Deptt. Of Computer Systems and Software Engg.
MID TERM TEST 03
CCNW
2K CS Batch
Date: April 18, 2003 Marks: 05
1. What are good reasons for using layer two switches? (Choose two)
A. To reduce collisions. B. To increase collisions.
C. To increase the number of collision domains.
D. To decrease the number of collision domains.
E. To decrease the number of broadcast domains.
2. Full-duplex gives you the ability to send and receive data at the same time. Which of the following Ehernet standards can operate in full-duplex mode? (Choose two.)
A. 10Base2 B. 10Base5 C. 10BaseT D. 100BaseT
3. Which three are examples of the functions of connection oriented services? (Choose three)
A. Connection parameters are synchronized.
B. Any loss or duplication of packets can be corrected.
C. The data packet is independently routed and the service does not guarantee the packet will be processed in order.
D. A data communication path is established between the requesting entity and the peer device on the remote end system.
4. What is the correct order of PDUs in data encapsulation?
A. Data, Frame, Packet, Segment, Bit B. Data, Frame, Segment, Packet, Bit
C. Data, Packet, Frame, Segment, Bit D. Data, Packet, Segment, Frame, Bit
E. Data, Segment, Frame, Packet, Bit F. Data, Segment, Packet, Frame, Bit
5. If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary. Which of the following is the correct bit pattern for the first octet?
A. 0xxxxxxx B. 10xxxxxx C. 110xxxxx D. 1110xxxx E. 11110xxx
6. Which of the following statements about a reliable connection oriented data transfer are true? (Choose two)
A. Recipients acknowledge receipt of data.
B. When buffers are filled to capacity, datagrams are discarded and not re transmitted.
C. Windows are used to control the amount in outstanding acknowledged data segments.
D. If the segments timer expires between receipt of an acknowledgement the sender drops the connection.
7. What is the network address for a host with the IP address 123.200.8.68/28?
A. 123.200.8.0 B. 1231.200.8.32 C. 123.200.8.64 D. 123.200.8.65
E. 123.200.8.31 F. 123.200.8.1
8. You need to segment your network which of the following hardware devices can you use to segment your nework? (Choose three.)
A. Hub B. Repeater C. Switch D. Bridge E. Router F. Media converter
9. What was one of the most important reasons the International Organization for Standardization released the OSI model?
A. Users could access network server faster.
B. Different vendor’s networks could work with each other.
C. The industry could create a standard for how computers work.
D. The network administrator could increase the overall speed of their network.
10. Using a class C address range 192.168.21.12 your network needs twenty-eight subnets. Which subnet mask should you use?
A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248
E. 255.255.255.252
11. Your boss is concerned about routing loops with the use of distance vector routing protocols such as RIP and IGRP in your network you would like to ensure him that there are mechanisms used to prevent the possibility of a routing loop. Which of the following are examples of this mechanism? (Choose two.)
A. Link-state advertisement (LSA) B. Spanning Tree Protocol.
C. Shortest path first tree. D. Split horizon. E. Hold-down timers.
12. You just finished installing a new operating system on a computer located in the accounting department. You would like to verify the network configuration from the new computer so you establish FTP connection to a remote TFTP server. Which layer of the OSI model did you use for this operation?
A. Application B. Presentation C. Session D. Transport E. Data link F. Internet
13. What are the generic parts of a layer 3 address?
A. An internetnetwork number and a URL . B. A vendor code and a serial number.
C. A network number and host number. D. A broadcast number and unicast number.
E. A domain identifier and a device identifier.
14. Your ISP has provided you the following class B network range 131.107.0.0/24. Which of the following statements is true regarding this network? (Choose two.)
A. There are 254 usable hosts per subnet. B. There is one usable network.
C. There are 255 usable hosts per subnet. D. There are 254 usable subnets.
E. There are 30 usable subnets. F. There are 62 usable hosts per subnet.
15. What one of the following protocols is an example of a link state routing protocol that uses the TCP/IP protocol stack?
A. IP B. IS-IS C. NLSP D. OSPF E. RIP ver 2
16. Using the following address and subnet mask 195.106.14.0/24 what is the total number of networks and the total number of host per network?
A. 1 network with 254 hosts. B. 2 networks with 128 hosts.
C. 4 networks with 64 hosts. D. 6 networks with 30 hosts.
17. Looking at this address 255.255.255.255 which one of the following is true?
A. IP, a flooded broadcast. B. IP, a directed broadcast.
C. IPX, a flooded broadcast. D. IPX, a remote directed broadcast.
18. Using a protocol analyzer you determine your LAN traffic is experiencing congestion. What could be some possible causes for a congested network? (Choose four.)
A. Too many hosts in a broadcast domain. B. Full Duplex operation.
C. Broadcast storms. D. Multicasting. E. Segmentation. F. Low bandwidth.
19. Using a class C address you need five subnets with a maximum of 17 hosts on each of these subnets. Which subnet mask would you use?
A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
20. What is the protocol and what is the second part of the following network address? (Choose all that apply.) 10.0.0.254 mask 255.0.0.0
A. IPX MAX address. B. IP Class C director broadcast.
C. Private IP address node number. D. Public IP address directed broadcast.
E. Private IP address directed broadcast.
21. Aaron is troubleshooting a problem on his network he issues the command ping 10.0.0.2 to test the physical connectivity between two devices? Which type of ICMP messages was carried in the IP datagrams?
A. ICMP echo request. B. Information request. C. Timestamp reply.
D. Redirect. E. Source quench.
22. Which one of the layers of the seven layer OSI model uses positive acknowledgement and retransmission to ensure reliable delivery?
A. Application B. Presentation C. Session D. Transport E. Data link F. Physical
23. Using a protocol analyzer we noticed sustained, heavy collisions in our CSMA/CD LANs. What are some possible affects could this have our LAN? (Choose three.)
A. Increased broadcast traffic. B. Delay. C. Low throughput.
D. High throughput. E. Congestion. F. Higher bandwidth.
24. Most networks are often described as using either 10BaseT or 100BaseTX media. What does the 'Base' in these media types mean?
A. It describes the signaling method for communication on the network.
B. It refers to the type of media used in the network.
C. It relates to the speed of transmission of network signals.
D. It defines the allowable length of media that can be used.
E. It defines half-duplex or full-duplex operation.
25. 802.3 Ethernet networks use (CSMA/CD). This means that multiple stations have access to media , and before one station can access that media, it must first “listen” (carrier sense) to make sure no other station using the same media. If two stations transmit at the same time, the result is a collision. If this happens a back off algorithm is used. What is this back off algorithm used for?
A. It is latency stored and forward switching.
B. It is the time used to token passing from machine to machine.
C. It is re transmission delay that is encountered when a collision occurs.
D. It the result of two nodes transmitting at the same time the frames from each transmitting device collide and are damaged.
26. You are concerned about broadcast traffic in your network. You would like to split up your network into two separate broadcast domains. Which one of the following hardware devices can you use?
A. Hub B. Router C. Bridge D. Repeater
27. A graphics art company located in Miami, Florida noticed that their windows size was changed from 3000 to 4000 during the data transfer stage of a TCP session, what can a sending host do?
A. Transmit 3000 bytes before waiting for an acknowledgement.
B. Transmit 4000 packets before waiting for an acknowledgement.
C. Transmit 4000 bytes before waiting for an acknowledgement.
D. Transmit 4000 segments before waiting for an acknowledgement.
E. Transmit 3000 frames before waiting for an acknowledgement.
F. Transmit 3000 packets before waiting for an acknowledgement.
28. Users on your network 10.1.0.0/16 are complaining that they cannot access the company’s intranet server using the FQDN www.snowball.com. You are able to ping the IP address but you cannot ping www.snowball.com. What is the likely cause of this problem?
A. TCP/IP failure. B. DNS failure. C. FTP failure. D. SNMP failure.
29. Given the network 192.141.27.0/28, identify the valid host addresses. (Choose three.)
A. 192.141.27.33 B. 192.141.27.112 C. 192.141.27.119
D. 192.141.27.126 E. 192.141.27.175 F. 192.141.27.208
30. To perform proper and efficient routing what must a router have?
A. Destination application of an incoming packet. B. Number of other packets in a single flow of data.
C. Destination network address of an incoming packet.
D. Number of routers that know a path to the destination.
31. Using the address 192.64.10.0/28 how many subnets and hosts are available?
A. 62 networks and 2 hosts B. 6 networks and 30 hosts C. 8 networks and 32 hosts
D. 16 networks and 16 hosts E. 14 networks and 14 hosts
32. Routing Protocols use which OSI layer to determine the best path to a network?
A. Data Link B. Network C. Physical D. Presentation E. Session F. Transport
33. Which of the following devices operate at Data Link layer of the OSI model? (Choose two)
A. Router B. SMTP server C. Transceiver D. Switch E. Bridge F. Hub
34. Select two valid statements regarding routing protocols? (Choose two)
A. Distance vector protocols send the entire routing table to directly connected neighbors.
B. Link state protocols send the entire routing table to all routers in the network.
C. Distance vector protocols send updates about directory connected neighbors to all networks listed in the routing table.
D. Link state protocols send updates containing the state of their own links to all other routers on the network.
35. You would like to use Ethernet 100BaseTx in your network. What is the maximum cable length?
A. 10 m B. 50 m C. 100 m D. 1000 m
36. Which of the following are facts about Reverse Address Resolution Protocol? (Choose two.)
A. It generates parameter problem messages. B. It maps IP addresses to Ethernet addresses.
C. It maps Ethernet addresses to IP addresses.
D. It is implemented directly on top of the data link layer.
37. In comparing TCP with UDP what is an advantage of using a connectionless protocol such as UDP?
A. Packet acknowledgement may reduce overhead traffic.
B. Loss or duplication of data packets is less likely to occur.
C. Packets are not acknowledged which reduces overhead traffic.
D. The application relies on the transport layer for sequencing of the data packets.
38. Which of the following troubleshooting tools use the protocol ICMP? (Choose two)
A. Ping B. Telnet C. Configure D. Trace route E. Show commands F. Standard access list
39. Which of the following correctly compares Fast Ethernet to Ethernet? (Choose four.)
A. Fast Ethernet uses the Same Maximum Transmission Unit (MTU).
B. Fast Ethernet is based on an extension to the IEEE 802.3 specification.
C. Fast Ethernet uses the same Media Access control (MAC mechanisms).
D. Fast Ethernet preserves the frame format that is used by Ethernet.
E. Fast Ethernet offers a speed increase one hundred times that of the Ethernet.
40. Computer A is trying to ping Computer B on the same Ethernet LAN using the IP address. A request is sent out of Computer A as a broadcast looking for the MAC address of Computer B. What is the protocol that sent out this broadcast to find Computer B’s MAC address?
A. It uses a Proxy ARP. B. It uses ARP requests. C. It uses RARP requests.
D. It uses router look up table.
41. In single mode fiber optic several wavelengths are multiplexed T/F
42. Frequency Hoping technique is used in wireless LAN’s T/F
43. The method for joining the fiber optic is called as ______________________.
44. 802.11 b standard provide us the data rate of ________________.
45. Autonomous System is administered by several organizations. T/F