This document contains a practice exam for a diploma in computer networks. It has three parts covering various topics in computer networks:
Part A contains 20 multiple choice questions testing knowledge of topics like physical network topologies, protocols, VPNs, troubleshooting tools, and QoS.
Part B has longer form questions asking about the differences between LANs and WANs, common WAN topologies, WAN terms, SNMP components, ports and features, ACLs, and a network diagram problem.
Part C covers terms related to bandwidth, congestion, delay and jitter; matching descriptions to network terms; defining IoT; and listing the three main NIST cloud computing service models.
1- Which layer of the OSI model defines how to start- control- and end.pdfStevenLCvWalkera
1. Which layer of the OSI model defines how to start, control, and end conversations by
grouping messages in a workflow?
A)Application layer
B)Presentation layer
C)Session layer
D)Transport layer
E)Network layer
F)Data link layer
G)Physical layer
2. Which of the following terms best describes the process of adding headers and possibly
trailers to information for transit?
A)Frames B) Encapsulation C) Packets D) Data Linking
3.Which of the OSI model layers has the main purpose of defining and negotiating data
formatting?
A)Data link
B)Application
C)Transport
D)Presentation
E)Network
4.In IT, what term refers to a small network that is used for business purposes, typically in the
home of a business or employee?
A)Enterprise network
B)IT network
C)Cloud network
D)SOHO network
E)Organizational network
5.Which layer of the TCP/IP model defines the rules for data packet recovery?
A)Application B) Transport C) Internet D) Data link
6.An Ethernet address is also commonly referred to as a address.
A)Unicast B) MAC C) Host D) IP E)Cam
7.On a LAN RJ-45 connector, what name is given to the eight physical connections that make
contact when connected?
A)Threads B) Strands C) Crimps D) Wires E) Pins
8.Which IEEE standard defines the use of radio waves to communicate between wireless LAN
nodes?
A)IEEE 802.11
B)IEEE 802.16
C)IEEE 802.3
D)IEEE 802.2
E)IEEE 802.5
9.When a collision occurs on a shared Ethernet network, what is the first step in recovery for the
two computers in question?
A)Send a jamming signal. B) Wait for the other computer to finish.
C) Do nothing until the line clears. D) Resend the last frame right away.
10.When connecting a wire to a host FastEthernet interface, which pins are used for
communications?
A)Pins 3 and 6 to receive B) Pins 1 and 2 for receive
C) Pins 1 and 2 to receive D) Pins 3 and 6 to transmit
E) Pins 1 and 2 to transmit F) Pins 7 and 8 for transmit
11.When connecting a router to an external CSU/DSU, which serial cable type is typically used?
A)RTS B) DTE C) DCE D) CTS E) DE
12.What is the name of the device that is typically located within a telephone company's central
office (CO) and enables it to utilize existing telephone wiring for both normal telephone services
and DSL?
A)CMTS
B)DSLAM
C)DSL modem
D)Class 5 switch
E)Telephone concentrator
13.Which HDLC field is equivalent to the preamble in Ethernet?
A)Address B) FCS C) Flag D) Control
14.Which of the following is the correct term describing the middle of the Internet, owned by
various Internet service providers and consisting of a complex network of networks?
A)WAN B) Internet access link
C) Internet core D) LAN
15.Which of the following fields in HDLC does not exist in Ethernet and is typically considered
outmoded for modern links between routers?
A)Address B) Flag C) FCS D) Control
16)What command can be used on most modern PC operating systems to display the contents of
the ARP cache from the CLI?
A)ifconfig B) netstat - a C) arpname D) arp - a
17.Which layer of the .
Here you can find 1000's of Multiple Choice Questions(MCQs) of Computer Networks includes the MCQs of basic network theory with network definition, network models, connectivity and network addressing, introducton to OSI and TCP/IP network reference models, Layers of TCP/IP and OSI model with physical layer, data link layer, network layer, transport layer, session layer and application layer along with internet protocol, ICMP, ARP and Bootstrap protocol, types of routing protocol, Routing Information Protocol(RIP), Open Shortest Path First(OSPF), Border Gateway Protocol(BGP), User Datagram Protocol(UDP), File Transfer Protocol(FTP), Simple Mail Transfer Protocol(SMTP), Hyper Text Transfer Protocol(HTTP) and IPV6 addressing methods and also of Network security and Internet security.
1) What is the difference between CSMACD and CSMACA2) Which .docxdorishigh
1) What is the difference between CSMA/CD and CSMA/CA
2) Which of the following is a form of Ethernet that is transmitted over Fiber Optics
3) You’re setting up a network at an engineering office where very large files are going to move back and forth over the network all day long, day in and day out. Which of the following devices is more likely to avoid a lot of network congestion?
4) A router operates at the ____________ layer of the OSI model.
5) Which of the OSI layers interprets an IP address?
6) How does Exponential backoff work.
7) A collision on an Ethernet network occurs when ______________.
8) In the above illustrated IP address, if this were a Class B address, which of the four octets would be part of the network address?
9) Describe how CSMA/CD works.
10) RIP is a form of _______________ protocol.
11) You have a Class C TCP/IP network. You are using the default subnet mask. What is the maximum number of hosts you can have on your network?
12) Which Networking hardware protocol utilizes CSMA/CD media access methods?
1) FDDI uses a ___________ topology
2) 15.46.86.101 is a ________________ IP address.
3) What is the difference between RTZ and AMI signaling.
4) Which network topology requires that a terminator be installed at both ends of the network?
1) IPX/SPX uses a ____________ -bit network address.
2) The proper default subnet mask for a Class A network is 255.255.0.0.
1) Why is CRC a better error detection method than checksum
2) Which of the following is NOT something DHCP can automaticall configure.
3) The HTTP protocol uses port 80 on a typical Windows machine
4) TCP/IP Version 6 uses a _____________ -bit address.
5) Which of the following OSI layers breaks the user data down into smaller chunks for transmission onto the network?
1) The protocol that is used for outgoing email messages is usually _____________.
...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
1- Which layer of the OSI model defines how to start- control- and end.pdfStevenLCvWalkera
1. Which layer of the OSI model defines how to start, control, and end conversations by
grouping messages in a workflow?
A)Application layer
B)Presentation layer
C)Session layer
D)Transport layer
E)Network layer
F)Data link layer
G)Physical layer
2. Which of the following terms best describes the process of adding headers and possibly
trailers to information for transit?
A)Frames B) Encapsulation C) Packets D) Data Linking
3.Which of the OSI model layers has the main purpose of defining and negotiating data
formatting?
A)Data link
B)Application
C)Transport
D)Presentation
E)Network
4.In IT, what term refers to a small network that is used for business purposes, typically in the
home of a business or employee?
A)Enterprise network
B)IT network
C)Cloud network
D)SOHO network
E)Organizational network
5.Which layer of the TCP/IP model defines the rules for data packet recovery?
A)Application B) Transport C) Internet D) Data link
6.An Ethernet address is also commonly referred to as a address.
A)Unicast B) MAC C) Host D) IP E)Cam
7.On a LAN RJ-45 connector, what name is given to the eight physical connections that make
contact when connected?
A)Threads B) Strands C) Crimps D) Wires E) Pins
8.Which IEEE standard defines the use of radio waves to communicate between wireless LAN
nodes?
A)IEEE 802.11
B)IEEE 802.16
C)IEEE 802.3
D)IEEE 802.2
E)IEEE 802.5
9.When a collision occurs on a shared Ethernet network, what is the first step in recovery for the
two computers in question?
A)Send a jamming signal. B) Wait for the other computer to finish.
C) Do nothing until the line clears. D) Resend the last frame right away.
10.When connecting a wire to a host FastEthernet interface, which pins are used for
communications?
A)Pins 3 and 6 to receive B) Pins 1 and 2 for receive
C) Pins 1 and 2 to receive D) Pins 3 and 6 to transmit
E) Pins 1 and 2 to transmit F) Pins 7 and 8 for transmit
11.When connecting a router to an external CSU/DSU, which serial cable type is typically used?
A)RTS B) DTE C) DCE D) CTS E) DE
12.What is the name of the device that is typically located within a telephone company's central
office (CO) and enables it to utilize existing telephone wiring for both normal telephone services
and DSL?
A)CMTS
B)DSLAM
C)DSL modem
D)Class 5 switch
E)Telephone concentrator
13.Which HDLC field is equivalent to the preamble in Ethernet?
A)Address B) FCS C) Flag D) Control
14.Which of the following is the correct term describing the middle of the Internet, owned by
various Internet service providers and consisting of a complex network of networks?
A)WAN B) Internet access link
C) Internet core D) LAN
15.Which of the following fields in HDLC does not exist in Ethernet and is typically considered
outmoded for modern links between routers?
A)Address B) Flag C) FCS D) Control
16)What command can be used on most modern PC operating systems to display the contents of
the ARP cache from the CLI?
A)ifconfig B) netstat - a C) arpname D) arp - a
17.Which layer of the .
Here you can find 1000's of Multiple Choice Questions(MCQs) of Computer Networks includes the MCQs of basic network theory with network definition, network models, connectivity and network addressing, introducton to OSI and TCP/IP network reference models, Layers of TCP/IP and OSI model with physical layer, data link layer, network layer, transport layer, session layer and application layer along with internet protocol, ICMP, ARP and Bootstrap protocol, types of routing protocol, Routing Information Protocol(RIP), Open Shortest Path First(OSPF), Border Gateway Protocol(BGP), User Datagram Protocol(UDP), File Transfer Protocol(FTP), Simple Mail Transfer Protocol(SMTP), Hyper Text Transfer Protocol(HTTP) and IPV6 addressing methods and also of Network security and Internet security.
1) What is the difference between CSMACD and CSMACA2) Which .docxdorishigh
1) What is the difference between CSMA/CD and CSMA/CA
2) Which of the following is a form of Ethernet that is transmitted over Fiber Optics
3) You’re setting up a network at an engineering office where very large files are going to move back and forth over the network all day long, day in and day out. Which of the following devices is more likely to avoid a lot of network congestion?
4) A router operates at the ____________ layer of the OSI model.
5) Which of the OSI layers interprets an IP address?
6) How does Exponential backoff work.
7) A collision on an Ethernet network occurs when ______________.
8) In the above illustrated IP address, if this were a Class B address, which of the four octets would be part of the network address?
9) Describe how CSMA/CD works.
10) RIP is a form of _______________ protocol.
11) You have a Class C TCP/IP network. You are using the default subnet mask. What is the maximum number of hosts you can have on your network?
12) Which Networking hardware protocol utilizes CSMA/CD media access methods?
1) FDDI uses a ___________ topology
2) 15.46.86.101 is a ________________ IP address.
3) What is the difference between RTZ and AMI signaling.
4) Which network topology requires that a terminator be installed at both ends of the network?
1) IPX/SPX uses a ____________ -bit network address.
2) The proper default subnet mask for a Class A network is 255.255.0.0.
1) Why is CRC a better error detection method than checksum
2) Which of the following is NOT something DHCP can automaticall configure.
3) The HTTP protocol uses port 80 on a typical Windows machine
4) TCP/IP Version 6 uses a _____________ -bit address.
5) Which of the following OSI layers breaks the user data down into smaller chunks for transmission onto the network?
1) The protocol that is used for outgoing email messages is usually _____________.
...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Home assignment II on Spectroscopy 2024 Answers.pdf
Connecting network
1. NATIONAL INSTITUTE OF BUSINESS MANAGEMENT
Diploma in Computer Networks 17.1P
Connecting Networks – DCN-3-3-13
Date: 15.05.2018 Time Allowed:3hrs
Answer all Questions. All questions carry equal marks. Calculators are not allowed.
Part A
1. Which statement describes the physical topology of a LAN?
a) It depicts the addressing scheme that is employed in the LAN.
b) It describes whether the LAN is a broadcast or token-passing network.
c) It defines how hosts and network devices connect to the LAN.
d) It shows the order in which hosts access the network.
2.Which of the following features send simulated data across the network and measures
performance between multiple network locations?
a) LLDP
b) IP SLA
3. What is a disadvantage of a leased line?
a) low quality
b) inconsistent availability
c) syslog
d) SPAN
c) complexity
d) high cost
4. Which of the following PPP protocol allows a device to specify an IP address for routing
over the PPP link?
a) PAP
b) CHAP
c) LCP
d) IPCP
5. PPP authentication is performed at which of the following OSI layers?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
6. Which additional functionality is available on an interface when the encapsulation is
changed from HDLC to PPP?
a) flow control
b) error control
c) authentication
d) synchronous communication
7. What are the two types of VPN connections? (Choose two of the following answers.)
a) PPPoE
b) site-to-site
c) leased line
d) Frame Relay
e) remote access
8. Which of the following two components are needed to provide a DSL connection to a
SOHO? (Choose two of the following answers.)
a) transceiver
b) DSLAM
c) CMTS
d) CM
e) PPPoE enabled switch
Page 1 of 5
2. 9. What is an advantage offered by GRE tunnels?
a) built in security mechanisms
b) encryption of encapsulated traffic
c) support for IP multicast tunneling
d) support for connecting individual hosts across the Internet
10. What TCP port is used by BGP to exchange messages between routers?
Page 2 of 5
a) 22
b) 58
c) 179
d) 443
11. Which of the following troubleshooting tool can be used to pinpoint the distance to a
break in a network cable?
a) digital multimeter
b) network analyzer
c) network analysis module
d) cable tester
12.What range of IP addresses is represented by the network and wildcard mask
192.168.70.0 0.0.0.127?
a) 192.168.70.0 to 192.168.70.127
b) 192.168.70.0 to 192.168.70.255
c) 192.168.70.0 to 192.168.70.63
d) 192.168.70.0 to 192.168.71.255
13. What is the only type of ACL available for IPv6?
a) named standard
b) named extended
c) numbered standard
d) numbered extended
14.An administrator has configured an access list on R1 to allow SSH administrative access
from host 172.16.1.100. Which command correctly applies the ACL?
a) R1(config-if)# ip access-group 1 in
b) R1(config-if)# ip access-group 1 out
c) R1(config-line)# access-class 1 in
d) R1(config-line)# access-class 1 out
15. Which of the following modes is used to configure SNMP?
a) privileged mode
b) global configuration mode
c) interface configuration mode
d) router configuration mode
16. What is an SNMP management agent?
a) a computer loaded with management software and used by an administrator to
monitor a network
b) a database that a device keeps about network performance
c) software that is installed on devices managed by SNMP
d) a communication protocol that is used by SNMP
3. 17. Which of the following mitigation plans is best for thwarting a DoS attack that is creating
a switch buffer overflow?
a) Disable DTP.
b) Disable STP.
c) Enable port security.
d) Place unused ports in an
unused VLAN.
18. An attack has been launched within a company and a host name has been identified as
the source. What command can a network technician use to determine the IP address
assigned to the host name?
a) ipconfig /all
b) net computer
c) nslookup
d) tracert
19. Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ)
when low latency queuing (LLQ) is being used?
a) video
b) data
c) voice
d) management
20. Which two WAN infrastructure services are examples of private connections? (Choose
two of the following answers.)
a) T1/E1
b) wireless
c) DSL
d) cable
e) Frame Relay
Part B
B1. A WAN operates beyond the geographic scope of a LAN.
a) What is the difference between LAN and WAN? (4 marks)
b) List 3 Common WAN topologies with suitable diagrams (6 marks)
c)Identify and briefly describe the WAN Terms used in the diagram given below? (10
marks)
CPE
Page 3 of 5
4. DCE
DTE
Demarcation Point
Local Loop
B2. This question is about the Network Security and Monitoring
a) The SNMP system consists of three elements. List them. (3 marks)
b) What are the ports numbers that is used by SNMP? (2 marks)
c) What is the advantage over Switched Port Analyzer (SPAN) feature? (3 marks)
d) What is ACL Packet Filtering? (2 marks)
e) Briefly describe the below ACL Statements. Specify the ACL type. (4 marks)
f) In the figure given below, the 192.168.11.0/24 network can use Telnet to connect
to 192.168.30.0/24, but according to company policy, this connection should not
be allowed. The results of the show access-lists 130 command indicate that the
permit statement has been matched.
What is the solution? (6 marks)
B3 a) Briefly describe the terms given below(8 marks)
Bandwidth, Congestion, Delay, and Jitter
b) match each item given below to its description (8 marks)
Code delay | Propagation Delay | Packet Loss | jitter | Queue | Bandwidth |
serialization Delay | Congestion
1.This happens when congestion occurs
2.The fixed amount of time it takes to transmit a frame from the NIC to the
Wire.
Page 4 of 5
5. Page 5 of 5
3. Holds packets memory until resources become available to transmit them.
4. The Number of bits that Can transmitted in a Single second.
5.The fixed amount of time it takes to compress data at the source before
transmitting to the first networking device
6. When the demand for bandwidth exceeds the amount available
c) What is IoT? (2 marks)
d)Cloud services are available in a variety of options, tailored to meet customer
requirements. There are three main cloud computing services defined by the National
Institute of Standards and Technology (NIST) in their Special Publication 800-145.
List down the three cloud computing services? (2 marks)