You are on page 1of 6

CS662 – Autumn 2022

Worksheet 1: Review Questions on Networking and Communications

1. Choose three reasons why the networking industry uses a layered model, such as the five layer
hybrid model we used for this course. (Choose Three)
a. Allow changes in one layer to occur without changing other layers
b. Clarify what general functions are to be done rather than how to do it
c. To get Gigabit speeds on LANs
d. To create filter tables on switches used in LANs
e. It provides a means by which changes in functionality in one layer require changes in other
layers
f. Guide network troubleshooting steps
g. Provides detailed API specifications to let different layers interface one another.

2. Use the table below to give brief functional description of each of the layers in the five-layer
hybrid model. Also, provide example protocols and/or hardware.
Layer Brief Functional Descriptions Examples

Application

Transport
(Host to
Host)

Network
(Internet)

Data Link

Physical

Questions 3-11 (refer to the diagram below).

3. How many total collision domains are there? ______


4. How many total broadcast domains are there? ______
5. Assume the Frame shown in the diagram above is a unicast packet from host A to host D; according to
where it currently is in the diagram, which statement (only one) below is true?
a. sMAC = router1’s right interface, dMAC = switch’s port 1
b. sMAC = host A’s MAC, dMAC = host D’s MAC
c. sMAC = hub’s right port, dMAC = router2’s left interface
d. sMAC = router1’s right interface, dMAC = router2’s left interface
6. Same question as #3
a. sIP = router1’s right interface, dIP = host D’s IP
b. sIP = host A’s IP, dIP = host D’s IP
c. sIP = hub’s right port, dIP = switch’s port 1
d. sIP = router1’s right interface, dIP = switch’s port 1
7. What is the broadcast address for the 10.20.30.64 /27 network?
a. 10.20.30.95
b. 10.20.30.127
c. 10.20.30.160
d. 10.20.30.255
8. Assume that the current state of the switch’s table is as shown here.
Which computer(s) would see a unicast packet that is sent from host C to host D ?
a. only D
b. only D and E
c. only D, F and G
d. only D, F, G and E

9. Assume the Frame shown in the diagram above is a directed broadcast packet from host A to the
10.20.30.128 network; according to where it is in the diagram, it should have a destination MAC
address of ________ and a destination IP address of _______ .
a. FF:FF:FF:FF:FF:FF, 255.255.255.224
b. router2’s left interface, 10.20.30.159
c. FF:FF:FF:FF:FF:FF, 10.20.30.159
d. router2’s left interface, 255.255.255.255
10. Under what conditions would the switch in the diagram above, “learn” about router1’s right interface
MAC address?
a. as soon as any host addressed a packet TO router1
b. as soon as any host on the switch received a packet FROM router1
c. only after any host on the switch ARPed for router1’s MAC address
d. never
11. Which of these correctly represents the dotted-decimal format of the /27 mask? 11100000
a. 255.255.255.127
b. 255.255.192.0
c. 255.255.255.192
d. 255.255.255.224
12. If you only saw the IP address 140.27.216.40, with no mask information; what class of IP address
space would you assume it belongs to, according to the 1st octet rule?
a. Class A
b. Class B
b. Class C
c. Class D
13. Assume hosts A & B “live” on the same LAN and are connected by a switch that “knows” where every
host “lives”. If A wants to send a frame to B, and knows B’s IP but does not know B’s MAC address, A will
first…
a. send an ARP broadcast to the local network to obtain B’s MAC address from B.
b. address the frame directly to the switch’s MAC address, and let the switch forward it to B.
c. send the frame to the network’s router, and have the router ARP for B’s MAC address.
d. send a DNS query to the local DNS server to obtain B’s MAC address
14. Which statement is false regarding routing protocols?
a. BGP is the most popularly used protocol for inter-AS routing.
b. OSPF is the most popular DV (Distance Vector) routing protocol.
c. One could disable all routing protocols and still successfully route traffic in their AS.
d. LS (Link State) protocols converge faster than DV (Distance Vector) protocols.
15. When processing and forwarding traffic, a router will…
a. read layer 2, then re-write layer 1 header information.
b. read layer 3, then re-write layer 2 header information.
c. read layer 2, then re-write layer 3 header information.
d. read layer 3, then re-write layer 1 header information.
16. Reliably tracing a spoofed IP packet back to its source of origin would require…
a. referencing the identification field in the IP header.
b. following each new IP address that is assigned at each hop back to the source.
c. following each new layer 2 address that is assigned at each hop back to the source.
d. doing a reverse name resolution (nslookup) with the source IP address.
17. What network is machine X on, if it has an IP of 188.15.207.49 and the network's subnet mask is /20?
a. 188.15.192.0
b. 188.15.207.128
c. 188.15.207.255
d. 188.15.215.255
18. A TCP host would indicate that it successfully received the packet with TCP sequence #800 and the
100 bytes of payload it was carrying, by sending ack# ______ back to the sender?
a. 800
b. 801
c. 900
d. 901
19. What “mechanism” does TCP use to control the amount of traffic it receives?
a. Acknowledgements
b. Window size announcements
c. Sequence numbering
d. Flags
20. A packet with sIP = 0.0.0.0 and dIP = 255.255.255.255 would most likely be associated with…
a. an ARP request.
b. a DHCP request.
c. a DNS query.
d. a directed broadcast packet.
21. An attacker who wants to redirect traffic to suit her purposes would need to…
a. alter the information in a switch’s switching table (MAC to port mapping).
b. alter the information in a router’s routing table (network to interface mapping).
c. alter the information in a DNS server’s DNS table (fqdn to IP address mapping).
d. any of the above could potentially result in malicious traffic redirection.
22. A single switch that has had all of its P ports assigned to V VLANS,…
a. now has V collision domains and 1 broadcast domain.
b. now has P collision domains and 1 broadcast domain.
c. now has P collision domains and V broadcast domains.
d. now has V collision domains and P broadcast domains.
23. The IP address 255.255.255.255 is the…
a. limited broadcast address.
b. the anycast address.
c. universal multicast address.
d. directed broadcast address.
24. When implementing PAT (aka "overloaded-NAT"); every packet leaving the private network, enroute
to the Internet, gets reassigned… (choose two)
a. a new destination port number.
b. a new destination IP address.
c. to the same source IP address.
d. to the same source port number.
e. to different source port numbers.

25. DHCP promotes “plug and play networking” by…


a. providing a MAC address and IP address to a requesting host.
b. providing an IP address, default gateway, and DNS server address to a requesting host.
c. performing both name and address resolution for hosts on the local network.
d. both a and b.
26. Multicast traffic…
a. is forwarded only to hosts that are subscribers of a service’s class D address.
b. is repeatedly sent until acknowledged, thus yielding more reliability than simple unicast.
c. is sent to all hosts on the specified class E network or subnet.
d. is broadcast by all switches but blocked by all routers.
27. The ARP protocol is given a/an _____ address and—hopefully—will return a/an _______ address.
a. IP  MAC
b. IP  name
c. MAC  IP
d. name  IP
28. Which of these is not a method by which routers “learn/know” about networks?
a. Dynamic routing protocols (e.g., RIP, IGRP, OSPF)
b. ARP lookup (i.e., router sends broadcast to the “all-routers” class D address)
c. Statically assigned (by administrator) routes
d. Directly connected networks (i.e., router’s interface has an IP address in that network)
29. A computer that is continually “listening” on port 25, is most likely an…
a. smtp (mail) server.
b. ftp (file) client.
c. ftp (file) server.
d. smtp (mail) client.
30. Troubleshoot the configuration of the following internetwork and find out any possible problems. Make
sure to provide succinct explanation regarding the problem(s).

31. You are tasked to configure routing on the following exhibit (For routers R1, R2 and R3). Explain how
you solve this requirement in the most efficient way (preferably using Cisco IOS Commands) without using
a Routing protocol. If possible, propose solutions using routing protocols RIP and OSPF.

32. What are some advantages of a Domain Based network over a Peer-to-Peer (Workgroup)
network? (Choose Two)
a. Performance is better on a Peer-to-Peer
b. Performance is better on a Domain Based Network
c. Security is better on a Domain Based network
d. Security is better on a Peer-to-Peer
e. Domain Based is easier to administer

33. Refer the picture on the right.


Both switches are using a default configuration. Which two destination addresses will host 4 uses to send
data to host 2? (Choose Two)
a. The IP address of host 4
b. The MAC address of the Fa0/0 interface of the R1 router
c. The MAC address of host 2
d. The MAC address of host 4
e. The MAC address of the Fa0/1 interface of the R1 router
f. The Port address of Fa0/1
g. The IP address of host 2
h. The Port address of host 2

34. Some protocols are considered to be technically non-routable. Which of the following statements
best describes the most common reason why a protocol would be considered non-routable
a. It does not contain the appropriate Data Link layer information required by routers.
b. It uses advanced Transport layer services to move across the Internet and avoids the routing
overhead required by the more primitive networking protocols.
c. It defines Physical layer addresses for internal routing.
d. It does not specify the Network layer addresses required by routers.
e. There is no protocol which is non-routable

35. What are two advantages of Static Routing over Dynamic Routing? (Choose Two)
a. Static routing is less prone for attack during transmission because it does not advertise over
the network.
b. Static routing is relatively easy to configure for large networks.
c. Static routing requires very little knowledge of the network for correct implementation.
d. Static routing uses fewer router memory/processor resources than dynamic routing.
e. Static routing scales well with expanding networks.

36. Which of the following are advantages of using NAT/PAT? (Choose Two)
a. Translation introduces routing path delays.
b. Conserves legally registered addresses.
c. Causes loss of end-to-end IP traceability.
d. Increases flexibility when connecting to the Internet.
e. Certain applications will not function with NAT enabled.

37. Why is port number included in the TCP or UDP header of a datagram?
a. To indicate the correct router interface that should be used to forward a datagram
b. To identify which switch ports should receive or forward the datagram
c. To determine which Layer 3 protocol should be used to encapsulate the data
d. To enable a receiving host to forward the data to the appropriate application
e. To allow the receiving host to assemble the packet in the proper order
38. Which one of the following is the purpose of the TCP three-way handshake (session creation)?
a. Sending echo requests from the source to the destination host to establish the presence of
the destination.
b. Determining the IP address of the destination host in preparation for data transfer
c. Requesting the destination to transfer a binary file to the source
d. Synchronizing window size and sequence numbers between source and destination in
preparation for data transfer
e. None of the above
39. What would be the source and destination IP address of a ping packet sent from the attack host in
order to conduct a SMURF attack against the target host using the network shown? (If you are not
familiar with the Smurf Attack, here is the gist: attacker spoofs target IP, then sends a directed
broadcast ping to a “large” network; i.e., any LAN with lots of computers connected.) Fill in the box
the correct “Source” and “Destination” addresses.

Source IP? Destination IP?

Target host
Attack host
214.22.173.16 131.122.76.42
Subnet mask for this network is /20

IP address for this host is 159.87.0111|1011.x

===============================END =======================

You might also like