and sends it back to
the user's browser.
8. Connection Established: The browser can now connect to the server at the IP address
and retrieve the website
////////////////////////////////
Manual Name Resolution Before we look at how your computer uses the DNS, we will see how a local
name server resolves a DNS name, i.e., we will interact with remote name servers. To do this exercise,
you will pretend to be the local name server and issue requests to remote name ervers using the dig
tool. Pick a domain name to resolve, such as that of your web server. We will use www.uwa.edu.au. Find
the IP address of one of the root name servers by searching the web. For example, the Wikipedia article
on root name servers includes the IP address of the root name servers a through m. Any one of these
should do, as they hold replicated information. You need this information to begin the name resolution
process, and name servers are provided with it as part of their configuration
You can find the IP addresses of root name servers from various sources,
including the Wikipedia article on root name servers. Here are a few examples
of root name server IP addresses:
bash
bash
Here’s an example of what the commands and outputs might look like:
bash
bash
57
2. Data communication system within a building or campus is A) MAN B) LAN C) WAN D) none of these
answers 3. Application layer protocol defines A) types of messages exchanged B) message format, syntax
and semantics C) rules for when and how processes send and respond to messages D) all of these
answers 4. TCP/IP model does not have _________ layer but OSI model have this layer. A) Presentation
layer B) application layer C) both session layer and presentation layer D) session layer 5. Which one of
the following tasks is not done by the data link layer? A) Framing B) channel coding C) flow control D)
error control 6. Data Link Control Protocol (HDLC) is implemented at the _________ A) Data link layer B)
Network layer C) transport layer D) Physical layer
Answeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeer
Use a cable stripper or scissors to carefully strip off about 2 inches of the plastic jacket from one
end of the UTP cable.
Be cautious not to nick or cut into the inner wires, as this can affect the cable's performance. If
you accidentally damage the wires, cut the end off and start over.
2. Spread the Wires:
Gently spread the individual wires apart while holding onto the base of the jacket with your other
hand. This prevents the wires from untwisting too much.
Ensure that you only have about 1/2 inch of untwisted wire at the end. If you have more than
that, trim the wires back to maintain the proper specification.
3. Arrange the Wires:
Depending on whether you are making a straight-through or crossover cable, arrange the wires
according to the T568A or T568B wiring standards. Below are the pinouts for both standards:
T568A Wiring Standard:
Once the wires are arranged in the correct order, trim them to ensure they are all the same
length, about 1 inch long from the jacket.
5. Insert Wires into RJ-45 Connector:
Hold the RJ-45 connector with the clip facing you. Carefully insert the wires into the connector,
ensuring that they go all the way to the end and maintain the correct order.
The jacket should also go into the connector slightly to provide strain relief.
6. Crimp the Connector:
Use a crimping tool to crimp the RJ-45 connector onto the cable. This will secure the wires in
place and make the electrical connections.
7. Repeat for the Other End:
If you are making a cable with two ends, repeat steps 1-6 for the other end of the cable.
After completing the cable, it is advisable to test it using a cable tester. This device checks for
continuity and ensures that the wires are correctly connected.
Connect one end of the cable to the main unit of the tester and the other end to the remote unit.
Turn on the tester and check the lights. A successful test will show that all pairs are correctly
wired.
2. Connect to a Network:
Once tested, you can connect the UTP cable to network devices such as switches, routers, or
computers.
1. Stripping the Fiber Jacket: Use a specialized fiber stripper to remove the outer jacket and
buffer coating.
2. Cleaving the Fiber: Use a cleaver to create a clean cut on the fiber.
3. Attaching Connectors: Use appropriate connectors (like SC, LC, or ST) and a fusion splicer or
mechanical splice to attach the connectors to the fiber.
4. Testing the Fiber: Use a fiber optic tester to check for signal loss and continuity.
//////////////////////////////////////////
Which of the following is not the layer of TCP/IP protocol? A) Application Layer B) Session Layer C)
Transport Layer D) Internetwork layer 2. Address use 7 bits for the and 24 bits for the portion of the IP
address. A) Class A C) Class C B) Class B D) Class D 3. addresses are reserved for multicasting. A)
Class B C) Class D B) Class C D) Class E 4. Which is not the Regional Internet Registers (RIR) of the
following? A) American Registry for Internet Numbers (ARIN) B) Europeans Registry for Internet
Numbers (ERIN) C) Reseaux IP Europeans (RIPE) D) Asia Pacific Network Information Centre (APNIC)
72
C). LPD D). X window 6. Which protocol deals with resolving domain names A). X-Window B). SMTP C).
DNS D). FTP 7. Which protocol ensures reliable delivery? A. TCP B. UDP C. Both of above D.
None of above 8. Which protocol uses both TCP and UDP A). FTP B). SMTP C). Telnet D). DNS 9. Which
IP is reserved for loopback testing A) 192.168.0.0 B) 10.255.255.255 C) 255.0.0.0 D) None of above 10.
Which protocol finds the MAC address from IP address? A) SMTP B) ICMP C) ARP D) RARP
Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasweeeeeeeeeeeeeeeeeeeeeeer
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASWEEEEEEEEEEEEEEEEEEEEEEEER
Connect one end of the console cable to the console port of the router or switch.
Connect the other end to the serial port of your computer. If your computer does not have a
serial port, you may need a USB-to-serial adapter.
2. Open Terminal Emulator:
Click "Open" in your terminal emulator. You should see the router or switch prompt. If it’s a new
device, you may need to press "Enter" to get to the command line.
bash
bash
Assuming you are configuring the interface connected to the local network (e.g.,
FastEthernet0/0):
bash
bash
PC1: 192.168.1.2
PC2: 192.168.1.3
PC3: 192.168.1.4
PC4: 192.168.1.5
PC5: 192.168.1.6
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1 (the router's IP address)
Procedure for Each Computer:
1. Open Network Settings:
On each computer, go to the network settings. This can usually be found in:
Windows: Control Panel > Network and Sharing Center > Change adapter settings.
macOS: System Preferences > Network.
Linux: Network settings can vary by distribution, but generally found in the system settings.
2. Configure IP Address:
Right-click on the network adapter (e.g., Ethernet) and select "Properties" (Windows) or
"Advanced" (macOS).
Select "Internet Protocol Version 4 (TCP/IPv4)" and click "Properties."
Choose "Use the following IP address" and enter the following details for each computer:
IP Address: (Use the respective IP address from the scheme above)
Subnet Mask: 255.255.255.0
Default Gateway: 192.168.1.1 (the IP address of your router)
3. Save Settings:
Click "OK" to save the settings and close the dialog boxes.
You can also ping other computers using their assigned IP addresses to ensure they can
communicate with each other.
///////////////////////
1. Which layers in the Internet model are the network support layers? 2. Which layer in the
Internet model is the user support layer? 3. What is the difference between network
layer delivery and transport layer delivery? 4. List the layers of the Internet model. 5.
What is a peer-to-peer process? 6. How does information get passed from one layer to
the next in the Internet model? 7. What are headers and trailers, and how do they get
added and removed? 8. What are the concerns of the physical layer in the Internet
model? 9. What are the responsibilities of the data link layer in the Internet mode
2. ASSSSSSSSSSSSSSSSSSSSS
Network Layer: Responsible for routing packets across the network and handling
logical addressing (IP addresses).
Data Link Layer: Responsible for node-to-node data transfer and handling physical
addressing (MAC addresses) within a local network segment.
Physical Layer: Responsible for the physical transmission of data over the network
medium, including electrical, optical, or radio signals.
2. Which layer in the Internet model is the user support layer?
The Application Layer is the user support layer in the Internet model. It provides
network services directly to end-user applications and facilitates user interaction with
the network.
1. Application Layer
2. Transport Layer
3. Internet Layer
4. Link Layer (also referred to as the Network Interface Layer or Data Link Layer)
5. What is a peer-to-peer process?
A peer-to-peer (P2P) process refers to a communication model where each participant
(peer) in the network can act as both a client and a server. In this model, peers can
share resources, such as files or processing power, directly with each other without the
need for a centralized server. P2P processes are commonly used in file-sharing
applications and decentralized networks.
6. How does information get passed from one layer to the next in
the Internet model?
Information is passed between layers in the Internet model through a process called
encapsulation and decapsulation:
Encapsulation: When data is sent from a higher layer to a lower layer, the higher layer
adds a header (and sometimes a trailer) to the data. This process continues down the
layers until the data reaches the physical layer, where it is transmitted over the network.
Decapsulation: When the data reaches the destination, each layer removes its
corresponding header (and trailer) as the data moves up the layers until it reaches the
application layer.
7. What are headers and trailers, and how do they get added and
removed?
Headers: Headers are additional information added to the data by each layer of the
Internet model. They contain control information, such as source and destination
addresses, sequence numbers, and protocol information. Headers are added during the
encapsulation process as data moves down the layers and are removed during
decapsulation as data moves up the layers.
Trailers: Trailers are similar to headers but are added at the end of the data packet.
They often contain error-checking information, such as a Frame Check Sequence
(FCS). Like headers, trailers are added during encapsulation and removed during
decapsulation.
8. What are the concerns of the physical layer in the Internet
model?
The concerns of the physical layer in the Internet model include:
Transmission Medium: The type of physical medium used for data transmission (e.g.,
copper cables, fiber optics, wireless).
Signal Encoding: How data is converted into signals for transmission (e.g., electrical
signals, light pulses).
Data Rate: The speed at which data is transmitted over the medium.
Physical Topology: The arrangement of devices and connections in the network (e.g.,
star, bus, ring).
Physical Characteristics: Factors such as voltage levels, timing, and synchronization
of signals.
9. What are the responsibilities of the data link layer in the
Internet model?
The responsibilities of the data link layer in the Internet model include:
Right-click on the network adapter you want to configure (usually named "Ethernet" or "Wi-Fi")
and select Properties.
3. Select Internet Protocol Version 4 (TCP/IPv4):
In the Properties window, scroll down and select Internet Protocol Version 4 (TCP/IPv4).
Click on Properties.
4. Assign a Static IP Address:
PC1:
IP Address: 192.168.1.2
PC2:
IP Address: 192.168.1.3
PC3:
IP Address: 192.168.1.4
PC4:
IP Address: 192.168.1.5
PC5:
IP Address: 192.168.1.6
PC6:
IP Address: 192.168.1.7
5. Save Settings:
Click OK to save the settings, then click Close on the network adapter properties window.
6. Repeat for Each Computer:
Follow the same steps for each of the six computers, using the respective IP addresses.
Right-click on the network adapter you want to configure (usually named "Ethernet" or "Wi-Fi")
and select Properties.
3. Select Internet Protocol Version 4 (TCP/IPv4):
In the Properties window, scroll down and select Internet Protocol Version 4 (TCP/IPv4).
Click on Properties.
4. Configure for Dynamic IP Addressing:
Click OK to save the settings, then click Close on the network adapter properties window.
6. Verify Dynamic IP Address:
Open the Command Prompt by typing cmd in the Start menu search and pressing Enter.
Type the command:
bash
1. Why should the IP addressing scheme be carefully planned and documented? (Choose two.)
C. Easiertroubleshooting
A. Voice
B. SMTP
C. Instant messaging
D. FTP
4. Which planning and design factors would be considered as part of manageability focus when
114
E. IP addressing scheme
F. Bandwidth requirement
B. Application layerservices interface with the network and prepare the data fortransfer.
device?
A. FTP
B. FTPS
C. HTTPS
D. Telnet
E. SSH
7. What factors should be taken into account when using a protocol analyzerto determine traffic
8. A key network switch has failed because of excessive humidity. What type of physical threat
A. Hardware threat
B. Environmental threat
C. Electrical threat
D. Maintenance threat
D. Ping of death
/////////////
Address Class
10.250.1.1 _____
150.10.15.0 _____
192.14.2.0 _____
148.17.9.1 _____
b. Using the IP address and subnet mask shown write out the network address:
1. 188.10.18.2
255.255.0.0 _____________________________
2. 10.10.48.80
255.255.255.0 _____________________________
3. 192.149.24.191
255.255.255.0 _____________________________
4. 150.203.23.19
255.255.0.0_____________________________
5. 10.10.10.10
255.0.0.0 _____________________________
129
1. 188.10.18.2
Subnet Mask: 255.255.0.0
Network Address: 188.10.0.0
2. 10.10.48.80
Subnet Mask: 255.255.255.0
Network Address: 10.10.48.0
3. 192.149.24.191
Subnet Mask: 255.255.255.0
Network Address: 192.149.24.0
4. 150.203.23.19
Subnet Mask: 255.255.0.0
Network Address: 150.203.0.0
5. 10.10.10.10
Subnet Mask: 255.0.0.0
Network Address: 10.0.0.0
Part C: Subnetting
Given the requirements:
Custom Subnet Mask: 255.255.255.252 (or /30) for 4 subnets, but we need to adjust for 14
usable hosts.
Custom Subnet Mask: 255.255.255.240 (or /28) gives us 16 addresses (14 usable).
4. Total Number of Subnets:
With a /28 subnet mask, we can have:
Total Number of Subnets: 16 (2^2 = 4 subnets, but since we are using 4 bits for hosts, we can
have 16 subnets)
5. Total Number of Host Addresses:
Summary of Part C:
Address Class: C
Default Subnet Mask: 255.255.255.0
Custom Subnet Mask: 255.255.255.240
Total Number of Subnets: 16
Total Number of Host Addresses: 16
Number of Usable Addresses: 14
////////////////
1. You have a network that needs 29 subnets while maximizing the number of host addresses available
on each subnet. How many bits must you borrow from the host field to provide the correct subnet
mask? A. 2 B. 3 C. 4 D. 5
2. If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the
valid subnet address of this host? A. 172.16.112.0 B. 172.16.0.0 C. 172.16.96.0 D.
172.16.255.0
3. You have an interface on a router with the IP address of 192.168.192.10/29. Including the router
interface, how many hosts can have IP addresses on the LAN attached to the router interface? A. 6
B. 8 C. 30 D. 38
4. The network address of 172.16.0.0/19 provides how many subnets and hosts? A.7 subnets, 30 hosts
each B. 8 subnets, 8,190 hosts each
5. On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the
waste of IP addresses? A. /27 B. /28 C. 29 D./30
6. To test the IP stack on your local host, which IP address would you ping? A. 127.0.0.0 B.
1.0.0.127 C. 127.0.0.1 D. 127.0.0.25
///////////////////
1. Unicast Address:
Definition: A unicast address is a unique identifier for a single network interface. It allows for
one-to-one communication.
Usage: When a packet is sent to a unicast address, it is delivered to a specific device on the
network. For example, when you send an email to a specific recipient, the email is sent to that
recipient's unique IP address.
2. Broadcast Address:
Definition: A broadcast address is used to send data to all devices on a local network segment.
Usage: When a packet is sent to a broadcast address, all devices on the network receive the
packet. For example, in IPv4, the broadcast address for a subnet is typically the highest address
in that subnet (e.g., 192.168.1.255 for the subnet 192.168.1.0/24).
3. Multicast Address:
Definition: A multicast address is used to send data to a specific group of devices that are part
of a multicast group.
Usage: Multicast is efficient for one-to-many communication, such as streaming video to
multiple users. For example, in IPv4, multicast addresses range from 224.0.0.0 to
239.255.255.255.
4. Anycast Address:
Definition: An anycast address is assigned to a group of interfaces, but the data is delivered to
the nearest interface (in terms of routing distance).
Usage: Anycast is often used in load balancing and redundancy scenarios. For example,
multiple servers can share the same anycast address, and the routing infrastructure will direct
traffic to the closest server.
147
protocol is down”Loop existed in the network a) There is no problem b) Clock rate not specified c) Link
is not working d) Enables to establish, configure and the check the data link connection over PPP
network of WAN Network control protocol(NCP) e) Extensible link control protocol(LCP) f) Frame relay
g) a and b
4) A device used to convert the user data from DTE into a form
acceptable to WAN service provider.
b) Modem
(A modem modulates and demodulates signals for transmission over telephone lines or
other media, converting user data into a form suitable for WAN service.)
bash
bash
bash
bash
bash
bash
bash
bash
bash
bash
bash
bash
Source MAC Address: The MAC address of the sender (the device making the ARP
request).
Destination MAC Address: The MAC address is set to the broadcast address
(FF:FF:FF:FF:FF:FF).
Type of Addressing: The source address is unicast (specific to the sender), and the
destination address is broadcast (sent to all devices on the local network).
4. Describe the Ethernet addressing used in the standard ARP
reply. Are the source and destination addresses unicast,
broadcast, or multicast?
In a standard ARP reply:
Source MAC Address: The MAC address of the device that is responding to the ARP
request.
Destination MAC Address: The MAC address of the original requester (the device that
sent the ARP request).
Type of Addressing: Both the source and destination addresses are unicast (the reply
is sent directly to the requester).
5. What is a gratuitous ARP?
A gratuitous ARP is an ARP request that a device sends to announce its own IP
address to the network. It does not require a corresponding ARP reply because it is
used primarily for:
Updating other devices' ARP tables with the sender's MAC address.
Detecting IP address conflicts on the network.
6. What information is stored in an ARP table?
An ARP table (or ARP cache) stores the following information:
1. Configure the routing protocol II. Theoretical I. Choose the correct answer from the available
alternatives
1. Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned,
and the current status? A. show ip interface brief B. ping C. show ip route D. show interface fa0/1
2.Which CLI mode allows users to access all device commands, such as those used for configuration,
management, and troubleshooting? A. user EXEC mode B. privileged EXEC mode C. global configuration
mode D. interface configuration mode 3.A router boots and enters setup mode. What is the reason for
this? A. The IOS image is corrupt. B. Cisco IOS is missing from flash memory. C. The configuration file is
missing from NVRAM. D. The POST process has detected hardware failure. 4. What will be the response
from the router after the command, “router(config)# hostname portsmouth” is entered? A.
portsmouth# B. portsmouth(config)# C. invalid input detected D. router(config-host)# E. hostname =
portsmouth portsmouth# F. ? command not recognized router(config)#
II. Theoretical
1. In which of the following modes in Cisco's IOS can you issue show commands?
A. User
B. Privileged
C. Line Configuration
D. Global Configuration
2. You are the network administrator for a large corporation. You want to be able to store all your
configurations in a centralized location. Which of these servers will allow you to do so? (Choose all that
apply.)
3. You need to troubleshoot your network IP connectivity. Which of the following commands would you
use to find the IP address on your Ethernet 0 interface?
A. ping
B. IPConfig
C. traceroute
4. Which command would you use in the CLI at User mode to enter Privileged EXEC mode?
204
5. You have just received 14 Catalyst 3550 switches for your network. What is required to get them
functioning correctly in your network?
A. Nothing
6. Which of the following prompts indicates your router is in Privileged EXEC mode?
A. Router> B. Router# C. Router& D. Router$
7. You have made a console connection to your Cisco Catalyst 1900 series switch and you see the >
symbol in HyperTerminal. What does it mean?
8. You would like to assign a meaningful name to your Catalyst 1900 series switch—what command
should you use?
A. enable
B. host name
C. hostname
D. name
9. You need to assign an IP address to your Catalyst 1912 switch. You are at the HQ_SW1> prompt. What
is the correct series of commands? (cr = carriage return)
10. Which of the following commands displays the syntax for the clock command?
B. TFTP
(Both FTP and TFTP can be used to store configurations centrally.)
3. You need to troubleshoot your network IP connectivity. Which of the following
commands would you use to find the IP address on your Ethernet 0 interface?
D. Show interface Ethernet 0
(This command displays the IP address and status of the specified interface.)
4. Which command would you use in the CLI at User mode to enter Privileged EXEC
mode?
C. Enable
(The enable command is used to enter Privileged EXEC mode.)
5. You have just received 14 Catalyst 3550 switches for your network. What is
required to get them functioning correctly in your network?
B. Set up an IP address on the switch
(You need to configure an IP address on the switches to manage them remotely.)
6. Which of the following prompts indicates your router is in Privileged EXEC
mode?
B. Router#
(The # symbol indicates that you are in Privileged EXEC mode.)
7. You have made a console connection to your Cisco Catalyst 1900 series switch
and you see the > symbol in HyperTerminal. What does it mean?
B. You are in User EXEC mode.
(The > symbol indicates that you are in User EXEC mode.)
8. You would like to assign a meaningful name to your Catalyst 1900 series switch—
what command should you use?
C. hostname
(The correct command to set the hostname is hostname.)
9. You need to assign an IP address to your Catalyst 1912 switch. You are at the
HQ_SW1> prompt. What is the correct series of commands? (cr = carriage return)
D. enable <cr> configure terminal <cr> ip address 10.1.1.1 255.0.0.0
(This sequence correctly enters Privileged EXEC mode, then global configuration mode,
and assigns an IP address.)
10. Which of the following commands displays the syntax for the clock command?
C. clock ?
(Using clock ? will display the syntax and options for the clock command.)
configure a wireless connection.
1. Connect to a Wireless network
II. Theoretical
3. What devices sends and receives radio signal in a wireless network A. Modem
B. digital translator
C. router
D. switch
4. Which short-range wireless standard is used for wireless personal area networks
A. Wireless fidelity
B. Wireless function
C. wireless functionality
D. None
A. PC
B. Game console
C. Mobile phone
Open a web browser and enter the router's IP address (commonly 192.168.1.1 or 192.168.0.1).
Log in using the default username and password (often found on the router or in the manual).
3. Configure Wireless Settings:
1. Click on the Wi-Fi icon and ensure you are connected to the correct network.
2. Open a web browser and try to access a website.
On macOS:
D. All
(LAN, WAN, and ALAN are all types of wireless communication.)
2. Wireless network uses____________ waves to transmit signal
B. radio
(Wireless networks use radio waves to transmit signals.)
3. What device sends and receives radio signals in a wireless network?
C. router
(A router sends and receives radio signals in a wireless network.)
4. Which short-range wireless standard is used for wireless personal area
networks?
B. 802.15
(IEEE 802.15 is the standard for wireless personal area networks, such as Bluetooth.)
5. Which wireless security is impossible to crack?
C. WPA2
(WPA2 is currently considered secure and difficult to crack, especially when using a strong
password.)
6. Wi-Fi stands for
A. Wireless fidelity
(Wi-Fi is short for Wireless Fidelity.)
7. A Wi-Fi enabled device can be _____________
A. OFDM
(Wi-Fi uses Orthogonal Frequency Division Multiplexing (OFDM) for data
A. bit-by-bit delivery
D. none of these
A. analog modulation
B. multiplexing
C. digital modulation
D. none of these
For /27:
[ \text{Total Addresses} = 2^{(32 - 27)} = 2^5 = 32 ]
Calculation:
[ \text{Usable Hosts} = 32 - 2 = 30 ]
The broadcast address is the last address in the subnet, which can be
calculated by taking the network address and adding the total number of
addresses minus one:
5. Summary of Results
IP Address: 192.168.100.154
Subnet Mask: 255.255.255.224 or /27
Total Addresses: 32
Usable Hosts: 30
Network Address: 192.168.100.128
Broadcast Address: 192.168.100.159
subneting+class+C+IP+address+192.168.50.140/25+how+to+calculate
BLACKBOXAI
For /25:
The broadcast address is the last address in the subnet, which can be
calculated by taking the network address and adding the total number of
addresses minus one:
Calculation:
5. Summary of Results
IP Address: 192.168.50.140
Subnet Mask: 255.255.255.128 or /25
Total Addresses: 128
Usable Hosts: 126
Network Address: 192.168.50.128
Broadcast Address: 192.168.50.255