0% found this document useful (0 votes)
22 views10 pages

Revison Sheet 2

Uploaded by

.moashraf.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views10 pages

Revison Sheet 2

Uploaded by

.moashraf.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Networks & Communications

Revision sheet
MULTIPLE CHOICE QUESTIONS: -

1. When comparing and contrasting the similarities and differences between bridges
and switches, which of the following are valid statements? Choose all the valid
answer choices)
A. Bridges are faster than switches because they have fewer ports.
B. A switch is a multiport bridge,
C. Bridges and switches learn MAC addresses by examining the source MAC address of
each frame received.
D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision domain.
F. None of the above statements are true.

2. The LAN needs are expanding at the AASTMT corporate office, which is quickly
growing. You are instructed to enlarge the area covered by a single LAN
segment on the AASTMT network.
Which of the following are layer 1 devices that you can use? (Choose all that apply.)
A. A switch B. A router
C. A network adapter card D. A hub
E. A repeater

3. Cisco is the leader in the router market space. What basic functions do their routers
perform in a network? (Choose two)
A. The micro-segmentation of broadcast domains B. Path selection
C. Packet switching D. Bridging between LAN segments
E. Access layer security F. VLAN membership assignment
G. Application optimization

4. Both bridges are switches are being used throughout the AASTMT LAN. Which of
the following statements are true regarding bridges and switches in this network?
(Choose 3)
A. Switches are primarily software based while bridges are hardware based.
B. Switches usually have a higher number of ports than most bridges.
C. Bridges are frequently faster than switches.
D. Bridges define broadcast domains while switches define collision domains.
E. Both bridges and switches forward Layer 2 broadcasts.
F. Both bridges and switches make forwarding decisions based on Layer 2 addresses.

5. The AASTMT network administrator needs to determine what LAN devices to install
on the AASTMT network. What are two advantages of using Layer 2 Ethernet switches
over hubs? (Choose one)
A. Increasing the size of broadcast domains
B. Increasing the maximum length of UTP cabling between devices
C. Filtering frames based on MAC addresses
D. Decreasing the number of collision domains

6. Two buildings on the London campus must be connected to use Ethernet with a
bandwidth of at least 100 Mbps. The administrator is concerned about possible
problems from voltage potential differences between the two buildings. Which media
type should be used for the connection?
A. Coaxial cable B. Fiber optic cable
C. UTP cable D. STP cable
E. None of the above
7. As NW administrator candidate, you must know the various layers of the OSI
model. At which layers of the OSI Model do Wide Area Networks operate in? (Choose
two)
A. Physical Layer B. Datalink Layer C. Network Layer
D. Session Layer E. Transport Layer F. Presentation Layer
G. Application Layer

8. While troubleshooting a connectivity problem on the network, you issue the ping
command from your PC command prompt, but the output shows "request times out."
At which OSI layer is this problem associated with?
A. The data link layer B. The application layer C. The access layer
D. The session layer E. The network layer

9. You download a file from an FTP site on the Internet. What is the highest layer in the
OSI model used in this FTP operation?
A. Application B. Presentation C. Session
D. Transport E. Internet F. Data Link
G. Physical
10. A host computer has been correctly configured with a static IP address, but the
default gateway is incorrectly set. Which layer of the OSI model will be first affected by
this configuration error?
A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4
E. Layer 5 F. Layer 6 E. Layer 7

11. Which layer of the OSI reference model is responsible for ensuring reliable end-to-
end delivery of data?
A. Application B. Presentation C. Session D. Transport
E. Network F. Data-Link

12. At which OSI layer is a logical path created between two host systems named TK1
and TK2 on the AASTMT LAN?
A. Physical B. Session C. Data link D. Transport
E. Network F. Application G. Presentation

13. Which OSI layer is associated with the following: The acknowledgement of
transmissions, sequencing, and flow control across a network?
A. Layer 2 B. Layer 3 C. Layer 4 D. Layer 5
E. Layer 6 F. Layer 7
14. Which OSI layer header contains the address of a destination host that is on
another network?

A. Application B. Presentation C. Session D. Transport


E. Network F. Data link G. Physical

15. Which of the following correctly describe steps in the OSI data encapsulation
process? (Choose two)

A. The presentation layer translates bits into voltages for transmission across the physical
link.
B. The transport layer divides a data stream into segments and adds reliability and flow
control information.
C. Packets are created when the network layer adds Layer 3 addresses and control
information to a segment.
D. The data link layer adds physical source and destination addresses and an FCS to the
segment.
E. Packets are created when the network layer encapsulates a frame with source and
destination host addresses and protocol-related control information.

16. Which Layer 4 protocol is used for a Telnet connection between two AASTMT
routers?

A. IP B. ICMP C. DNS D. TCP E. UDP F. RTP

17. AASTMT is installing IP phones in a new office. The phones and office
computers connect to the same device. To ensure maximum throughout for the
phone data sessions, What is the best network device to which to directly connect
the phones and computers?

A. VLAN B. Sub-interface
C. STP D. Hub
E. Switch F. Router
G. Wireless Access Point H. VTP

18. You work as a network technician at TestKing.com. You have been assigned the
task of designing a new TestKing internetwork. The main priority is to achieve the
highest reliability available. TestKing.com is willing to spend more dollars to avoid
downtime caused by link failure.
Which of the following four designs is to be preferred?
A. Design TestKingA B. Design TestKingB
C. Design TestKingC D. Design TestKingD

19. While troubleshooting a network connectivity problem, a TestKing technician


observes steady link lights on both the workstation NIC and the switch port to which
the workstation is connected. However, when the ping command is issued from the
workstation, the output message "Request timed out." is displayed. At which layer of
the 7-layer OSI model does the problem most likely exist?

A. The data link layer B. The application layer


C. The protocol layer D. The access layer
E. The session layer F. The network layer
G. None of the above

20. Which layer does the SMTP work at?


A. Internet
B. Transport
C. Link
D. Application

21. You need to make a secure communication using HTTPS. What port number is
used by default?
A. 80
B. 23
C. 21
D. 443
22. Which of the following protocols is used by mail servers to exchange messages
with one another?
A. POP3
B. IMAP4
C. SMTP
D. HTTPS
23. If you use either Telnet or FTP, which layer you are using to transmit data?
A. Application
B. Internet
C. Link
D. Transport
24. Which layer does the IP protocol run at?
A. Application Layer
B. Internet Layer
C. Transport Layer
D. Link Layer
25. Which of the following protocols is a “transport-layer” protocol?
A. SFTP
B. IP
C. ARP
D. UDP
26. A computer with a subnet mask of 255.255.255.0 has how many octets for the
network ID?
A. 1
B. 2
C. 3
D. 4
27. Which protocol is responsible for mapping an IP address to the MAC address?
A. IP
B. TCP
C. ARP
D. ICMP
28. Which protocol is responsible for connection-oriented communication?
A. TCP
B. IP
C. UDP
D. ICMP
29. Which protocol is responsible for error reporting and status information?
A. ICMP
B. TCP
C. UDP
D. IP
30. Which protocol is responsible for logical addressing and delivery of packets?
A. ICMP
B. TCP
C. IP
D. UDP
31. How many binary bits are in an IPv6 address?
A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
32. What protocol helps multiple devices share the bandwidth evenly without having
two devices transmit at the same time on the network medium?
A. TCP/IP
B. CSMA/CD
C. Three-way Handshaking
D. ICMP
33. A computer with the IP address of 134.67.89.12 and a subnet mask of 255.255.0.0
is on the same network with which of the following systems?
A. 128.76.89.12
B. 134.67.112.23
C. 13.4.67.34
D. 109.67.45.10
34. Which network service is responsible for automatically assigning IP addresses
out to clients on the network?
A. DNS
B. ARP
C. DHCP
D. TCP
35. Any IP address whose first octet starts with a binary value of (10), is typically:
A. Class A
B. Class B
C. Class C
D. Class D
36. Which network address class supports only 254 hosts?
A. Class A
B. Class B
C. Class C
D. Class D
37. What is the default subnet mask for a class C network?
A. 255.0.0.0
B. 225.225.0.0
C. 255.255.255.0
D. 225.255.255.255
38. How many octets are in an IPv4 address?
A. 2
B. 4
C. 6
D. 8
39. In binary, how do you specify the broadcast address of a network range?
A. All host bits are set to 0
B. All host bits are set to 0, except for the low-order bit
C. All host bits are set to 1, except for the low-order bit
D. All host bits are set to 1
40. What is the well-known port number for the HTTP service?
A. 20
B. 21
C. 80
D. 25
41. Which of the following addresses is a “Class C” IP address?
A. 240.1.1.34
B. 196.167.34.5
C. 126.16.7.99
D. 191.108.56.7
42. Which command is used to generate the following output?
Interface: 10.10.10.101
Internet Address Physical Address Type
12.10.10.1 00-2b-1c-d5-10-f9 static
12.10.10.10 00-06-6b-8e-4e-e3 dynamic
12.10.10.19 00-c0-ae-d0-bb-f5 dynamic
A. TRACERT 10.10.10.101
B. NETSTAT
C. ARP -a
D. IPCONFIG
43. Which protocol is used to retrieve messages from a mail server, without deleting
them on the server?
A. SMTP
B. IMAP4
C. POP3
D. HTTPS
44. Which classful IP range is assigned to the network of AAST which contains
around 10,000 network users (hosts)?
A. Class A
B. Class B
C. Class C
D. Class D
45. An IP address (127.0.0.1) is reserved for:
A. Loopback tests
B. Broadcasting
C. Partitioning the network (127) into several network segments
D. Subnetting the IP addresses of Class A and Class B
46. The last valid address of a host is always:
A. One more than the broadcast address
B. One less than the broadcast address
C. One more than the network ID
D. One less than the network ID
47. Which command was used to generate the following command output?
1 <10 ms <10 ms <10 ms 192.168.0.254
2 <10 ms <10 ms <10 ms 12.127.106.34
3 40 ms 40 ms 50 ms r04.nycmny01.verio.net [129.250.10.37]
4 40 ms 40 ms 40 ms r20.nycmny01.verio.net [129.250.2.36]
5 40 ms 40 ms 50 ms r00.nwrknj01.verio.net [129.250.2.216]
6 110 ms 121 ms 120 ms 192.94.118.221
7 110 ms 130 ms 120 ms www.novell.com [130.57.4.27]
A. tracert www.novell.com
B. ping www.novell.com
C. ping 130.57.4.27
D. tracert 192.168.0.254 / 130.57.4.27
48. You are having trouble connecting to resources on the Internet, so you use the
IPCONFIG utility to verify your TCP/IP configuration. The configuration is shown.
Ethernet adapter Lan Connection:
Connection-specific DNS Suffix . : glensworld.loc
IP Address. . . . . . . . . . . . : 192.168.1.100
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.1.1

Your configuration seems to be accurate. Which command would you type next
to help determine what the problem is?
A. Ping glensworld.loc
B. Ping 192.168.1.100
C. Ping 192.168.1.1
D. Ping 192.168.1.255
49. What is the subnet mask for 171.103.2.30?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
50. Which utility is used to determine the path that data takes to a remote host?
A. NETSTAT
B. ARP
C. FTP
D. TRACERT
51. Which utility is used to facilitate file transfers between two remote hosts?
A. FTP
B. TRACERT
C. PING
D. None of the above
52. Which of the following is a typical IPv6 address?
A. 65-b3-b8-34-45-a3
B. 65b3 : b834 : 45a3 : 0000 : 0000 : 762e : 0270 : 5224
C. 65b3 : b834 : 45a3 : 0000 : 0000 : 762e
D. None of the above
53. Which of the following protocols has a header that contains an Acknowledgment
Number field?
A. UDP
B. TCP
C. IP
D. All of the above
54. You are troubleshooting to determine why Omar’s computer cannot connect to
the Internet. What command would you type to view all of Omar’s TCP/IP settings
in a MS Windows command prompt?
A. ipconfig *
B. ipconfig /all
C. ipconfig /showall
D. ipconfig /displayall
55. The following output was generated from which command?

Reply from 10.10.10.1: bytes>32 time<1ms TTL>128


Reply from 10.10.10.1: bytes>32 time<1ms TTL>128
Reply from 10.10.10.1: bytes>32 time<1ms TTL>128
Reply from 10.10.10.1: bytes>32 time<1ms TTL>128
Ping statistics for 10.10.10.1:
Packets: Sent > 4, Received > 4, Lost > 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum > 0ms, Maximum > 0ms, Average > 0ms
A. TRACERT 10.10.10.1
B. ROUTE 10.10.10.1
C. PING 127.0.0.1
D. PING 10.10.10.1
56. What decimal value is equivalent to (11000000 . 10101000 . 00110000 . 00001100)?

A. 192.168.48.12
B. 192.168.48.24
C. 192.168.64.12
D. 192.168.32.24
57. Which utility is used to verify network connectivity of a remote host?

A. NETSTAT
B. ARP
C. PING
D. None of the above
58. Which of the following are not reliability mechanisms used by TCP?

A. Sequence numbers
B. Acknowledgements
C. The source and destination port numbers
D. The sliding window size
59. In a TCP three-way handshake what does a SYN-ACK message indicate?

A. First message of a three-way handshake


B. Second message of a three-way handshake
C. Third message of a three-way handshake
D. Answers B and C
60. Refer to the following exhibit:
4 Bytes (32 bits)
Bit 0 Bit 15 Bit 16 Bit 31

Source Port (16) Destination Port (16)

Sequence Number (32)


TCP Header
Acknowledgment Number (32) (20-24) bytes
Header Length Reserved Code Bits
(4) Window (16)
(6) (6)

TCP Checksum (16) Urgent Pointer (16)

Options (0 or 32 if any)

Data (varies)

What data structure is described in the exhibit shown above?


A. IP datagram B. TCP Segment C. Ethernet Frame
D. UDP Datagram E. None of the above

SHORT ANSWERS
1. What field in the IP header is responsible for preventing a packet from endlessly
looping through a network?
2. What field in the IP header verifies the correctness / integrity of the IP packet?
3. A host whose IP address is (192.168.1.3), subnet mask is (255.255.255.0), and the
default gateway is (192.168.1.1), sends a message to another host whose IP
address is (192.168.75.45). What is the IP address of the first hop in the route?

4. List the OSI model layers and TCP/IP layers in correct order and compare.

5. Which topology often results in multiple connections to a single site, leading to


high degree of fault tolerance?

6. Transform each of the following values to its corresponding format in the


following table. (Show your conversions on the next page).
Hexadecimal Decimal
(A3)16
(123)10

Best Wishes

You might also like