This document contains a 20 question practice exam on computer networks. It covers topics such as internet connection types for small businesses, broadband technologies, PPP protocols, VPN connections, troubleshooting methods, ACLs, SNMP, QoS, and network security concepts. The exam consists of multiple choice and short answer questions testing understanding of networking fundamentals and common network devices, protocols, and services.
1- Which layer of the OSI model defines how to start- control- and end.pdfStevenLCvWalkera
1. Which layer of the OSI model defines how to start, control, and end conversations by
grouping messages in a workflow?
A)Application layer
B)Presentation layer
C)Session layer
D)Transport layer
E)Network layer
F)Data link layer
G)Physical layer
2. Which of the following terms best describes the process of adding headers and possibly
trailers to information for transit?
A)Frames B) Encapsulation C) Packets D) Data Linking
3.Which of the OSI model layers has the main purpose of defining and negotiating data
formatting?
A)Data link
B)Application
C)Transport
D)Presentation
E)Network
4.In IT, what term refers to a small network that is used for business purposes, typically in the
home of a business or employee?
A)Enterprise network
B)IT network
C)Cloud network
D)SOHO network
E)Organizational network
5.Which layer of the TCP/IP model defines the rules for data packet recovery?
A)Application B) Transport C) Internet D) Data link
6.An Ethernet address is also commonly referred to as a address.
A)Unicast B) MAC C) Host D) IP E)Cam
7.On a LAN RJ-45 connector, what name is given to the eight physical connections that make
contact when connected?
A)Threads B) Strands C) Crimps D) Wires E) Pins
8.Which IEEE standard defines the use of radio waves to communicate between wireless LAN
nodes?
A)IEEE 802.11
B)IEEE 802.16
C)IEEE 802.3
D)IEEE 802.2
E)IEEE 802.5
9.When a collision occurs on a shared Ethernet network, what is the first step in recovery for the
two computers in question?
A)Send a jamming signal. B) Wait for the other computer to finish.
C) Do nothing until the line clears. D) Resend the last frame right away.
10.When connecting a wire to a host FastEthernet interface, which pins are used for
communications?
A)Pins 3 and 6 to receive B) Pins 1 and 2 for receive
C) Pins 1 and 2 to receive D) Pins 3 and 6 to transmit
E) Pins 1 and 2 to transmit F) Pins 7 and 8 for transmit
11.When connecting a router to an external CSU/DSU, which serial cable type is typically used?
A)RTS B) DTE C) DCE D) CTS E) DE
12.What is the name of the device that is typically located within a telephone company's central
office (CO) and enables it to utilize existing telephone wiring for both normal telephone services
and DSL?
A)CMTS
B)DSLAM
C)DSL modem
D)Class 5 switch
E)Telephone concentrator
13.Which HDLC field is equivalent to the preamble in Ethernet?
A)Address B) FCS C) Flag D) Control
14.Which of the following is the correct term describing the middle of the Internet, owned by
various Internet service providers and consisting of a complex network of networks?
A)WAN B) Internet access link
C) Internet core D) LAN
15.Which of the following fields in HDLC does not exist in Ethernet and is typically considered
outmoded for modern links between routers?
A)Address B) Flag C) FCS D) Control
16)What command can be used on most modern PC operating systems to display the contents of
the ARP cache from the CLI?
A)ifconfig B) netstat - a C) arpname D) arp - a
17.Which layer of the .
Here you can find 1000's of Multiple Choice Questions(MCQs) of Computer Networks includes the MCQs of basic network theory with network definition, network models, connectivity and network addressing, introducton to OSI and TCP/IP network reference models, Layers of TCP/IP and OSI model with physical layer, data link layer, network layer, transport layer, session layer and application layer along with internet protocol, ICMP, ARP and Bootstrap protocol, types of routing protocol, Routing Information Protocol(RIP), Open Shortest Path First(OSPF), Border Gateway Protocol(BGP), User Datagram Protocol(UDP), File Transfer Protocol(FTP), Simple Mail Transfer Protocol(SMTP), Hyper Text Transfer Protocol(HTTP) and IPV6 addressing methods and also of Network security and Internet security.
1. Which of the following is a Cisco IOS feature that can collect .docxjackiewalcutt
1. Which of the following is a Cisco IOS feature that can collect timestamps of traffic sent between a particular source and destination for the purpose of reviewing in an audit? (Select the best answer.)
a. CS-MARS
b. SNMPv3
c. NetFlow
d. RMON
2. Which of the following are not components of a typical CVO implementation? (Select 3 choices.)
a. a Cisco 800 series ISR
b. a Cisco Unified IP Phone
c. a Cisco 3900 series ISR
d. a Cisco 600 series AP
e. a Cisco 5500 series WLC
f. a Cisco 2500 series WLC
3. In a hierarchical network model, which layer of the network handles ACLs and IPS filtering? (Select the best answer.)
a. core
b. services block
c. access
d. distribution
4. Which of the following statements are true about a medium branch office design? (Select 2 choices.)
a. Rapid PVST+ should be configured to prevent Layer 2 loops.
b. A collapsed core should not be implemented.
c. ISR integrated 10/100/1000 interfaces should be configured as Layer 3 trunks.
d. A single ISR platform is recommended for WAN access.
e. A medium branch office design is ideal for up to 200 users.
5. Which of the following best describes how Cisco defines a medium branch office? (Select the best answer.)
a. an office that contains between 50 and 100 users and that implements a two-tier design
b. an office that contains between 100 and 200 users and that implements a two-tier design
c. an office that contains up to 50 users and that implements a one-tier design
d. an office that contains between 50 and 100 users and that implements a three-tier design
6. In which of the following layers of the hierarchical network design model should you implement QoS? (Select the best answer.)
a. in the core, distribution, and access layers
b. in the access and distribution layers only
c. in the distribution layer only
d. in the core and distribution layers only
e. in the access layer only F.in the core layer only
7. In the Cisco enterprise architecture model, which of the following best describes the switches used in the enterprise edge module? (Select the best answer.)
a. Both inner and outer switches should use Layer 3 switching exclusively.
b. Inner switches should use Layer 2 switching exclusively; outer switches should use a combination of Layer 2 and Layer 3 switching.
c. Inner switches should use Layer 3 switching exclusively; outer switches should use a
d. combination of Layer 2 and Layer 3 switching.
e. Both inner and outer switches should use Layer 2 switching exclusively.
f. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer switches should use Layer 3 switching exclusively.
g. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer switches should use Layer 2 switching exclusively.
h. Inner switches should use Layer 2 switching exclusively; outer switches should use Layer 3 switching exclusively.
8. Which of the following can be used to configure router command authorizati ...
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
1- Which layer of the OSI model defines how to start- control- and end.pdfStevenLCvWalkera
1. Which layer of the OSI model defines how to start, control, and end conversations by
grouping messages in a workflow?
A)Application layer
B)Presentation layer
C)Session layer
D)Transport layer
E)Network layer
F)Data link layer
G)Physical layer
2. Which of the following terms best describes the process of adding headers and possibly
trailers to information for transit?
A)Frames B) Encapsulation C) Packets D) Data Linking
3.Which of the OSI model layers has the main purpose of defining and negotiating data
formatting?
A)Data link
B)Application
C)Transport
D)Presentation
E)Network
4.In IT, what term refers to a small network that is used for business purposes, typically in the
home of a business or employee?
A)Enterprise network
B)IT network
C)Cloud network
D)SOHO network
E)Organizational network
5.Which layer of the TCP/IP model defines the rules for data packet recovery?
A)Application B) Transport C) Internet D) Data link
6.An Ethernet address is also commonly referred to as a address.
A)Unicast B) MAC C) Host D) IP E)Cam
7.On a LAN RJ-45 connector, what name is given to the eight physical connections that make
contact when connected?
A)Threads B) Strands C) Crimps D) Wires E) Pins
8.Which IEEE standard defines the use of radio waves to communicate between wireless LAN
nodes?
A)IEEE 802.11
B)IEEE 802.16
C)IEEE 802.3
D)IEEE 802.2
E)IEEE 802.5
9.When a collision occurs on a shared Ethernet network, what is the first step in recovery for the
two computers in question?
A)Send a jamming signal. B) Wait for the other computer to finish.
C) Do nothing until the line clears. D) Resend the last frame right away.
10.When connecting a wire to a host FastEthernet interface, which pins are used for
communications?
A)Pins 3 and 6 to receive B) Pins 1 and 2 for receive
C) Pins 1 and 2 to receive D) Pins 3 and 6 to transmit
E) Pins 1 and 2 to transmit F) Pins 7 and 8 for transmit
11.When connecting a router to an external CSU/DSU, which serial cable type is typically used?
A)RTS B) DTE C) DCE D) CTS E) DE
12.What is the name of the device that is typically located within a telephone company's central
office (CO) and enables it to utilize existing telephone wiring for both normal telephone services
and DSL?
A)CMTS
B)DSLAM
C)DSL modem
D)Class 5 switch
E)Telephone concentrator
13.Which HDLC field is equivalent to the preamble in Ethernet?
A)Address B) FCS C) Flag D) Control
14.Which of the following is the correct term describing the middle of the Internet, owned by
various Internet service providers and consisting of a complex network of networks?
A)WAN B) Internet access link
C) Internet core D) LAN
15.Which of the following fields in HDLC does not exist in Ethernet and is typically considered
outmoded for modern links between routers?
A)Address B) Flag C) FCS D) Control
16)What command can be used on most modern PC operating systems to display the contents of
the ARP cache from the CLI?
A)ifconfig B) netstat - a C) arpname D) arp - a
17.Which layer of the .
Here you can find 1000's of Multiple Choice Questions(MCQs) of Computer Networks includes the MCQs of basic network theory with network definition, network models, connectivity and network addressing, introducton to OSI and TCP/IP network reference models, Layers of TCP/IP and OSI model with physical layer, data link layer, network layer, transport layer, session layer and application layer along with internet protocol, ICMP, ARP and Bootstrap protocol, types of routing protocol, Routing Information Protocol(RIP), Open Shortest Path First(OSPF), Border Gateway Protocol(BGP), User Datagram Protocol(UDP), File Transfer Protocol(FTP), Simple Mail Transfer Protocol(SMTP), Hyper Text Transfer Protocol(HTTP) and IPV6 addressing methods and also of Network security and Internet security.
1. Which of the following is a Cisco IOS feature that can collect .docxjackiewalcutt
1. Which of the following is a Cisco IOS feature that can collect timestamps of traffic sent between a particular source and destination for the purpose of reviewing in an audit? (Select the best answer.)
a. CS-MARS
b. SNMPv3
c. NetFlow
d. RMON
2. Which of the following are not components of a typical CVO implementation? (Select 3 choices.)
a. a Cisco 800 series ISR
b. a Cisco Unified IP Phone
c. a Cisco 3900 series ISR
d. a Cisco 600 series AP
e. a Cisco 5500 series WLC
f. a Cisco 2500 series WLC
3. In a hierarchical network model, which layer of the network handles ACLs and IPS filtering? (Select the best answer.)
a. core
b. services block
c. access
d. distribution
4. Which of the following statements are true about a medium branch office design? (Select 2 choices.)
a. Rapid PVST+ should be configured to prevent Layer 2 loops.
b. A collapsed core should not be implemented.
c. ISR integrated 10/100/1000 interfaces should be configured as Layer 3 trunks.
d. A single ISR platform is recommended for WAN access.
e. A medium branch office design is ideal for up to 200 users.
5. Which of the following best describes how Cisco defines a medium branch office? (Select the best answer.)
a. an office that contains between 50 and 100 users and that implements a two-tier design
b. an office that contains between 100 and 200 users and that implements a two-tier design
c. an office that contains up to 50 users and that implements a one-tier design
d. an office that contains between 50 and 100 users and that implements a three-tier design
6. In which of the following layers of the hierarchical network design model should you implement QoS? (Select the best answer.)
a. in the core, distribution, and access layers
b. in the access and distribution layers only
c. in the distribution layer only
d. in the core and distribution layers only
e. in the access layer only F.in the core layer only
7. In the Cisco enterprise architecture model, which of the following best describes the switches used in the enterprise edge module? (Select the best answer.)
a. Both inner and outer switches should use Layer 3 switching exclusively.
b. Inner switches should use Layer 2 switching exclusively; outer switches should use a combination of Layer 2 and Layer 3 switching.
c. Inner switches should use Layer 3 switching exclusively; outer switches should use a
d. combination of Layer 2 and Layer 3 switching.
e. Both inner and outer switches should use Layer 2 switching exclusively.
f. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer switches should use Layer 3 switching exclusively.
g. Inner switches should use a combination of Layer 2 and Layer 3 switching; outer switches should use Layer 2 switching exclusively.
h. Inner switches should use Layer 2 switching exclusively; outer switches should use Layer 3 switching exclusively.
8. Which of the following can be used to configure router command authorizati ...
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
1. NATIONAL INSTITITUTE OF BUSINESS MANAGEMENT
Diploma in Computer Networks 17.1F
Connecting Networks-DCN-3-4-11
Date:04 June 2018 Time Allowed: 3hrs
Answer all the questions. All questions carry equal marks. Calculators are not allowed.
1.A small company with 10 employees uses a single LAN to share information between
computers. Which type of connection to the Internet would be appropriate for this company?
a) Private dedicated lines through their local service provider
b) A dialup connection that is supplied by their local telephone service provider
c)Virtual Private Networks that would enable the company to connect easily and
securely with employees
d) A broadband service, such as DSL, through their local service provider
2.Which broadband technology would be best for a small office that requires fast upstream
connections?
a) fiber-to-the-home
b) WiMax
3. What is a disadvantage of leased lines?
a) low quality
b) inconsistent availability
c) DSL
d) Cable
c) complexity
d) high cost
4. Which of the following PPP protocol allows a device to specify an IP address for routing
over the PPP link?
a) PAP
b) CHAP
c) LCP
d) IPCP
5. PPP authentication is performed at which of the following OSI layers?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
6.Which of the following additional functionality is available on an interface when the
encapsulation is changed from HDLC to PPP?
a) flow control
b) error control
c) authentication
d) synchronous communication
7. What are the two types of VPN connections? (Choose two of the answers.)
a) PPPoE
b) site-to-site
c) leased line
d) Frame Relay
e) remote access
8. Which troubleshooting method begins by examining cable connections and wiring issues?
Page 1 of 4
2. a) top-down
b) divide-and-conquer
Page 2 of 4
c) substitution
d) bottom-up
9. What is an advantage offered by GRE tunnels?
a) built in security mechanisms
b) encryption of encapsulated traffic
c) support for IP multicast tunneling
d) support for connecting individual hosts across the Internet
10. What TCP port is used by BGP to exchange messages between routers?
a) 22
b) 58
c) 179
d) 443
11. Which of the following statements describe a characteristic of standard IPv4 ACLs?
a) They are configured in the interface configuration mode.
b) They filter traffic based on source IP addresses only.
c) They can be created with a number but not with a name.
d) They can be configured to filter traffic based on both source IP addresses and
source ports.
12.What range of IP addresses is represented by the network and wildcard mask
192.168.70.0 0.0.0.127?
a) 192.168.70.0 to 192.168.70.127
b) 192.168.70.0 to 192.168.70.255
c) 192.168.70.0 to 192.168.70.63
d) 192.168.70.0 to 192.168.71.255
13. What is the only type of ACL available for IPv6?
a) named standard
b) named extended
c) numbered standard
d) numbered extended
14.A networked PC is having trouble accessing the Internet, but can print to a local printer
and ping other computers in the area. Other computers on the same network do not have
any issues. What is the problem?
a) The PC has a missing or incorrect default gateway.
b)The link between the switch to which the PC connects and the default gateway
router is down.
c) The switch port to which the PC connects has an incorrect VLAN configured.
d) The default gateway router does not have a default route.
15. Which of the following modes is used to configure SNMP?
a) privileged mode
b) global configuration mode
c) interface configuration mode
d) router configuration mode
16. What is an SNMP management agent?
3. a) a computer loaded with management software and used by an administrator to
monitor a network
b) a database that a device keeps about network performance
c) software that is installed on devices managed by SNMP
d) a communication protocol that is used by SNMP
17.What is the best mitigation plan for thwarting a DoS attack that is creating a switch buffer
overflow?
a) Disable DTP.
b) Disable STP.
c) Enable port security.
d) Place unused ports in an unused VLAN.
18.Which of the following protocol or service allows network administrators to receive
system messages that are provided by network devices?
Page 3 of 4
a) SNMP
b) syslog
c) NetFlow
d) NTP
19. Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ)
when low latency queuing (LLQ) is being used?
a) video
b) data
c) voice
d) management
20. Which protocol or service allows network administrators to receive system messages
that are provided by network devices?
a) SNMP
b) syslog
c) NetFlow
d) NTP
Part B
Answer All questions. The marks given in brackets are indicative of the weight given
to each part of the question
B1. A WAN operates beyond the geographic scope of a LAN.
a) What is the difference between LAN and WAN? (4 marks)
a) List 3 Common WAN topologies with the diagrams (6 marks)
b) Identify (Using a Diagram) and fill the table using the WAN Terms given below
(5Marks)
briefly describe WAN Terms given below (5marks)
CPE | DCE | DTE | Demarcation Point | Local Loop
WAN Term
A
B
C
D
E
4. B2. The following question is on Network Security, Monitoring and troubleshooting.
a) The SNMP system consists of three elements. List the 3 elements. (3 marks)
b) What are the port numbers that are used by SNMP? (2 marks)
c) What is the advantage over Switched Port Analyzer (SPAN) feature? (3 marks)
d) What is ACL Packet Filtering? (2 marks)
e) Briefly describe the below ACL Statements? Specify the ACL type. (4 marks)
f)Briefly explain the layered troubleshooting approach (including three methods)? (6
marks)
B3 a) Briefly describe terms given below (8 marks)
Bandwidth, Congestion, Delay, and Jitter
b) Match each item given below to its description (6 marks)
Code delay | Propagation Delay | Packet Loss | jitter | Queue | Bandwidth |
serialization Delay | Congestion
1.This happens when congestion occurs
2.The fixed amount of time it takes to transmit a frame from the NIC to the
Wire.
3. Holds packets memory until resources become available to transmit them.
4. The Number of bits that Can transmitted in a Single second.
5.The fixed amount of time it takes to compress data at the source before
transmitting to the first networking device
6. When the demand for bandwidth exceeds the amount available
c) What is Traffic policing? (2 marks)
d) Write three advantages of virtualization? (2 marks)
e)Cloud services are available in a variety of options, tailored to meet customer
requirements. The three main cloud computing services defined by the National
Institute of Standards and Technology (NIST) in their Special Publication 800-145.
List down three cloud computing services? (2 marks)
Page 4 of 4