You are on page 1of 7

Name: ___________________________________ Date:__________

CSIS-4823: Data Communications Networking

Mid-Term Exam – 192 points – each question is worth 2 points

Please answer the questions with the best response from class lectures and the textbook.

1. True or False. A computer network is two or more computers connected by some means through with they are
capable of sharing information.
2. What is a LAN and a WAN? How are they different?

3. What is a fundamental difference between Campus Networks and Metropolitan Networks?

4. Where does the collision domain and broadcast domain exist on a hub?

5. Where does the collision domain and broadcast domain exist on a switch?

6. In routing, metrics and administrative distances are used to determine the best path to a destination network.
Where is the metric value used and where is the administrative distance value used?

7. An IPv4 address is ______ bits in length.


8. When represented as four byte divisions in decimal format, the IP address is said to be in
_____________ decimal notation.
9. The _________ mask for an IP address with a prefix of /8 is ______________________.
10. Use the sequential allocation method to assign an IP subnet for 96 computers on the 10.10.10.0/24 network.
10.10.10.0/25 is already in use.

11. Given the IP address and subnet mask of 10.1.1.0 255.255.255.64, what is the next available network subnet for
use?
Name: ___________________________________ Date:__________

12. True or False. There only nine (9) possible values in the dotted decimal notation of a subnet mask - 0, 128, 192,
224, 240, 248, 252, 254, or 255.
13. How many IP addresses are available in a /29 network? How many are usable IP addresses for hosts
(computers/nodes)?

14. What are the command line commands to display the IP address on a Windows XP and UNIX computer?

15. What are the command line commands to view the routing table on a UNIX and Windows XP computer?

Fill in the correct term for the definition.

16. ____________ Commonly used in call centers to route calls to wherever they need to be, automatically
distributes calls.
17. ____________The first hop where phone lines go, the provider’s central office.
18. ____________ Interfaces to the WAN and CPE, often provides the ability to add/drop channels for both voice
and data usage.
19. ____________ Equipment located on the premise of customers, typically routers, phones, and PBX.
20. ____________ point where the telecom provider’s responsibilities end and customer’s begins.
21. ______________ a device that terminates a digital circuit, the service provider can perform remote testing of a
circuit with this installed.
22. ___________An interexchange carrier providing services to local exchanges by connecting between LATAs.
23. ___________ The local access and transport area, government defined areas in which a telecom provider can
provide local services.
24. ____________ A local exchange carrier providing local service within a LATA, RBOCs where all local exchange
carriers.
25. ____________ A regular old analog phone line.
26. ____________ Provides 28 DS1 capacity that is channelized for voice or data usage, this circuit is utilizing the T-
carrier to trunk 672 channels together between the CO and the customer.
27. _______________ The last mile connection for a circuit from a telecom facility to its destination.
28. _____________ Provides 24 DS0 capacity that is channelized for voice or data usage, this circuit is utilizing the T-
carrier to trunk 24 channels together between the CO and the customer. Most likely using AMI encoding with
superframe.
29. _____________ An Integrated Services Digital Network circuit that has 23 B-channels and 1 D-channel providing
out of band signaling. Most likely using B8ZS encoding with extending super frame.
30. ______________ When no electrical pulses are detected on the circuit, this alarm indicates a loss of signal.

31. Which WAN technology makes use of virtual circuits to transmit frames across the network?
Name: ___________________________________ Date:__________

32. Which WAN technology makes use of labels prefixed to packets to transmit across the network?

33. Frame Relay uses two types of virtual circuits, what are they are how do they differ?

34. How does MPLS support IGPs in the same manner as Frame Relay and dedicated point-to-point circuits?

35. What Exterior Gateway Protocol (EGP) is most commonly used on MPLS network to provide network
connectivity between customer sites?

36. True or False. Frame Relay is more expensive than dedicated point-to-point circuits to the same locations.

37. True or False. MPLS is more expensive than Frame Relay to the same locations.

38. Given 10 locations, how many circuits are needed to make the network fully meshed?

39. Name the layer two identifier used on Frame Relay networks to identify the endpoints on each virtual circuit.

40. If you are given the location of where Frame Relay service is needed, what three other criteria are needed in
order to provision the service?

41. When traffic exceeds the Committed Information Rate of the Frame Relay circuit but is less than the Burst Rate,
how are the frames marked?

42. When a Frame Relay switch is congested, which frames are eligible to be dropped?
Name: ___________________________________ Date:__________

43. True or False. Data Communications Equipment is the customer premise equipment which provides clocking for
the Data Terminal equipment located at each endpoint.

44. Name the three statuses a Data Link Connection Identifier can be in, and what each status represents.

45. True or False. MPLS networks require no special WAN interface configurations on the CPE equipment, and yet
provide the same type of network service as Frame Relay and dedicated point-to-point circuits.

46. What are the three types of LMI?

47. When creating network diagrams, why are clouds used to represent service provider networks, such as Frame
Relay and MPLS, and also used to represent public networks like the Internet?

48. True or False. Firewall rules determine what type of traffic is allowed to pass between firewall interfaces.

49. What are the three types/forms of contexts on an ASA?

50. True or False. Four basic security practices are: to keep rule simple to understand, monitor firewall logs, deny
everything as a default rule, and to place a firewall between internal and third-party networks and/or
equipment.

51. What does the term “defense-in-depth” refer to in regards to firewall security design?

52. True or False. By default, interfaces with more secure security levels (such as 0) can transmit to less secure
security levels (such as 100).

53. True or False. An object group is a collection of IP addresses, protocols, or services that can be referenced with
a single name.

54. True or False. Code upgrades are performed through the SYSTEM context of an ASA.

55. True or False. Physical interfaces are configured and defined through the ADMIN context of an ASA.
Name: ___________________________________ Date:__________

56. PAT allows multiple IP addresses to share a single IP address, while NAT allows one-to-one translation from an IP
address into another IP address.

57. True or False. Syslog has seven facilites.

58. True or False. Syslog facilities range from 0 through 7 with 0 being for more critical messages and 7 being for
more informational (less critical) messages.

Create the subnets along with the IP addresses available in each subnet.
59. 192.168.1.0/24

60. 192.168.1.0/16

61. 192.168.1.0/17

62. 192.168.1.0/25

63. 192.168.1.0/18

Convert the following into dotted decimal notation.


64. 00000000.00000000.00000000.00000000 =
65. 11111111.11111111.11111111.11111111 =

66. 00000010.00000100.00000110.00001000 =

67. Name the early form of Ethernet that used a thick cable and was referred to as “thick-net”.

68. Name the early form of Ethernet that used a thin coaxial cable and was referred to as “thin-net”.

69. True or False. Modern Ethernet environments typically use UTP shield cables with RJ45 connectors.

70. What does the 5-4-3 rule state about being between any two nodes on an Ethernet network?
Name: ___________________________________ Date:__________

71. True or False. Every frame contains the source and destination MAC address, a switch inspects the frame to
determine the source MAC address and adds the address into its address table (CAM table – content address
table, MAC address table). The switch then determines the frame’s destination MAC address and checks the
table. If a match exists, the frame is forwarded from the source port to the destination port. If no match is
found, the frame is sent to all ports.

72. True or False. Six types of routes: host route, subnet route, summary route, major network route, supernet
route, and default route

73. True or False. There are two kinds of IP addresses – Public and Private. Private IP addresses are not routable on
the Internet

74. True or False. VLSM – Variable Length Subnet Masks. VLSM allows for classful networks to be subdivided.

75. True or False. CIDR – Classless Internet Domain Routing. CIDR allows network to be referenced in a single
summary route.

76. True or False. Subnet masks are inclusive – you can only add or subtract bits from the mask in bit order and
they must be added from left to right, no skipping bits in a subnet mask. With only 8 bits in an octet there is a
limited number of values that can be represented.

77. True or False. Binary is based on the power of two

78. True or False. Telecommunications refers to the traditional circuit-based switching technologies primary used
by voice services, as compared to the “data communications” which often refers to packet-based switching of
the modern Internet.

79. True or False. Analog in telecom refers to a signal that is continuous in amplitude and time, fluctuation of the
signal may be important. Speaking is analog, as the air waves hit your eardrums. Digital refers to a signal that
has discrete values, yes and no, on and off, sampling of sound at specific time intervals.

80. True or False. There are two parts of latency – propagation delay and bandwidth delay.

81. Name three of the seven Regional Bell Operating Companies created with the break-up of AT&T in 1984.

82. Name the synchronous optical network, which is a fiber optic system, making use of the optical carrier levels.

83. True or False. T1 circuits are full-duplex asynchronous circuits


Name: ___________________________________ Date:__________

84. True or False. AMI encoding is used for voice while B8ZS is used for data.

85. True or False. A BiPolar Violation (BPV) means that two mark signals occur in sequence at the same polarity.

86. True or False. A BiPolar Violation (BPV) means a number of frames have been received with errors within a
given period of time.

87. True or False. A channelized DS3 has 672 DS0s (28 DS1s), often referred to as a channelized T3. A clear channel
DS3 has no channels, and is used for data.

88. True or False. LMI – Local Management Interface provides communication between the Data Terminal
Equipment (DTE) – or customer equipment like routers, and the Data Communication Equipment (DCE) – or
service provider equipment.

89. True or False. The DCE device determines the type of LMI used.

90. True or False. Frame Relay networks will detect congestion and mark frames with FECNs and BECNs. Forward
Explicit Congestion Notification and Backward Explicit Congestion Notifications are sent to the DTE equipment.
DTE equipment can adjust the flow of traffic to reduce congestion on the network. The DCE equipment does not
perform flow control for customers. The BECN bits are marked when congestion occurs, when BECN bits are
seen in the frames, the FECN bits get marked. Now traffic leaving and coming from a Frame Relay switch is
notified of the congestion.

91. True or False. Since MPLS utilizes a layer three network, traditional Interior Gateway Protocols (IGPs) like RIP,
OSPF, and EIGRP do not work well. BGP is the most common protocol in use to communicate to customer
endpoints.

92. True or False. Firewalls are devices that prevent traffic from entering or leaving a network.

93. True or False. ASA interfaces must have a physical name, logical name, and security level.

94. True or False. The default security level is 100 for the inside interface, and 0 for the outside interface.

95. True or False. The default security level is 0 for the outside interface, and 100 for the inside interface.

96. Name the network that is neither inside nor outside the firewall. It is a middle ground network that is less
restrictive than the inside network but more secure than the outside network.

You might also like