You are on page 1of 9

Marking Scheme:

Each correct answer gets 1 mark (30 questions x 1 mark = 30 marks)

1. Which type of network would use mesh, point-to-point or hub and spoke topologies?

a) Personal Area Network (PAN)


b) Local Area Network (LAN)
c) Metropolitan Area Network (MAN)
d) Wide Area Network (WAN)

2. What does the data link layer add to a Layer 3 packet to create a frame?
a) Sequence number and Trailer
b) Header and Trailer
c) Header and Flags
d) Header and Sequence number

3. A network in which the user is connected within the office premises and get disconnect
once they come out of the building. This type of network is termed as _____________.
a) Personal Area Network (PAN)
b) Local Area Network (LAN)
c) Wide Area Network (WAN
d) Metropolitan Area Network (MAN)

4. Which statement is TRUE about the TCP/IP and OSI models?

a) The first three OSI layers describe general services that are also provided by the
TCP/IP internet layer.
b) The OSI layer 7 and TCP/IP application layer provide identical functions.
c) The TCP/IP network access layer has similar functions to the OSI network
layer.
d) The TCP/IP transport layer and OSI layer 4 provide similar services and functions.

5. What is the command to assign the name “Sw-Level-8” to a switch?

a) host Sw-Level-8
b) hostname Sw-Level-8
c) host name Sw-Level-8
d) hostname “Sw-Level-8”

6. Which of the following wireless standards is best suited for industrial and IoT
environments?
a) Bluetooth
b) Zigbee
c) Wi-Max
d) Wi-Fi

7. The packet is converted into signals 0's and 1's. At which layer of the OSI model does
the conversation happen?

a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer

8. Two Personal Computers (PCs) are configured in a network with the IP addresses of
192.168.10.5 and 172.14.10.5 respectively. The PC is able to communicate with
_____________.

a) Hub
b) Router
c) Switch
d) Bridge

9. When a chat conversation between two people is in progress using Telegram


application, their conversation is managed and synchronized. Which layer in the OSI
model performs this duty?

a) Data Link Layer


b) Network Layer
c) Transport Layer
d) Session Layer

10. Sir Noel is interacting with a server in a LAN and he is trying to download an account
statement of the previous year for reviewing purposes. Which protocol will help him to
download the statement from the server?

a) FTP
b) HTTP
c) HTTPS
d) SMTP

11. World Era Institutions (WEI) is building a new dormitory on its campus. Workers are
digging in the ground to install a new water pipe for the dormitory. A worker
accidentally damages a fiber optic cable that connects two of the existing dormitories to
the campus data center. Although the cable has been cut, students in the dormitories
only experience a very short interruption of network services. What characteristic of the
network is shown here?

a) Scalability
b) Quality of Service (QoS)
c) Fault Tolerance
d) Security

12. Which of the following in the OSI layer merged with the application layer of the
TCP/IP model?

e) Session Layer and Transport layer


f) Application Layer and Session Layer
g) Session Layer and Presentation Layer
h) Only Transport Layer

13. Given an IPv6 address 2001:AC92:0000:0000:0189:EC21:0000:EC72? Identify its


alternative IPv6 address that can minimize the address space.

a) 2001:AC92: 0189:EC21:0000:EC72
b) 2001:AC92: 0189: EC21:EC72
c) 2001:AC92::189: EC21:0:EC72
d) 2001:AC92::189: EC21:EC72

14. You have two Cisco routers setup back-to-back in a lab using DTE/DCE cables. To
which router would you add the clock rate command?

a) The serial port on the DCE router


b) The Ethernet port on the DTE router
c) The Ethernet port on the DCE router
d) The serial port on the DTE router
15. Which of the following device helps to prevent bottleneck and data collisions in LAN?

a) Proxy Server
b) Router
c) Switch
d) Hub

16. Which of the following device connects a PC to its default gateway?

a) Hub
b) Modem
c) Switch
d) Router
17. A web client is sending a request for a webpage to a web server. From the perspective
of the client, what is the correct order of the protocol stack that is used to prepare the
request for transmission?

a) Ethernet, IP, TCP, HTTP


b) Ethernet, TCP, IP, HTTP
c) HTTP, TCP, Ethernet, IP
d) HTTP, TCP, IP, Ethernet

18. Which IPv4 address can a host use to ping the loopback interface?

a) 127.0.0.1
b) 127.0.0.0
c) 125.0.0.1
d) 125.0.0.0

19. What method is used to manage contention-based access on a wireless network?

a) CSMA/CD
b) CSMA/CA
c) Priority
d) Token Passing

20. Which of the processes below is NOT performed by the Data Link Layer?

a) Framing
b) Error Control
c) Flow Control
d) Channel Coding

21. Alex needed to share a video with a co-worker. Because of the large size of the video
file, he decided to run a simple FTP server on his workstation to serve the video file to
his co-worker. To make things easier, Alex created an account with the simple
password of “file” and provided it to his co-worker on Friday. Without the proper
security measures or a strong password, the IT staff was not surprised to learn on
Monday that Alex’s workstation had been compromised and was trying to upload work
related documents to the internet. What type of attack is described in this scenario?

a) No issue as no any attack happened


b) Reconnaissance Attack
c) Malware Attack
d) Access Attack
22. Which of the following is the subnet mask value for IP address 10.10.10.10/13

a) 255.248.0.0
b) 255.240.0.0
c) 255.255.240.0
d) 255.224.0.0

23. Which of the following device is important to connect laptop and tablet to wireless
connection in Local Area Network?

a) Access Point
b) Hub
c) Router
d) Gateway

24. Errors are common in a network especially when the frames are sent and received were
not able to be viewed by human eyes nor resolved by any human. This error cannot be
neglected and detected by ____________ layer of the OSI model.

a) Physical
b) Data Link
c) Network
d) Transport

25. Which of the following fiber-optic cable types use for long haul network and cable TV
applications?

a) Single Mode
b) Dual Mode
c) Multi Mode
d) Triple Mode
26. What is the purpose of the sequencing function in network communication?

a) To uniquely label transmitted segments of data for proper reassembly by the


receiver.
b) To ensure data flows at an efficient rate between sender and receiver.
c) To guarantee delivery of data.
d) To determine if data is corrupted during transmission.

27. Which of these protocols are service discovery protocol?

a) OSPF
b) BGP
c) DHCP
d) SSH

28. What is the purpose of configuring a switch with a default gateway address?

a) The default gateway address is used to forward packets originating from the
switch to the remote networks.
b) It provides a next hop address for all traffic that flows through the switch.
c) Hosts that are connected to the switch can use the switch default gateway address to
forward packets to a remote destination.
d) A switch must have a default gateway to be accessible by Telnet and SSH.

29. Under which circumstance will a switch flood a frame out of every port except for the
port that the frame was received on?

a) The frame has the broadcast address as the destination address.


b) The frame has destination address known as unicast address.
c) The source address in the frame header is the broadcast address.
d) The source address in the frame is a multicast address.

30. Which lists the Layer 2 and Layer 3 address fields in the correct order?

a) Source IP address, Destination IP address, Destination NIC address, Source NIC


address
b) Source NIC address, Destination NIC address, Source IP address, Destination IP
address
c) Destination NIC address, Source NIC address, Source IP address, Destination
IP address.
d) Destination IP address, Destination NIC, Source NIC, Source IP address
31. Scenario:

A small-scale auditing company require your assistance to design IP addressing plan


for their Local Area Network in the new office. You have decided to use Class C
address and separate the network into 4 different subnet groups – Guests / Auditors /
Admin / Server. Each subnet required to have 62 hosts. Answer the following
questions based on the design of the new subnet mask for this subnetting
implementation by assuming that all the groups created are in the same block size:

a) How many bits to be borrowed for the subnetting process?


(2 marks)

Answer: 2 bits (2 ^ 2 = 4 subnets) – 2 marks

b) What is the subnet mask (after subnetting implementation) in binary form?


(2 marks)

Answer: 1111 1111.1111 1111.1111 1111. 1100 0000 – 2 marks

c) What is the subnet mask (after subnetting implementation) in decimal form?


(2 marks)

Answer: 255.255.255.192 – 2 marks

d) The company currently was given an IP address 200.200.20.0. After the subnetting
implementation, what is the broadcast address and the range of the usable IP
address for the first subnet?
(4 marks)

Answer:
- Broadcast Address: 200.200.20.63 – 2 marks
- Range of usable IP address: 200.200.20.1 – 200.200.20.62 – 2 marks

Total marks: 2 marks + 2 marks + 2 marks + 4 marks = 10 marks

(Total: 10 marks)
32. Given a SOHO network as an example in figure below, answer the following questions:

a) What is the IP address of the default gateway in the figure above?


(2 marks)

Answer: 192.168.5.60 – 2 marks

b) Discuss any TWO (2) features of default gateway in relations of the figure above.
(6 marks)

Answer (any two features):

- Basic features of default gateway are to perform packet forwarding and


optimal path selections.
- A router or layer 3 switch can be a default gateway in a network above,
where the default gateway must have an IP address in the same range as
the rest of the LAN. For example, in figure above, the router having an IP
address 192.168.5.60, where it is in the range of 192.168.5.45 to
192.168.5.100.
- A default gateway can route PC A, PC B and PC C to other network that is
to the server in remote network through Internet/WAN.
- Default gateway works based on the IP address where to route the traffic
from a LAN to remote network (Internet), a default gateway need to
choose next hop destination defined in the routing table.
- ***Or any other relevant answers are accepted.

c) What happen to PC A, PC B and PC C in the network of the figure above if the


default gateway is not exist?
(2 marks)
Answer: All the devices in the network will not able to leave the LAN, as a network
without default gateway or a bad default gateway, will not routing the data from the
LAN to other remote network. – 2 marks

Total marks: 2 marks + 6 marks + 2 marks = 10 marks

(Total: 10 marks)

You might also like