Professional Documents
Culture Documents
1. Which type of network would use mesh, point-to-point or hub and spoke topologies?
2. What does the data link layer add to a Layer 3 packet to create a frame?
a) Sequence number and Trailer
b) Header and Trailer
c) Header and Flags
d) Header and Sequence number
3. A network in which the user is connected within the office premises and get disconnect
once they come out of the building. This type of network is termed as _____________.
a) Personal Area Network (PAN)
b) Local Area Network (LAN)
c) Wide Area Network (WAN
d) Metropolitan Area Network (MAN)
a) The first three OSI layers describe general services that are also provided by the
TCP/IP internet layer.
b) The OSI layer 7 and TCP/IP application layer provide identical functions.
c) The TCP/IP network access layer has similar functions to the OSI network
layer.
d) The TCP/IP transport layer and OSI layer 4 provide similar services and functions.
a) host Sw-Level-8
b) hostname Sw-Level-8
c) host name Sw-Level-8
d) hostname “Sw-Level-8”
6. Which of the following wireless standards is best suited for industrial and IoT
environments?
a) Bluetooth
b) Zigbee
c) Wi-Max
d) Wi-Fi
7. The packet is converted into signals 0's and 1's. At which layer of the OSI model does
the conversation happen?
a) Physical Layer
b) Data Link Layer
c) Network Layer
d) Transport Layer
8. Two Personal Computers (PCs) are configured in a network with the IP addresses of
192.168.10.5 and 172.14.10.5 respectively. The PC is able to communicate with
_____________.
a) Hub
b) Router
c) Switch
d) Bridge
10. Sir Noel is interacting with a server in a LAN and he is trying to download an account
statement of the previous year for reviewing purposes. Which protocol will help him to
download the statement from the server?
a) FTP
b) HTTP
c) HTTPS
d) SMTP
11. World Era Institutions (WEI) is building a new dormitory on its campus. Workers are
digging in the ground to install a new water pipe for the dormitory. A worker
accidentally damages a fiber optic cable that connects two of the existing dormitories to
the campus data center. Although the cable has been cut, students in the dormitories
only experience a very short interruption of network services. What characteristic of the
network is shown here?
a) Scalability
b) Quality of Service (QoS)
c) Fault Tolerance
d) Security
12. Which of the following in the OSI layer merged with the application layer of the
TCP/IP model?
a) 2001:AC92: 0189:EC21:0000:EC72
b) 2001:AC92: 0189: EC21:EC72
c) 2001:AC92::189: EC21:0:EC72
d) 2001:AC92::189: EC21:EC72
14. You have two Cisco routers setup back-to-back in a lab using DTE/DCE cables. To
which router would you add the clock rate command?
a) Proxy Server
b) Router
c) Switch
d) Hub
a) Hub
b) Modem
c) Switch
d) Router
17. A web client is sending a request for a webpage to a web server. From the perspective
of the client, what is the correct order of the protocol stack that is used to prepare the
request for transmission?
18. Which IPv4 address can a host use to ping the loopback interface?
a) 127.0.0.1
b) 127.0.0.0
c) 125.0.0.1
d) 125.0.0.0
a) CSMA/CD
b) CSMA/CA
c) Priority
d) Token Passing
20. Which of the processes below is NOT performed by the Data Link Layer?
a) Framing
b) Error Control
c) Flow Control
d) Channel Coding
21. Alex needed to share a video with a co-worker. Because of the large size of the video
file, he decided to run a simple FTP server on his workstation to serve the video file to
his co-worker. To make things easier, Alex created an account with the simple
password of “file” and provided it to his co-worker on Friday. Without the proper
security measures or a strong password, the IT staff was not surprised to learn on
Monday that Alex’s workstation had been compromised and was trying to upload work
related documents to the internet. What type of attack is described in this scenario?
a) 255.248.0.0
b) 255.240.0.0
c) 255.255.240.0
d) 255.224.0.0
23. Which of the following device is important to connect laptop and tablet to wireless
connection in Local Area Network?
a) Access Point
b) Hub
c) Router
d) Gateway
24. Errors are common in a network especially when the frames are sent and received were
not able to be viewed by human eyes nor resolved by any human. This error cannot be
neglected and detected by ____________ layer of the OSI model.
a) Physical
b) Data Link
c) Network
d) Transport
25. Which of the following fiber-optic cable types use for long haul network and cable TV
applications?
a) Single Mode
b) Dual Mode
c) Multi Mode
d) Triple Mode
26. What is the purpose of the sequencing function in network communication?
a) OSPF
b) BGP
c) DHCP
d) SSH
28. What is the purpose of configuring a switch with a default gateway address?
a) The default gateway address is used to forward packets originating from the
switch to the remote networks.
b) It provides a next hop address for all traffic that flows through the switch.
c) Hosts that are connected to the switch can use the switch default gateway address to
forward packets to a remote destination.
d) A switch must have a default gateway to be accessible by Telnet and SSH.
29. Under which circumstance will a switch flood a frame out of every port except for the
port that the frame was received on?
30. Which lists the Layer 2 and Layer 3 address fields in the correct order?
d) The company currently was given an IP address 200.200.20.0. After the subnetting
implementation, what is the broadcast address and the range of the usable IP
address for the first subnet?
(4 marks)
Answer:
- Broadcast Address: 200.200.20.63 – 2 marks
- Range of usable IP address: 200.200.20.1 – 200.200.20.62 – 2 marks
(Total: 10 marks)
32. Given a SOHO network as an example in figure below, answer the following questions:
b) Discuss any TWO (2) features of default gateway in relations of the figure above.
(6 marks)
(Total: 10 marks)