Mehran University of Engineering Technology Jamshoro
Institute of Information Technology
Department of CS&SW
Mid-Term test of CCNW
30 Minutes
Class ID:_____________
________________________________________________________________________
- Which
of the following do you think you can connect over an internetwork?
A. LAN B. WAN C.
Computer Systems D. Software
- Which
of the following do you think a repeater does?
- It
converts data from one protocol to another.
- It
regenerates and propagates the data.
- It
analyzes the address of the packet and sends the packet to destination.
- A
bridge forwards the data packets based on ___________ addresses.
- Bridges
can be used to filter traffic. T/F
- Ethernet
switches offer __________________
dedicated bandwidth to LAN segments.
- The
lower two OSI model layers are implemented with
- Hardware
b. Software c. Hardware and Software
7. All network devices implement all seven layers of OSI model. T/F
- Assume that System A has information to
send to System B. Which of System A’s seven layers do u think the
application program communicate with
- 3 b. 6 c. 7 d.
1 & 2
- There
are Two Systems A and B. the primary concern of layer 6 in System A is to communicate with
- Layer
7 in System A
- Layer
5 in System A c. Layer 6 in System B
- Each
layer’s protocol exchange information, called protocol data units (PDU),
b/w _____________________ layers.
- Adjacent b. Peer
- The
______________ layer is said to be the service user while the ____________
layer is service provider.
- What
happen to the IP packet when it is passed down from the network layer to
the “ Host-to-Network Layer”?
- It
adds it own header to IP packet.
- It
strips the network layer header from the packet.
- It
passes it directly to the physical layer without modifying it any way.
- Data
link layer is responsible for providing reliable transit of data across
a _____________ link.
- Logical b. Physical
- Two
separate active LAN’s can have same MAC address. T/F
- MAC
address is a _________ bit address.
- Router
use _________________ to determine an optimal path to destination.
- During
data transfer using TCP , the two machines continue to communicate with
their protocol software to verify that data is received correctly. T/F
- Sessions
are Logical connections b/w network devices. T/F
- Do u
think that the presentation layer is concerned with the data structure
used by program? T/F
- The
presentation layer is responsible for data encryption. T/F
- Do u
think that the application layer provides services to any other OSI
layer. T/F
- Which
of the following is true for bus topology.
- Each
device is directly linked to all other devices.
- Devices
are linked in circular fashion, each device being linked two other
devices.
- Devices
r directly connected to a central backbone.
- The
10Base5 wiring standard is known as _____________________ Ethernet.
- The
10BaseT wiring standard carries Ethernet frames on ___________________ .
- What do
think a transmitting device does if it recognizes a collision?
- It
ceases all transmission.
- It
sends out jamming signal.
- It
continue to transmit.
- Logically
a token ring network is a ____________ but it is physically laid out as a
__________________.
- What
do think a token ring network can have more than eight stations? T/F
- What
do think a token ring network use MAC addresses. Yes/No
- Token
ring networks r very porn to collisions. T/F
- IP
datagrams r guaranteed to arrive at their destination in the sequence in
which they were sent. T/F
- What
TCP do?
- It
initiates handshaking.
- It
controls packet sequencing.
- It
exchanges packets without acknowledgements.
- It
performs flow control.
- It
handles errors.
- Every
time a route passes through _______________ is deemed to be a hop.
- A
network. b. A network Link c. A internetwork node.
- Routing
algorithms can base route selection on multiple metrices. T/F
- Node
address exist at __________________ layer of OSI model.
- A
distance vector algorithm knows the exact topology of internetwork. T/F
- In
link state each router send its entire routing table to its
neighbors. T/F
- Which
type of routing algorithm requires more CPU power and memory.
- Link
State b. Distance Vector
- In IP
header, the purpose of Flag field is
- To
control fragmentation of packets during transmission.
- To
control packet sequencing.
- To
identify the upper layer protocols being used
- Do u think ICMP can identify routers on
networks. Yes/No
- The ARP
maps ________________ addresses to _________________ addresses.
- The
RARP maps _______________ addresses to _________________ addresses.
- What
happen if network loses a TCP/IP packet during transmission.
- The
data is lost and unrecoverable
- TCP
retransmit the packet.
- The
data has to be sent again by application.
- How
UDP packet travels to its destination.
- Encapsulated
in IP packet. b.
In TCP packet
- How
SMTP Transmit data?
- By
transmitting data directly to the destination node.
- By
transmitting data from node to node until the destination node is
reached.
- Identify
valid IP addresses
- 132.1324.87.175 b. 132.132.87 c. 132.132.87.175
d. 132.132.87.0
- How
many possible class B network addresses do u think there r?
- 127 b.16384 c. 64 d.
65536
- DNS
divides Internet into _______________________.
HOME BACK