This document contains a practice exam for a diploma in computer networks. It has two parts - Part A contains 20 multiple choice questions testing knowledge of WAN concepts like VPNs, PPP, and QoS. Part B has longer form questions on WAN topologies, terms, ACLs, VPN types, cloud computing services, and advantages of virtualization. The exam tests understanding of connecting networks and technologies used for private WAN connections.
1. NATIONAL INSTITUTE OF BUSINESS MANAGEMENT
Diploma in Computer Networks 16.1F
Connecting Networks DCN/3/3/2/12
Date: 16.02.2018
Part A
Time: One hour
Answer all the questions. All questions carry equal marks. Calculators are not
allowed.
1.Which two WAN infrastructure services are examples of private connections? (Choose
two.)
a) T1/E1
b) wireless
c) DSL
d) cable
e) Frame Relay
2.Which three traffic-related factors would influence selecting a particular WAN link type?
(Choose three.)
a) type of traffic
b) amount of traffic
c) cost of the link
d) security needs
e) distance between sites
f) reliability
3. What is a disadvantage of leased lines?
a) low quality
b) inconsistent availability
c) complexity
d) high cost
4.Which PPP protocol allows a device to specify an IP address for routing over the PPP
link?
a) PAP
b) CHAP
c) LCP
d) IPCP
Page 1 of 5
2. Page 2 of 5
5. PPP authentication is performed at which OSI layer?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
6.Which additional functionality is available on an interface when the encapsulation is
changed from HDLC to PPP?
a) flow control
b) error control
c) authentication
d) synchronous communication
7. What are the two types of VPN connections? (Choose two.)
a) PPPoE
b) site-to-site
c) leased line
d) Frame Relay
e) remote access
8.Which two components are needed to provide a DSL connection to a SOHO? (Choose
two.)
a) transceiver
b) DSLAM
c) CMTS
d) CM
e) PPPoE enabled switch
9. What is an advantage offered by GRE tunnels?
a) built in security mechanisms
b) encryption of encapsulated traffic
c) support for IP multicast tunneling
d) support for connecting individual hosts across the Internet
10. What TCP port is used by BGP to exchange messages between routers?
a) 22
b) 58
c) 179
d) 443
11. Which statement describes a characteristic of standard IPv4 ACLs?
a) They are configured in the interface configuration mode.
b) They filter traffic based on source IP addresses only.
c) They can be created with a number but not with a name.
d) They can be configured to filter traffic based on both source IP addresses and
source ports.
3. Page 3 of 5
12.What range of IP addresses is represented by the network and wildcard mask
192.168.70.0 0.0.0.127?
a) 192.168.70.0 to 192.168.70.127
b) 192.168.70.0 to 192.168.70.255
c) 192.168.70.0 to 192.168.70.63
d) 192.168.70.0 to 192.168.71.255
13. What is the only type of ACL available for IPv6?
a) named standard
b) named extended
c) numbered standard
d) numbered extended
14.An administrator has configured an access list on R1 to allow SSH administrative access
from host 172.16.1.100. Which command correctly applies the ACL?
a) R1(config-if)# ip access-group 1 in
b) R1(config-if)# ip access-group 1 out
c) R1(config-line)# access-class 1 in
d) R1(config-line)# access-class 1 out
15. Which mode is used to configure SNMP?
a) privileged mode
b) global configuration mode
c) interface configuration mode
d) router configuration mode
16. What is an SNMP management agent?
a) a computer loaded with management software and used by an administrator to
monitor a network
b) a database that a device keeps about network performance
c) software that is installed on devices managed by SNMP
d) a communication protocol that is used by SNMP
17.What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer
overflow?
a) Disable DTP.
b) Disable STP.
c) Enable port security.
d) Place unused ports in an unused VLAN.
18. Which statement describes the QoS classification and marking tools?
a) Marking is the adding of a value to a packet header.
b) Classification is performed after traffic is marked.
c)Marking is the identification of which QoS policy should be applied to specific
packets.
d) Classification should be done as close to the destination device as possible.
4. Page 4 of 5
19.Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ)
when low latency queuing (LLQ) is being used?
a) video
b) data
c) voice
d) management
20.Which Cloud computing service would be best for an organization that needs to
collaboratively create applications and deliver them over the web?
a) PaaS
b) IaaS
c) SaaS
d) ITaaS
5. Part B
Time: TWO hours
Answer All questions.
The marks given in brackets are indicative of the weight given to each part of the
question
B1. A WAN operates beyond the geographic scope of a LAN.
a) What is the difference between LAN and WAN? (4 marks)
b) List 3 Common WAN topologies with the diagrams? (6 marks)
c) briefly describe below WAN Terms? (10 marks)
CPE
DCE
DTE
Demarcation Point
Local Loop
B2. This question is about the WAN concepts.
a) briefly explain about Point to Point connections? (2 marks)
b) What are the advantages of PPP encapsulation? List Three (3 marks)
c) Briefly Describe below terms? (8 marks)
IGP
EGP
iBGP
eBGP
d) What is VPN? (3 marks)
e) What are the main two types of VPN types? briefly Describe. (4 marks)
B3. This question is about the ACL and Networking Trends.
a) What is ACL Packet Filtering? (4 marks)
b) Briefly describe the below ACL Statements? Specify the ACL type. (6 marks)
1.
2.
c) Cloud computing involves large numbers of computers connected through a
network that can be physically located anywhere. There are three main cloud
computing services. List that (6 marks)
d) What are the advantages of Virtualization? (4 marks)
Page 5 of 5