Presiding Officer Training module 2024 lok sabha elections
Connecting network.pptx
1. NATIONAL INSTITUTE OF BUSINESS MANAGEMENT
Diploma in Computer Networks 17.1P
Connecting Networks – DCN-3-3-13
Date: 15.05.2018 Time Allowed:3hrs
Answer all Questions. All questions carry equal marks. Calculators are not allowed.
Part A
1. Which statement describes the physical topology of a LAN?
a) It depicts the addressing scheme that is employed in the LAN.
b) It describes whether the LAN is a broadcast or token-passing network.
c) It defines how hosts and network devices connect to the LAN.
d) It shows the order in which hosts access the network.
2.Which of the following features send simulated data across the network and measures
performance between multiple network locations?
a) LLDP
b) IP SLA
3. What is a disadvantage of a leased line?
a) low quality
b) inconsistent availability
c) syslog
d) SPAN
c) complexity
d) high cost
4. Which of the following PPP protocol allows a device to specify an IP address for routing
over the PPP link?
a) PAP
b) CHAP
c) LCP
d) IPCP
5. PPP authentication is performed at which of the following OSI layers?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 4
6. Which additional functionality is available on an interface when the encapsulation is
changed from HDLC to PPP?
a) flow control
b) error control
c) authentication
d) synchronous communication
7. What are the two types of VPN connections? (Choose two of the following answers.)
a) PPPoE
b) site-to-site
c) leased line
d) Frame Relay
e) remote access
8. Which of the following two components are needed to provide a DSL connection to a
SOHO? (Choose two of the following answers.)
a) transceiver
b) DSLAM
c) CMTS
d) CM
e) PPPoE enabled switch
Page 1 of 5
2. Page 2 of 5
9. What is an advantage offered by GRE tunnels?
a) built in security mechanisms
b) encryption of encapsulated traffic
c) support for IP multicast tunneling
d) support for connecting individual hosts across the Internet
10. What TCP port is used by BGP to exchange messages between routers?
a) 22
b) 58
c) 179
d) 443
11. Which of the following troubleshooting tool can be used to pinpoint the distance to a
break in a network cable?
a) digital multimeter
b) network analyzer
c) network analysis module
d) cable tester
12.What range of IP addresses is represented by the network and wildcard mask
192.168.70.0 0.0.0.127?
a) 192.168.70.0 to 192.168.70.127
b) 192.168.70.0 to 192.168.70.255
c) 192.168.70.0 to 192.168.70.63
d) 192.168.70.0 to 192.168.71.255
13. What is the only type of ACL available for IPv6?
a) named standard
b) named extended
c) numbered standard
d) numbered extended
14.An administrator has configured an access list on R1 to allow SSH administrative access
from host 172.16.1.100. Which command correctly applies the ACL?
a) R1(config-if)# ip access-group 1 in
b) R1(config-if)# ip access-group 1 out
c) R1(config-line)# access-class 1 in
d) R1(config-line)# access-class 1 out
15. Which of the following modes is used to configure SNMP?
a) privileged mode
b) global configuration mode
c) interface configuration mode
d) router configuration mode
16. What is an SNMP management agent?
a) a computer loaded with management software and used by an administrator to
monitor a network
b) a database that a device keeps about network performance
c) software that is installed on devices managed by SNMP
d) a communication protocol that is used by SNMP
3. 17. Which of the following mitigation plans is best for thwarting a DoS attack that is creating
a switch buffer overflow?
a) Disable DTP.
b) Disable STP.
c) Enable port security.
d) Place unused ports in an
unused VLAN.
18. An attack has been launched within a company and a host name has been identified as
the source. What command can a network technician use to determine the IP address
assigned to the host name?
a) ipconfig /all
b) net computer
c) nslookup
d) tracert
19. Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ)
when low latency queuing (LLQ) is being used?
a) video
b) data
c) voice
d) management
20. Which two WAN infrastructure services are examples of private connections? (Choose
two of the following answers.)
a) T1/E1
b) wireless
c) DSL
d) cable
e) Frame Relay
Part B
B1. A WAN operates beyond the geographic scope of a LAN.
a) What is the difference between LAN and WAN? (4 marks)
b) List 3 Common WAN topologies with suitable diagrams (6 marks)
c)Identify and briefly describe the WAN Terms used in the diagram given below? (10
marks)
CPE
Page 3 of 5
4. DCE
DTE
Demarcation Point
Local Loop
B2. This question is about the Network Security and Monitoring
a) The SNMP system consists of three elements. List them. (3 marks)
b) What are the ports numbers that is used by SNMP? (2 marks)
c) What is the advantage over Switched Port Analyzer (SPAN) feature? (3 marks)
d) What is ACL Packet Filtering? (2 marks)
e) Briefly describe the below ACL Statements. Specify the ACL type. (4 marks)
f) In the figure given below, the 192.168.11.0/24 network can use Telnet to connect
to 192.168.30.0/24, but according to company policy, this connection should not
be allowed. The results of the show access-lists 130 command indicate that the
permit statement has been matched.
What is the solution? (6 marks)
B3 a) Briefly describe the terms given below(8 marks)
Bandwidth, Congestion, Delay, and Jitter
b) match each item given below to its description (8 marks)
Code delay | Propagation Delay | Packet Loss | jitter | Queue | Bandwidth |
serialization Delay | Congestion
1.This happens when congestion occurs
2.The fixed amount of time it takes to transmit a frame from the NIC to the
Wire.
Page 4 of 5
5. Page 5 of 5
3. Holds packets memory until resources become available to transmit them.
4. The Number of bits that Can transmitted in a Single second.
5.The fixed amount of time it takes to compress data at the source before
transmitting to the first networking device
6. When the demand for bandwidth exceeds the amount available
c) What is IoT? (2 marks)
d)Cloud services are available in a variety of options, tailored to meet customer
requirements. There are three main cloud computing services defined by the National
Institute of Standards and Technology (NIST) in their Special Publication 800-145.
List down the three cloud computing services? (2 marks)