You are on page 1of 12

Assiut University Final June, 2008.

Exam
Faculty of Engineering Time: 3 Hours
Communication Department Elective Course (LAN)

Select the correct answer: marks (correct = 1 wrong = -1/4 blank = 0)

Question Ans
You are using the network address 210.10.2.0. You want to subnet this network
with a /28 mask. How many usable subnetworks and host addresses per subnet
will this subnet mask provide?
1 A. 30 networks and 6 hosts. D
B. 6 networks and 30 hosts.
C. 8 networks and 32 hosts.
D. 14 networks and 14 hosts.
You have the network address 165.100.27.0/24. How many subnetworks this
address provides, and how many hosts can be supported on each subnet.
A. One network with 254 hosts.
2 B. 254 networks with 254 hosts per network. B
C. 65,534 networks with 255 hosts per network.
D. 30 networks with 64 hosts per network.
E. 254 networks with 65,534 per network.
You cannot connect to a server at a remote site. You have the following
information:
local PC 192.166.33.21/24
default gateway 192.166.33.17
remote server 192.160.225.33/24
You conduct the following tests from the local PC.
ping 192.160.225.33 – unsuccessful
3 ping 192.166.33.17 – unsuccessful B
ping 127.0.0.1 – unsuccessful
ping 192.166.33.21 – unsuccessful
What is the probable cause of this problem?
A. The local PC has the wrong IP address.
B. A physical layer problem on the local PC.
C. The default gateway address is wrong.
D. A remote network layer problem.
With regard to bridges and switches, which of the following statements is true?
A. Switches are primarily software based while bridges are hardware based.
4 B. Both bridges and switches forward Layer 2 broadcasts. B
C. Bridges are faster than switches.
D. Bridges define broadcast domain while switches define collision domains.
Your have a class C network license. You want to subnet the network to provide a
separate subnet for 5 departments. Each subnet must support at least 24 hosts.
Which subnet mask should you use?
A. 255.255.255.192
5 B. 255.255.255.224 B
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
F. 255.255.255.254
You are required to divide the 172.12.10.0 network into subnets. Each subnet
6
must have the capacity to support 458 IP addresses. You must provide the D

1 of 12
maximum number of subnets. Which network mask should you use?
A. 255.255.240.0
B. 255.255.248.0
C. 255.255.252.0
D. 255.255.254.0
To segment a network you can use which of the following devices?
A. bridge
7 B. switch D
C. router
D. All of the above
Which field of frame id used by error detection schemes when checking on
errors?
A. MTU
8
B. PDU C
C. FCS
D. Flag
Which of the following fields are contained within an IEEE Ethernet frame
header?
A. source and destination MAC address
9
B. source MAC address and destination network address A
C. source and destination network addresses
D. source network address and destination MAC address
Which network mask should be used for point-to-point WAN links in order to
reduce the waste of IP addresses in this network?
A. /24
10 B. /30 B
C. /27
D. /26
E. /32
What kind of cable should you use to connect a router, server, or individual
workstation to a switch?
A. rollover cable
11
B. crossover cable C
C. straight cable
D. coaxial cable
Which of the following statements correctly describe Layer2 broadcast traffic?
A. Layer2 broadcast traffic is blocked by Layer3 devices.
B. A new packet is sent each time the client requests it.
12
C. Each frame uses a special address for which only interested clients listen. A
D. It is the most efficient way to send data to a small group of clients.
E. Each packet is refreshed when requested.
Which of the following networks can be easily expanded without interrupting the
other network devices and users?
A. Bus
13
B. Star D
C. Mesh
D. B and C
Which of the following networks is configured in dual rings to provide fault
tolerance?
A. Star
14
B. 802.5 C
C. FDDI
D. 802.3
15 One of the following network devices forwards the data it receives on a port to all C

2 of 12
other connected ports. Identify the device from the following:
A. Router
B. Bridge
C. Hub
D. Switch
Which of the following statements correctly describes the function of a router?
A. It is used to forward signals to all other ports
16 B. It forwards data based on the MAC addresses of devices. C
C. It is used to forward data based on the destination IP address.
D. It is used to join two network segments to make a large network.
Which of the following addresses is an invalid MAC address?
A. 5F-00-AD-2E-E4-34
17 B. 00-12-ED-AG-K7-9E B
C. 00-0C-B8-22-AC-F3
D. 6A-7D-00-E5-A8-58
Which of the following protocols does not depend on addresses or numbers to
identify computers on a network?
A. NetBEUI
18
B. TCP/IP A
C. IPX/SPX
D. None of the above
Which of the following are two constituent layers of the Data Link layer in the
OSI networking model?
A. Network and Application
19
B. Media Access Control (MAC) and Logical Link Control (LLC) B
C. Transport and physical
D. Network and Data Link
Which of the following is a class C address?
A. 128.10.54.120
20 B. 92.200.138.24 D
C. 168.28.10.165
D. 193.10.160.45
Which of the following statements correctly describes the function of a subnet
mask?
A. It is used to separate the network address from the host address within an IP
address.
21
B. It is used to forward data to remote network segments. A
C. It is used to block undesired network traffic.
D. It is used to enable computers to communicate in different operating system
environments.
Which of the following advantages are associated with using a firewall?
A. It provides an inexpensive means to share the Internet connection.
22 B. It is used to block undesired external access to internal network resources. B
C. It is used to monitor the use of Internet by internal users.
D. It is used to hide the internal addressing scheme of the network.
You have subnetted the 210.106.14.0 network with a /24 mask. How many usable
subnetworks and usable host addresses per subnet this would provide.
A. 1 network with 254 hosts
23
B. 2 networks with 128 hosts A
C. 4 networks with 64 hosts
D. 6 networks with 30 hosts
You have segmented a network into two separate segments, segment 1 and
24 segment2, with a router. What is the purpose of your action? D
A. It increases the number of collisions.

3 of 12
B. It decreases the number of broadcast domains.
C. It connects segment 1’s broadcasts to segment 2.
D. It prevents segment 1’s broadcasts from getting to segment 2.
Brief on differences and similarities between bridges and switches.
A. Bridges are faster than switches because they have fewer ports.
B. Bridges and switches learn MAC addresses by examining the source MAC
25
address of each frame received. B
C. A bridge will forward a broadcast but a switch will not.
D. Bridges and switches increase the size of a collision domain.
Dividing a network into smaller collision domains is called
A. Bridging
26 B. Segmentation B
C. Routing
D. Domaining
Which of the following are steps in the encapsulation process?
A. Packets are converted into frames.
27 B. User information is converted into data. D
C. Frames are converted into bits.
D. All of the above.
The protocol used to resolve logical addresses to physical addresses on a network
is
A. ARP
28
B. DNS A
C. HOSTS
D. CSMA/CD
SPX is a ______ protocol and its packets are tracked by a sequence number in
each packet.
A. Connectionless
29 B. Best effort C
C. Connection-oriented
D. Layer 3

On a switched network, virtual LANs are used to create multiples of what?


A. Collision domains
30 B. Broadcast domains B
C. Internetworks
D. All of the above
Which of the following protocols is not connectionless?
A. SPX
31 B. UDP A
C. IPX
D. IP
Which of the following is not an error checking method?
A. Parity bit
32 B. Hash total B
C. Checksum
D. CRC
What is the form of parity bit error checking used to determine whether the
correct number of bits in a transmission were received?
A. Odd-parity
33
B. Checksum A
C. CRC
D. None of the above
34 The transmission mode that ___________s capable of transmitting in two C

4 of 12
directions but in only one direction at a time is
A. Full-duplex
B. Simplex
C. Half-duplex
D. Full-nelson
Which layer of the OSI model is concerned with end-to-end delivery of data?
A. Session
35 B. Transport C
C. Network
D. Physical
Which of the following lists the layers of the OSI model in correct sequence,
starting with Layer 1 and moving up?
A. Data Link, Physical, Network, Session, Transport, Application, Presentation
36
B. Physical, Network, Data Link, Transport, Session, Presentation, Application C
C. Physical, Data Link, Network, Transport, Session, Presentation, Application
D. Application, Presentation, Session, Transport, Network, Data Link, Physical
An IP address starting with a bit sequence in the first octet of 110 would fall into
what IP address Class?
A. Class D or E
37
B. Class C B
C. Class B
D. Class A
Given a Class C address of 194.16.121.1 and a subnet mask of 255.255.255.224
how many subnetworks can there be and how many hosts can be on each
subnetwork?
38 A. 30 subnets and 6 hosts D
B. 16 subnets and 16 hosts
C. 14 subnets and 14 hosts
D. 6 subnets and 30 hosts
Given an IP address of 204.200.106.1 and a subnet mask of 255.255.255.240 what
is the broadcast address for subnet three?
A. 204.200.106.48
39
B. 204.200.106.63 B
C. 204.200.106.47
D. 204.200.106.79
If you have a need for no more than 12 subnetworks with at least 15 hosts per
subnet which address scheme would be best?
A. Class C with 255.255.255.224 subnet mask
40
B. Class B with 255.255.224.0 subnet mask D
C. Class B with 255.255.255.240 subnet mask
D. Class B with 255.255.240.0 subnet mask
How many hosts are available on a Class B network that uses 27 bits for the
network address in its subnet mask?
A. 30
41
B. 62 A
C. 16
D. 126
How many collision domains are created when you segment a network with a 12-
port switch?
A. 1
42
B. 2 D
C. 5
D. 12
43 The IP datagram is transmitted on a local network to a special purpose device D

5 of 12
called _________ whose job is to forward the packet onto another ___________ or
possibly deliver the packet to the LAN where the destination computer is located.
A. Switch
B. Hub
C. Bridge
D. Router
The directed broadcast is usually done to obtain the physical address of a
computer if:
A. Only the IP address is known
44
B. Only the MAC address is Known A
C. Both the IP address and MAC address are known
D. Both the IP address and MAC address are not known
A TCP connection is reliable with ___________ to guarantee the data arrives
properly at its destination.
A. Error checking
45
B. Acknowledgment for received packets D
C. Packet sequencing
D. All of the above
Net BEUI uses:
A. IP addresses to specify source and destination computers
B. MAC addresses to specify source and destination computers
46
C. IP address to specify source computer and MAC address to specify destination B
computer
D. None of the above
Which switching method fragments messages into small units that are routed through
independent paths?
A. Message
47
B. Packet B
C. Circuit
D. Neural
The transport layer uses data segment sequence numbers for what purpose?
A. To make sure that data is reassembled in the proper order
48 B. To make sure that each segment is checked for errors A
C. To make sure that data does not overrun memory buffer
D. To verify destination addresses
Which of the following network devices does not do any packet examination as it
passes the packets through?
A. Router
49 B. Bridge D
C. Layer 2 Switch
D. Repeater
E. Layer 3 Switch
The process of two modems communicating with each other to determine what
protocol they will use is called what?
A. Handshaking
50
B. Digital synchronization A
C. Vectoring
D. Serial replicating
You wish to set up a LAN in a star configuration. However, you want each node
to have full bandwidth on its port. What device do you need?
A. Layer 2 switch
51
B. Router A
C. Active hub
D. Brouter
52 An ARP request is _______ to _______. B

6 of 12
A. Unicast; one host
B. Broadcast; all hosts
C. Multicast; one host
D. Unicast; all hosts
How many default gateway addresses does a computer need to function on a
LAN?
A. 0
53
B. 1 A
C. 2
D. 3
_______ is a client-server program that provides an IP address, subnet mask, IP
address of a router, and IP address of a domain name server to a computer.
A. NAT
54
B. ISP D
C. CIDR
D. DHCP
VLAN technology divides a LAN into ______ groups.
A. Multiplexed
55 B. Framed D
C. Physical
D. Logical
Which of the following is a connecting device?
A. Bridge
56 B. Repeater D
C. Hub
D. All the above
An ARP reply is _______ to _______.
A. Unicast; one host
57 B. Broadcast; all hosts A
C. Multicast; one host
D. Unicast; all hosts
In which type of switching do all the packets of a message follow the same
channels of a path?
A. Virtual circuit packet switching
58
B. Message switching A
C. Datagram packet switching
D. None of the above
In a VLAN, stations are separated into groups by _______.
A. Software methods
59 B. Location A
C. Physical methods
D. Switches
The largest portion of the bandwidth for ADSL carries _______.
A. Voice communication
60 B. Downstream data B
C. Upstream data
D. Control data
A traditional cable TV network transmits signals ______.
A. Upstream and downstream
61 B. Upstream C
C. Downstream
D. None of the above
Optical fibers, unlike wire media, are highly resistant to _______.
62
A. High-frequency transmission D

7 of 12
B. Low-frequency transmission
C. Refraction
D. Electromagnetic interference
SONET is a standard for _______ networks.
A. Twisted-pair cable
63 B. Fiber-optic cable B
C. Coaxial cable
D. Ethernet
_______ limit the bandwidth of the local loop to 4 KHz.
A. Fiber nodes
64 B. Repeaters C
C. Filters
D. Hubs
_______ is a device at the telephone company site that can packetize data to be
sent to the ISP server.
A. A filter
65
B. A splitter C
C. A DSLAM
D. An ADSL modem
When we talk about unguided media, usually we are referring to_______.
A. Metallic wires
66 B. Nonmetallic wires C
C. The air
D. Fiber optics
What is the major factor that makes coaxial cable less susceptible to noise than
twisted-pair cable?
A. Outer conductor
67
B. Inner conductor A
C. Diameter of cable
D. Insulating material
_______ cable consists of an inner copper core and a second conducting outer
sheath.
A. Coaxial
68
B. Twisted-pair A
C. Fiber-optic
D. Shielded twisted-pair
In fiber optics, the signal source is _______ waves.
A. Very low-frequency
69 B. Light B
C. Radio
D. Infrared
Which encoding type always has nonzero average amplitude?
A. Polar
70 B. Bipolar C
C. Unipolar
D. All the above
Packet switching enables __________
A. Each frame to be truncated in order to pass a router
71 B. Each frame to send an acknowledgment D
C. Each frame to boost its signal when crossing a router
D. Each frame to follow a different path
What is propagation delay?
72 A. Routing table assimilation delay D
B. Protocol switching time

8 of 12
C. NIC buffer response time
D. Period of time of a signal change to traverse the cable
A router
A. Connects two different networks.
73 B. Ties all hubs together. A
C. Is not used for Internet connections.
D. Resolve URL to IP
TCP connections are
A. Unreliable and must rely of the IP protocol.
74 B. Created using predefined ports or sockets. B
C. Considered connectionless without the need to acknowledge
D. All of the above
NAT operates at which layer of the OSI model?
A. The data-link layer
75 B. The network layer B
C. The transport layer
D. The application layer
DNS servers provide
A. The MAC address for every host address.
76 B. The error checking protocol for ICMP messages. C
C. A mapping from a URL name to an IP address.
D. None of the above
Routing protocols are designed to
A. Direct the flow of information between networks.
77 B. Interrogate network device agents to gather statistics. A
C. Broadcast traffic on all segments of a network.
D. All of the above
DHCP is used to
A. Obtain a fixed IP address.
78 B. Obtain a leased IP address. B
C. Carry PING requests.
D. Obtain a static IP address.
When the network is slow,
A. Turn off all power to the computer and perform a reset.
79 B. Try to determine where the bottleneck is located. B
C. Immediately upgrade to the newest, most expensive hardware available.
D. Turn off the core switch
What components of an internal cable network do patch cables connect?
A. Hubs to computers
80 B. Computers to patch panels D
C. Wall plates to patch panels
D. Patch panels to hubs
Without a DNS server, a user can still access the Internet using which of the
following techniques?
A. By using links saved as Favorites instead of typing URLs
81 B. By using NetBIOS names instead of DNS names C
C. By using IP addresses instead of DNS names
D. By using hardware addresses instead of DNS names
A MAC address of __________________ is reserved for use as a broadcast
address
A. 11-11-11-11-11-11
82
B. FF-FF-FF-FF-FF-FF
A
C. 00-00-00-00-00-00
D. 77-77-77-77-77-77

9 of 12
To eliminate collision, 100VG-AnyLAN uses
A. Domain based priority access
83 B. Ring/Hub contention management A
C. Frame polling
D. None of the above

10 of 12
Select True or False: marks (correct = 1 wrong = -1 blank = 0)

1 Fully-connected networks require more links than star-connected networks. T

2 10base2 Ethernet allows for 2000 meter segments F

3 A collision is required to exchange data over an Ethernet cable. F

4 A hub is used to enforce network hierarchy. F

5 Only RG-58 coax is used in Ethernet systems. F

6 Vampire taps are used with RG-11 cable. T

7 All NIC's have the same MAC address (for broadcasting). F

8 Token-ring network uses a MAU. T

9 Transceivers are only used with fiber and UTP. F

10 The ISO-OSI network model defines the nine network layers. F

11 IP datagrams are guaranteed to be delivered. F


Loopback testing allows for a remote method to test TCP/IP and
12 F
application functionality.
13 PING sends a sonar pulse onto the Internet. F

14 Running TRACERT with an invalid URL will cause it to hang forever. F

15 A 9600 bits/second modem may require 2400 baud. T


There are no collision in token-ring network due to multiple stations
16 T
transmitting at the same time
17 WINIPCFG only works for fixed IP addresses. F

18 Only the direct cable connection can be used to connect two computers. F

19 Ethernet NICs use serial data communication. T

20 Coax should always be used when networking small businesses. F


The network uses the Internet Protocol(IP) and provides what is called
21 T
machine-to-machine communication
There are two transport layer protocols in TCP/IP, the Transmission
22 T
Control Protocol (TCP) and the User Datagram Protocol (UDP).
23 The network protocols provide application-to application communication F

11 of 12
24 UDP provides for connectionless unreliable transport T
Connection-oriented communication is reliable; the sending station makes a
25 F
best effort to deliver its information.
26 NETBIOS name service, resolve the name of IP address T
Applications using TCP establish connections with each other, through the
27 T
use of predefined ports.
28 The Ethernet interframe gap is 0.96 bit times F

29 TCP provides for connection-oriented reliable transport. T

30 Ethernet performs better under heavy traffic loads than Token-ring F

31 The UDP is similar to TCP except it is connectionless. T


The Internet Protocol is considered to be reliable due to the fact there is no
32 F
guarantee the datagram will reach its destination
33 When the frame size is larger, more of the available bandwidth is utilized. T

34 The maximum size of the data field in an Ethernet frame is 1500 bytes. T

35 Ethernet uses CSMA/CD T

36 Autonegotiation is accomplished using fast link pulses T

37 Point-to-point IR provides a slower data rate than diffused IR. F

12 of 12

You might also like