SlideShare a Scribd company logo
NATIONAL INSTITUTE OF BUSINESS MANAGEMENT
Diploma in Computer Networks 17.1P
Connecting Networks – DCN-3-3-13
Date: 15.05.2018 Time Allowed:3hrs
Answer all Questions. All questions carry equal marks. Calculators are not allowed.
Part A
1. Which statement describes the physical topology of a LAN?
a) It depicts the addressing scheme that is employed in the LAN.
b) It describes whether the LAN is a broadcast or token-passing network.
c) It defines how hosts and network devices connect to the LAN.
d) It shows the order in which hosts access the network.
2.Which of the following features send simulated data across the network and measures
performance between multiple network locations?
a) LLDP
b) IP SLA
3. What is a disadvantage of a leased line?
a) low quality
b) inconsistent availability
c) syslog
d) SPAN
c) complexity
d) high cost
4. Which of the following PPP protocol allows a device to specify an IP address for routing
over the PPP link?
a) PAP
b) CHAP
c) LCP
d) IPCP
5. PPP authentication is performed at which of the following OSI layers?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
6. Which additional functionality is available on an interface when the encapsulation is
changed from HDLC to PPP?
a) flow control
b) error control
c) authentication
d) synchronous communication
7. What are the two types of VPN connections? (Choose two of the following answers.)
a) PPPoE
b) site-to-site
c) leased line
d) Frame Relay
e) remote access
8. Which of the following two components are needed to provide a DSL connection to a
SOHO? (Choose two of the following answers.)
a) transceiver
b) DSLAM
c) CMTS
d) CM
e) PPPoE enabled switch
Page 1 of 5
9. What is an advantage offered by GRE tunnels?
a) built in security mechanisms
b) encryption of encapsulated traffic
c) support for IP multicast tunneling
d) support for connecting individual hosts across the Internet
10. What TCP port is used by BGP to exchange messages between routers?
Page 2 of 5
a) 22
b) 58
c) 179
d) 443
11. Which of the following troubleshooting tool can be used to pinpoint the distance to a
break in a network cable?
a) digital multimeter
b) network analyzer
c) network analysis module
d) cable tester
12.What range of IP addresses is represented by the network and wildcard mask
192.168.70.0 0.0.0.127?
a) 192.168.70.0 to 192.168.70.127
b) 192.168.70.0 to 192.168.70.255
c) 192.168.70.0 to 192.168.70.63
d) 192.168.70.0 to 192.168.71.255
13. What is the only type of ACL available for IPv6?
a) named standard
b) named extended
c) numbered standard
d) numbered extended
14.An administrator has configured an access list on R1 to allow SSH administrative access
from host 172.16.1.100. Which command correctly applies the ACL?
a) R1(config-if)# ip access-group 1 in
b) R1(config-if)# ip access-group 1 out
c) R1(config-line)# access-class 1 in
d) R1(config-line)# access-class 1 out
15. Which of the following modes is used to configure SNMP?
a) privileged mode
b) global configuration mode
c) interface configuration mode
d) router configuration mode
16. What is an SNMP management agent?
a) a computer loaded with management software and used by an administrator to
monitor a network
b) a database that a device keeps about network performance
c) software that is installed on devices managed by SNMP
d) a communication protocol that is used by SNMP
17. Which of the following mitigation plans is best for thwarting a DoS attack that is creating
a switch buffer overflow?
a) Disable DTP.
b) Disable STP.
c) Enable port security.
d) Place unused ports in an
unused VLAN.
18. An attack has been launched within a company and a host name has been identified as
the source. What command can a network technician use to determine the IP address
assigned to the host name?
a) ipconfig /all
b) net computer
c) nslookup
d) tracert
19. Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ)
when low latency queuing (LLQ) is being used?
a) video
b) data
c) voice
d) management
20. Which two WAN infrastructure services are examples of private connections? (Choose
two of the following answers.)
a) T1/E1
b) wireless
c) DSL
d) cable
e) Frame Relay
Part B
B1. A WAN operates beyond the geographic scope of a LAN.
a) What is the difference between LAN and WAN? (4 marks)
b) List 3 Common WAN topologies with suitable diagrams (6 marks)
c)Identify and briefly describe the WAN Terms used in the diagram given below? (10
marks)
CPE
Page 3 of 5
DCE
DTE
Demarcation Point
Local Loop
B2. This question is about the Network Security and Monitoring
a) The SNMP system consists of three elements. List them. (3 marks)
b) What are the ports numbers that is used by SNMP? (2 marks)
c) What is the advantage over Switched Port Analyzer (SPAN) feature? (3 marks)
d) What is ACL Packet Filtering? (2 marks)
e) Briefly describe the below ACL Statements. Specify the ACL type. (4 marks)
f) In the figure given below, the 192.168.11.0/24 network can use Telnet to connect
to 192.168.30.0/24, but according to company policy, this connection should not
be allowed. The results of the show access-lists 130 command indicate that the
permit statement has been matched.
What is the solution? (6 marks)
B3 a) Briefly describe the terms given below(8 marks)
Bandwidth, Congestion, Delay, and Jitter
b) match each item given below to its description (8 marks)
Code delay | Propagation Delay | Packet Loss | jitter | Queue | Bandwidth |
serialization Delay | Congestion
1.This happens when congestion occurs
2.The fixed amount of time it takes to transmit a frame from the NIC to the
Wire.
Page 4 of 5
Page 5 of 5
3. Holds packets memory until resources become available to transmit them.
4. The Number of bits that Can transmitted in a Single second.
5.The fixed amount of time it takes to compress data at the source before
transmitting to the first networking device
6. When the demand for bandwidth exceeds the amount available
c) What is IoT? (2 marks)
d)Cloud services are available in a variety of options, tailored to meet customer
requirements. There are three main cloud computing services defined by the National
Institute of Standards and Technology (NIST) in their Special Publication 800-145.
List down the three cloud computing services? (2 marks)

More Related Content

Similar to Connecting network

Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
Md. Mashiur Rahman
 
1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf
StevenLCvWalkera
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
Santhosh Krishna
 
Wn vt
Wn vtWn vt
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5friv4schoolgames
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
Eng. Emad Al-Atoum
 
MCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docxMCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docx
hariraaghav1909
 
Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011Dân Chơi
 
Protocol layering quiz
Protocol layering quizProtocol layering quiz
Protocol layering quiz
sreedevibalasubraman
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Đồng Quốc Vương
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
Selva Kumar
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
Shusil Baral
 
1) What is the difference between CSMACD and CSMACA2) Which .docx
1) What is the difference between CSMACD and CSMACA2) Which .docx1) What is the difference between CSMACD and CSMACA2) Which .docx
1) What is the difference between CSMACD and CSMACA2) Which .docx
dorishigh
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
Download Mipdfcom
 
Ccna exam dumps
Ccna exam dumpsCcna exam dumps
Ccna exam dumpsccnaguide
 

Similar to Connecting network (20)

Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
 
1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf1- Which layer of the OSI model defines how to start- control- and end.pdf
1- Which layer of the OSI model defines how to start- control- and end.pdf
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
 
Wn vt
Wn vtWn vt
Wn vt
 
Ccna 4 final exam answer v5
Ccna 4 final exam answer v5Ccna 4 final exam answer v5
Ccna 4 final exam answer v5
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
MCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docxMCQ_Computer_Networks this subject taken by kamesh sir.docx
MCQ_Computer_Networks this subject taken by kamesh sir.docx
 
Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011Ccna 1 chapter 9 v4.0 answers 2011
Ccna 1 chapter 9 v4.0 answers 2011
 
Protocol layering quiz
Protocol layering quizProtocol layering quiz
Protocol layering quiz
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_4_v5_0_exam_answers_2014
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
III EEE-CS2363-Computer-Networks-important-questions-for-unit-3-unit-4-for-ma...
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
1) What is the difference between CSMACD and CSMACA2) Which .docx
1) What is the difference between CSMACD and CSMACA2) Which .docx1) What is the difference between CSMACD and CSMACA2) Which .docx
1) What is the difference between CSMACD and CSMACA2) Which .docx
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
Ccna dumps
Ccna dumpsCcna dumps
Ccna dumps
 
Ccna exam dumps
Ccna exam dumpsCcna exam dumps
Ccna exam dumps
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

Connecting network

  • 1. NATIONAL INSTITUTE OF BUSINESS MANAGEMENT Diploma in Computer Networks 17.1P Connecting Networks – DCN-3-3-13 Date: 15.05.2018 Time Allowed:3hrs Answer all Questions. All questions carry equal marks. Calculators are not allowed. Part A 1. Which statement describes the physical topology of a LAN? a) It depicts the addressing scheme that is employed in the LAN. b) It describes whether the LAN is a broadcast or token-passing network. c) It defines how hosts and network devices connect to the LAN. d) It shows the order in which hosts access the network. 2.Which of the following features send simulated data across the network and measures performance between multiple network locations? a) LLDP b) IP SLA 3. What is a disadvantage of a leased line? a) low quality b) inconsistent availability c) syslog d) SPAN c) complexity d) high cost 4. Which of the following PPP protocol allows a device to specify an IP address for routing over the PPP link? a) PAP b) CHAP c) LCP d) IPCP 5. PPP authentication is performed at which of the following OSI layers? a) Layer 1 b) Layer 2 c) Layer 3 d) Layer 4 6. Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP? a) flow control b) error control c) authentication d) synchronous communication 7. What are the two types of VPN connections? (Choose two of the following answers.) a) PPPoE b) site-to-site c) leased line d) Frame Relay e) remote access 8. Which of the following two components are needed to provide a DSL connection to a SOHO? (Choose two of the following answers.) a) transceiver b) DSLAM c) CMTS d) CM e) PPPoE enabled switch Page 1 of 5
  • 2. 9. What is an advantage offered by GRE tunnels? a) built in security mechanisms b) encryption of encapsulated traffic c) support for IP multicast tunneling d) support for connecting individual hosts across the Internet 10. What TCP port is used by BGP to exchange messages between routers? Page 2 of 5 a) 22 b) 58 c) 179 d) 443 11. Which of the following troubleshooting tool can be used to pinpoint the distance to a break in a network cable? a) digital multimeter b) network analyzer c) network analysis module d) cable tester 12.What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127? a) 192.168.70.0 to 192.168.70.127 b) 192.168.70.0 to 192.168.70.255 c) 192.168.70.0 to 192.168.70.63 d) 192.168.70.0 to 192.168.71.255 13. What is the only type of ACL available for IPv6? a) named standard b) named extended c) numbered standard d) numbered extended 14.An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL? a) R1(config-if)# ip access-group 1 in b) R1(config-if)# ip access-group 1 out c) R1(config-line)# access-class 1 in d) R1(config-line)# access-class 1 out 15. Which of the following modes is used to configure SNMP? a) privileged mode b) global configuration mode c) interface configuration mode d) router configuration mode 16. What is an SNMP management agent? a) a computer loaded with management software and used by an administrator to monitor a network b) a database that a device keeps about network performance c) software that is installed on devices managed by SNMP d) a communication protocol that is used by SNMP
  • 3. 17. Which of the following mitigation plans is best for thwarting a DoS attack that is creating a switch buffer overflow? a) Disable DTP. b) Disable STP. c) Enable port security. d) Place unused ports in an unused VLAN. 18. An attack has been launched within a company and a host name has been identified as the source. What command can a network technician use to determine the IP address assigned to the host name? a) ipconfig /all b) net computer c) nslookup d) tracert 19. Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used? a) video b) data c) voice d) management 20. Which two WAN infrastructure services are examples of private connections? (Choose two of the following answers.) a) T1/E1 b) wireless c) DSL d) cable e) Frame Relay Part B B1. A WAN operates beyond the geographic scope of a LAN. a) What is the difference between LAN and WAN? (4 marks) b) List 3 Common WAN topologies with suitable diagrams (6 marks) c)Identify and briefly describe the WAN Terms used in the diagram given below? (10 marks) CPE Page 3 of 5
  • 4. DCE DTE Demarcation Point Local Loop B2. This question is about the Network Security and Monitoring a) The SNMP system consists of three elements. List them. (3 marks) b) What are the ports numbers that is used by SNMP? (2 marks) c) What is the advantage over Switched Port Analyzer (SPAN) feature? (3 marks) d) What is ACL Packet Filtering? (2 marks) e) Briefly describe the below ACL Statements. Specify the ACL type. (4 marks) f) In the figure given below, the 192.168.11.0/24 network can use Telnet to connect to 192.168.30.0/24, but according to company policy, this connection should not be allowed. The results of the show access-lists 130 command indicate that the permit statement has been matched. What is the solution? (6 marks) B3 a) Briefly describe the terms given below(8 marks) Bandwidth, Congestion, Delay, and Jitter b) match each item given below to its description (8 marks) Code delay | Propagation Delay | Packet Loss | jitter | Queue | Bandwidth | serialization Delay | Congestion 1.This happens when congestion occurs 2.The fixed amount of time it takes to transmit a frame from the NIC to the Wire. Page 4 of 5
  • 5. Page 5 of 5 3. Holds packets memory until resources become available to transmit them. 4. The Number of bits that Can transmitted in a Single second. 5.The fixed amount of time it takes to compress data at the source before transmitting to the first networking device 6. When the demand for bandwidth exceeds the amount available c) What is IoT? (2 marks) d)Cloud services are available in a variety of options, tailored to meet customer requirements. There are three main cloud computing services defined by the National Institute of Standards and Technology (NIST) in their Special Publication 800-145. List down the three cloud computing services? (2 marks)