SlideShare a Scribd company logo
NATIONAL INSTITITUTE OF BUSINESS MANAGEMENT
Diploma in Computer Networks 17.1F
Connecting Networks-DCN-3-4-11
Date:04 June 2018 Time Allowed: 3hrs
Answer all the questions. All questions carry equal marks. Calculators are not allowed.
1.A small company with 10 employees uses a single LAN to share information between
computers. Which type of connection to the Internet would be appropriate for this company?
a) Private dedicated lines through their local service provider
b) A dialup connection that is supplied by their local telephone service provider
c)Virtual Private Networks that would enable the company to connect easily and
securely with employees
d) A broadband service, such as DSL, through their local service provider
2.Which broadband technology would be best for a small office that requires fast upstream
connections?
a) fiber-to-the-home
b) WiMax
3. What is a disadvantage of leased lines?
a) low quality
b) inconsistent availability
c) DSL
d) Cable
c) complexity
d) high cost
4. Which of the following PPP protocol allows a device to specify an IP address for routing
over the PPP link?
a) PAP
b) CHAP
c) LCP
d) IPCP
5. PPP authentication is performed at which of the following OSI layers?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
6.Which of the following additional functionality is available on an interface when the
encapsulation is changed from HDLC to PPP?
a) flow control
b) error control
c) authentication
d) synchronous communication
7. What are the two types of VPN connections? (Choose two of the answers.)
a) PPPoE
b) site-to-site
c) leased line
d) Frame Relay
e) remote access
8. Which troubleshooting method begins by examining cable connections and wiring issues?
Page 1 of 4
a) top-down
b) divide-and-conquer
Page 2 of 4
c) substitution
d) bottom-up
9. What is an advantage offered by GRE tunnels?
a) built in security mechanisms
b) encryption of encapsulated traffic
c) support for IP multicast tunneling
d) support for connecting individual hosts across the Internet
10. What TCP port is used by BGP to exchange messages between routers?
a) 22
b) 58
c) 179
d) 443
11. Which of the following statements describe a characteristic of standard IPv4 ACLs?
a) They are configured in the interface configuration mode.
b) They filter traffic based on source IP addresses only.
c) They can be created with a number but not with a name.
d) They can be configured to filter traffic based on both source IP addresses and
source ports.
12.What range of IP addresses is represented by the network and wildcard mask
192.168.70.0 0.0.0.127?
a) 192.168.70.0 to 192.168.70.127
b) 192.168.70.0 to 192.168.70.255
c) 192.168.70.0 to 192.168.70.63
d) 192.168.70.0 to 192.168.71.255
13. What is the only type of ACL available for IPv6?
a) named standard
b) named extended
c) numbered standard
d) numbered extended
14.A networked PC is having trouble accessing the Internet, but can print to a local printer
and ping other computers in the area. Other computers on the same network do not have
any issues. What is the problem?
a) The PC has a missing or incorrect default gateway.
b)The link between the switch to which the PC connects and the default gateway
router is down.
c) The switch port to which the PC connects has an incorrect VLAN configured.
d) The default gateway router does not have a default route.
15. Which of the following modes is used to configure SNMP?
a) privileged mode
b) global configuration mode
c) interface configuration mode
d) router configuration mode
16. What is an SNMP management agent?
a) a computer loaded with management software and used by an administrator to
monitor a network
b) a database that a device keeps about network performance
c) software that is installed on devices managed by SNMP
d) a communication protocol that is used by SNMP
17.What is the best mitigation plan for thwarting a DoS attack that is creating a switch buffer
overflow?
a) Disable DTP.
b) Disable STP.
c) Enable port security.
d) Place unused ports in an unused VLAN.
18.Which of the following protocol or service allows network administrators to receive
system messages that are provided by network devices?
Page 3 of 4
a) SNMP
b) syslog
c) NetFlow
d) NTP
19. Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ)
when low latency queuing (LLQ) is being used?
a) video
b) data
c) voice
d) management
20. Which protocol or service allows network administrators to receive system messages
that are provided by network devices?
a) SNMP
b) syslog
c) NetFlow
d) NTP
Part B
Answer All questions. The marks given in brackets are indicative of the weight given
to each part of the question
B1. A WAN operates beyond the geographic scope of a LAN.
a) What is the difference between LAN and WAN? (4 marks)
a) List 3 Common WAN topologies with the diagrams (6 marks)
b) Identify (Using a Diagram) and fill the table using the WAN Terms given below
(5Marks)
briefly describe WAN Terms given below (5marks)
CPE | DCE | DTE | Demarcation Point | Local Loop
WAN Term
A
B
C
D
E
B2. The following question is on Network Security, Monitoring and troubleshooting.
a) The SNMP system consists of three elements. List the 3 elements. (3 marks)
b) What are the port numbers that are used by SNMP? (2 marks)
c) What is the advantage over Switched Port Analyzer (SPAN) feature? (3 marks)
d) What is ACL Packet Filtering? (2 marks)
e) Briefly describe the below ACL Statements? Specify the ACL type. (4 marks)
f)Briefly explain the layered troubleshooting approach (including three methods)? (6
marks)
B3 a) Briefly describe terms given below (8 marks)
Bandwidth, Congestion, Delay, and Jitter
b) Match each item given below to its description (6 marks)
Code delay | Propagation Delay | Packet Loss | jitter | Queue | Bandwidth |
serialization Delay | Congestion
1.This happens when congestion occurs
2.The fixed amount of time it takes to transmit a frame from the NIC to the
Wire.
3. Holds packets memory until resources become available to transmit them.
4. The Number of bits that Can transmitted in a Single second.
5.The fixed amount of time it takes to compress data at the source before
transmitting to the first networking device
6. When the demand for bandwidth exceeds the amount available
c) What is Traffic policing? (2 marks)
d) Write three advantages of virtualization? (2 marks)
e)Cloud services are available in a variety of options, tailored to meet customer
requirements. The three main cloud computing services defined by the National
Institute of Standards and Technology (NIST) in their Special Publication 800-145.
List down three cloud computing services? (2 marks)
Page 4 of 4

More Related Content

Similar to Connecting Network

Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5friv4schoolgames
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
Santhosh Krishna
 
Wn vt
Wn vtWn vt
MCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docxMCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docx
hariraaghav1909
 
Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
Md. Mashiur Rahman
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
Tanat Tonguthaisri
 
Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011Dân Chơi
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
ccna4discovery
 
1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf
StevenLCvWalkera
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
Download Mipdfcom
 
FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES Amira Dolce Farhana
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
Shusil Baral
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 
1. Which of the following is a Cisco IOS feature that can collect .docx
1. Which of the following is a Cisco IOS feature that can collect .docx1. Which of the following is a Cisco IOS feature that can collect .docx
1. Which of the following is a Cisco IOS feature that can collect .docx
jackiewalcutt
 
Examination paper system maagement & operating systems
Examination paper system maagement & operating systemsExamination paper system maagement & operating systems
Examination paper system maagement & operating systems
NMIMS ASSIGNMENTS HELP
 

Similar to Connecting Network (20)

On tap ccent
On tap ccentOn tap ccent
On tap ccent
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
 
Wn vt
Wn vtWn vt
Wn vt
 
MCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docxMCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docx
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
 
Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf
 
Ccna dumps
Ccna dumpsCcna dumps
Ccna dumps
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
Ccna study
Ccna studyCcna study
Ccna study
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
1. Which of the following is a Cisco IOS feature that can collect .docx
1. Which of the following is a Cisco IOS feature that can collect .docx1. Which of the following is a Cisco IOS feature that can collect .docx
1. Which of the following is a Cisco IOS feature that can collect .docx
 
Examination paper system maagement & operating systems
Examination paper system maagement & operating systemsExamination paper system maagement & operating systems
Examination paper system maagement & operating systems
 

Recently uploaded

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 

Recently uploaded (20)

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 

Connecting Network

  • 1. NATIONAL INSTITITUTE OF BUSINESS MANAGEMENT Diploma in Computer Networks 17.1F Connecting Networks-DCN-3-4-11 Date:04 June 2018 Time Allowed: 3hrs Answer all the questions. All questions carry equal marks. Calculators are not allowed. 1.A small company with 10 employees uses a single LAN to share information between computers. Which type of connection to the Internet would be appropriate for this company? a) Private dedicated lines through their local service provider b) A dialup connection that is supplied by their local telephone service provider c)Virtual Private Networks that would enable the company to connect easily and securely with employees d) A broadband service, such as DSL, through their local service provider 2.Which broadband technology would be best for a small office that requires fast upstream connections? a) fiber-to-the-home b) WiMax 3. What is a disadvantage of leased lines? a) low quality b) inconsistent availability c) DSL d) Cable c) complexity d) high cost 4. Which of the following PPP protocol allows a device to specify an IP address for routing over the PPP link? a) PAP b) CHAP c) LCP d) IPCP 5. PPP authentication is performed at which of the following OSI layers? a) Layer 1 b) Layer 2 c) Layer 3 d) Layer 4 6.Which of the following additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP? a) flow control b) error control c) authentication d) synchronous communication 7. What are the two types of VPN connections? (Choose two of the answers.) a) PPPoE b) site-to-site c) leased line d) Frame Relay e) remote access 8. Which troubleshooting method begins by examining cable connections and wiring issues? Page 1 of 4
  • 2. a) top-down b) divide-and-conquer Page 2 of 4 c) substitution d) bottom-up 9. What is an advantage offered by GRE tunnels? a) built in security mechanisms b) encryption of encapsulated traffic c) support for IP multicast tunneling d) support for connecting individual hosts across the Internet 10. What TCP port is used by BGP to exchange messages between routers? a) 22 b) 58 c) 179 d) 443 11. Which of the following statements describe a characteristic of standard IPv4 ACLs? a) They are configured in the interface configuration mode. b) They filter traffic based on source IP addresses only. c) They can be created with a number but not with a name. d) They can be configured to filter traffic based on both source IP addresses and source ports. 12.What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127? a) 192.168.70.0 to 192.168.70.127 b) 192.168.70.0 to 192.168.70.255 c) 192.168.70.0 to 192.168.70.63 d) 192.168.70.0 to 192.168.71.255 13. What is the only type of ACL available for IPv6? a) named standard b) named extended c) numbered standard d) numbered extended 14.A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network do not have any issues. What is the problem? a) The PC has a missing or incorrect default gateway. b)The link between the switch to which the PC connects and the default gateway router is down. c) The switch port to which the PC connects has an incorrect VLAN configured. d) The default gateway router does not have a default route. 15. Which of the following modes is used to configure SNMP? a) privileged mode b) global configuration mode c) interface configuration mode d) router configuration mode 16. What is an SNMP management agent?
  • 3. a) a computer loaded with management software and used by an administrator to monitor a network b) a database that a device keeps about network performance c) software that is installed on devices managed by SNMP d) a communication protocol that is used by SNMP 17.What is the best mitigation plan for thwarting a DoS attack that is creating a switch buffer overflow? a) Disable DTP. b) Disable STP. c) Enable port security. d) Place unused ports in an unused VLAN. 18.Which of the following protocol or service allows network administrators to receive system messages that are provided by network devices? Page 3 of 4 a) SNMP b) syslog c) NetFlow d) NTP 19. Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used? a) video b) data c) voice d) management 20. Which protocol or service allows network administrators to receive system messages that are provided by network devices? a) SNMP b) syslog c) NetFlow d) NTP Part B Answer All questions. The marks given in brackets are indicative of the weight given to each part of the question B1. A WAN operates beyond the geographic scope of a LAN. a) What is the difference between LAN and WAN? (4 marks) a) List 3 Common WAN topologies with the diagrams (6 marks) b) Identify (Using a Diagram) and fill the table using the WAN Terms given below (5Marks) briefly describe WAN Terms given below (5marks) CPE | DCE | DTE | Demarcation Point | Local Loop WAN Term A B C D E
  • 4. B2. The following question is on Network Security, Monitoring and troubleshooting. a) The SNMP system consists of three elements. List the 3 elements. (3 marks) b) What are the port numbers that are used by SNMP? (2 marks) c) What is the advantage over Switched Port Analyzer (SPAN) feature? (3 marks) d) What is ACL Packet Filtering? (2 marks) e) Briefly describe the below ACL Statements? Specify the ACL type. (4 marks) f)Briefly explain the layered troubleshooting approach (including three methods)? (6 marks) B3 a) Briefly describe terms given below (8 marks) Bandwidth, Congestion, Delay, and Jitter b) Match each item given below to its description (6 marks) Code delay | Propagation Delay | Packet Loss | jitter | Queue | Bandwidth | serialization Delay | Congestion 1.This happens when congestion occurs 2.The fixed amount of time it takes to transmit a frame from the NIC to the Wire. 3. Holds packets memory until resources become available to transmit them. 4. The Number of bits that Can transmitted in a Single second. 5.The fixed amount of time it takes to compress data at the source before transmitting to the first networking device 6. When the demand for bandwidth exceeds the amount available c) What is Traffic policing? (2 marks) d) Write three advantages of virtualization? (2 marks) e)Cloud services are available in a variety of options, tailored to meet customer requirements. The three main cloud computing services defined by the National Institute of Standards and Technology (NIST) in their Special Publication 800-145. List down three cloud computing services? (2 marks) Page 4 of 4