You are on page 1of 13

‫ﺍﻻﻻﺑﻠﺒﺘﺎﺗﺎ‬

Computer Networks

Exam Bank

Multi-Choice Questions: 88 questions

True & False Questions :45 questions

Total:133 questions

By:
Mohamed Abdul-Fattah Oraby
Ahmed Kamal AboElWafa
Mohamed Hassan Mohamed
*Multi Choice Questions
1-what are the types of Networks ?

a-MAN b-PAN c-SAN d-all of above.

2-...........is a collection of Devices that are use a set of Communication protocols that are make
them able to communicate with each other over transmission media.
a-Network Topology b-Network Protocols c-Computer Network d-None of Above

3- ...........is a set of rules for exchanging information over a network.

a-Communication Protocols b-Network Protocols c-Network Topologies d-None of Above

4-.......... is the computer running a program that requests the service from .............. .

a-Client,Server b-Server,Client c-Client,Network d-Client,Browser

5-................. network are defined by the presence of servers on a network that provide security
and administration of the network

a-Client Server b-Peer to peer c-Star topology d-Ring topology

6-All of the mentioned are Network devices except ...........

a-NIC Card b-GPU c-Hub d-Terminator

7-Twisted-pair wires, coaxial cable, optical fiber cables are the examples of:

a-Wired media b-Wireless media c-Both A&B d-None of above

8-Select the correct cable that transport signals in the form of light.

a-Twisted-pair cable b-Fiber-optic cable c-coaxial cable d-Shielded Twisted Pair cable

9-The types of transmission channel or media used for LAN or WAN are .....

a-Twisted pair cables b- Coaxial cables c-Fiber optic cables d-All of above

10-................Separate the line into two signals one of them to Phone line and the other is to Modem.

a-Splitter b-connector c-terminators d-repeater

11-............regenerate analog or digital signals that are distorted by transmission loss due to
attenuation.

a-Splitter b-connector c-terminators d-repeater


12-Make Modulation and De-modulation, it Convert Analog signal that comes from the central to
Digital signal

a-ADSL modem b-Access point c-Tester device d-Splitter

13-.................Convert the signal wire (cable) to wireless.

a-Splitter b-connector c-Access point d-repeater

14-..............has one collision domain and one broadcast.

a-Access point b-ADSL modem c-Hub d-both A&C

15-they take a group of hosts and allow the network to see them as a single unit. This is done passively,
without any other effect on the data transmission.

a-Hubs b-Switches c-Routers d-Bridges

16-................can determine if data should remain on a LAN and transfer data


only to the connection that needs it.

a-Switches b-Routers c-Bridges d-Modems

17-................is a network device or software for controlling network security and access rules

a-Firewall b-gateway c-server d-VM ware

18-The expensive software and additional computing power can be shared by the computers in a network
with he help of..........

a-Application server b-Message server c-DNS Server d-Database server

19-A single cable connects each workstation in a linear, signals are broadcasted to all stations, but sta-
tions only act on the frames addressed to them.

a-Star Architecture b-Ring Architecture c-Bus Architecture d-Mesh Architecture

20-We use..................cable in Ring topology

a-STP b-UTP c-UDP d-Fiber obtic

21-In .............Nodes communicate across the network by passing data through the hub or switch.

a-Tree Topology b-Ring Topology c-Mesh Topology d-Star Topology

22-.................... is implemented to provide as much protection as possible from interruption


of service

a-Mesh Topology b-Star Topology c-Ring Topology d-Tree Topology


23-.............. allow connecting devices on different networks, and it is able to separate the devices
connected to different broadcast domain and different collision domain ?

a-router b-switch c-hub d-A and B

24-Data Flow in Communication for Mobile Network is .....

a-Simplex b-Half-Duplex c-Full Duplex d- non of the bove

25-.....Single source send to specific nodes (group) that are


connected to same Network.

a-Unicast Mode b-Multicast Mode c-Broadcast Mode d-bilateralcast Mode

26-To Browse internet we use ....... protocol

a-HTTP b-DNS c-Telnet d-TFTP

27-Data in network layer called...........

a-packets b-frames c-bits d-segments

28-The DNS protocols used to

a-resolve domain names b-transfer files c-mail transfer d-network management

29-The communication mode is specified ( simple - Half duplex – full duplex ) in the ......layer

a- Application b-presentation c-session d-Data link

30-The two processes, flow control and error recovery, occur in the ..... layer

a- Application b-presentation c-Transport d-Data link

31-Data link layer adding the physical address to the....

a-segments b-packets c-frames d-bits

32-(S-Port- D-Port -TCP/UDP -S-IP- D-IP)< this Data Header for .....layer

a-Network b-presentation c-Transport d-Data link

33-To ensure that frames are sent free of errors, a number is added to each frame. The time of
transmission is called....

a-CRC b-FCs c-IP d- Mac address

34-process of De-encapsulating Dataoccurs starting from.......layer

a- Application b-presentation c-Datalink d-Physical


35-Data link is divided into ......... sub layers

a-2 b-3 c-4 d-5

36-MAC address contains of .........

a-8 bytes b-4 bytes c-32 bits d-48 bits

37-It’s responsible for transmitting the data from a device to another device, step by step

a-IP address b-MAC address c-TCP d-UDP

38-It is responsible for placing the data on the transmission media, which can be cables,
or it can be wireless media

a-physical layer b-data link layer c-session layer d-network layer

39-in..........Each segment has its own collision domain

a-switch b-hub c-router d-a and b

40-...... used to convert the domain name to IP address

a-NFS b-SMTP b-DNS d-Telnet

41-Port number of DNS is....

a-53 b-21 c-23 d-80

42-............It helps to know the configuration of TCP/IP for the


device.

a-ping b-ipconfig c-arp -a d-route print

43-.....used to recognize the component of my device in terms of routing table saved in it

a-ipconfig b-ping c-arp -a d-route print

44-to connect to a file server exits on internet, we write a ..........command


a-ftp b-tftp c-file d-arp-a

45-In application DNS protocol use .................... protocol in transport layer

a-TCP b-UDP c-a&b d-Non of mentioned

46-...............is a process which is used in a TCP/IP network to make a connection between


the server and client.

a-Two Way Handshake b-Three Way Handshake c-Three loop Handshake d-Two loop Handshake
47-all the following protocols exist in internet layer except ...............

a-SMTP b-ICMP c-IGMP d-IP

48-the ip address consist of ............ octets

a-8 b-4 c-16 d-32

49-giving the ip 192.255.255.254, for which class it belongs to ?

a-Class A b-Class D c-Class C d-Class E

50-the third octet is for ................in class A IPs and for ................... in class C

a-Network,Host b-Host,Network c-Network,Network also d-Host,Host also

51-the first ip in the subnet is called ...........

a-Network id b-router id c-broadcast id d-vlan id

52-The subnet mask consisting of 8 ones and 24 zeros belongs to Class............

a-A b-B c-C d-D

53-in ip address ,The class designated for researchers is Class...............

a-D b-E c-C d-B

54-The class that contains 3 digits of the network is.............

a-C b-A c-B d-D

55-The class that contains 3 digits of the Host is.............

a-C b-A c-B d-D

56-"No of network = 2^7-2 " ,This is the equation for the number of networks in ..........

a-class A b-class B c-class C d-class D

57-This is the equation for the number of networks in"No of host = 2^16-2 ",This is the equation
for the number of host in..............

a-class A b-class B c-class C d-class D

58-The subnet mask for ip address 200.50.40.5 is 255.255.255.0 so subnet is ...............

a-200.50.0.0 b-200.50.40.4 d-20.0.0.0 d-200.50.40.0

59-we have the ip 172.16.2.160 which its subnet mask is 255.255.255.192, its subnet is .............

a-172.16.2.0 b-172.16.2.192 c-172.16.2.128 d-172.16.192.2


60-the size of hosts bits in this subnet mask 255.255.192.0

a-8 b-14 c-16 d-24

61-The subnet mask of ip 200.10.8.0. is 255.255.252.0 so broadcast ID is...............

a-200.10.0.255 b-200.10.2.255 c-200.10.4.255 d-200.10.8.255

62-IP Host Address: 172.16.2.121 and Subnet Mask: 255.255.255.0 so Broadcast Address = ........

a-172.16.2.255 b-172.16.0.255 c-172.16.4.255 d-172.16.8.255

63-192.168.5.32/24 , Required 5 network ., 25 user in every network so How many zeros are
in the subnet mask ?

a-8 b-6 c-7 d-5

64-number 24 in ip 192.168.0.0/ 24 its called.......

a-Prefix b-Hub count c-Net ID d-Router ID

65-in Port- Security , ........block port (no send and no receive) by default

a-Shutdown b-Protect c-Restrict d-all of the above

66-Spanning-Tree Path Cost for 100 MBps according revised IEEE space is ..............

a-2 b-19 c-4 d-100

67-Switch is a .......... device while Router is a ........... Device

a-layer 4, layer 3 b-layer 3, layer 2 c-layer 3, layer 4 d-layer 2, layer3

68-in transmitting frames, ...............is that Switch checks destination address and immediately
begins forwarding frame.

a-Cut-Through b-Store and Forward c-Fragment-Free d-None of the mentioned

69-Switches and bridges use one of ..... operating modes to transmit frames

a-two b-three c-four d-five

70- Switches and bridges maintain a ...... to store address-to-port mappings so it can determine the
locations of connected devices.

a-routing table b-port-number table c-MAC address table d-ip address table

71-disadvantages of Redundant topology is ......

a-broadcast storms b-multiple frame copies c-MAC database instability d-all of the above
72-in Spanning-Tree,One ...... per network

a-root bridge b-root port c-designated port d-root segment

73-Bridge ID consist of Bridge priority and ....

a-ip address b-port-number c-Mac address d-port-speed

74-How many hosts in subnet 192.168.2.0 its subnet mask 255.255.255.192 ?

a-16 b-32 c-8 d-64

75-To route a router need to know....

a-Destination addresses b-Sources it can learn from c-Possible routes and Best route d-all of above

76-What is Routed Protocol?

a-ip address b-Rip c-iGRP d-ospf

77-Which of these commands is the default routing command?

a-ip route 0.0.0.0 0.0.0.0 172.168.2.1)


b-ip route 0.0.0.0 172.168.2.1 0.0.0.0
c-ip route 172.168.2.1 0.0.0.0 0.0.0.0
d-All of the above works

78-........ are used between routers to determine paths and maintain routing tables.

a-routed protocol. b-Routing protocols c-static Route d-Dynamic Route

79-An ........ is a collection of networks under a common administrative domain

a-autonomous system b-networks system c-Routing system d-protocol system

80-.....protocol connect different autonomous systems.

a-Rip b-IGRP c-BGP d-ospf

81-RIP Administrative Distance is........

a-100 b-120 c-90 d-50

82-How many routing protocol classes?


a-6 b-4 c-5 d-3

83-Which of the following are solutions to the problem of routing loops in the process of maintaining
routing information?

a-Split Horizon b-Route Poisoning c-Hold-Down Timers d-(All of the bove)


84-...... algorithm is used in link state routing protocols

a-SPF b-FSP c-SPE d-ESP

85-Which of the following is a task of configuring an IP routing?


a-Select routing protocols
b-Specify networks or interfaces Networ
c-(A and B )
d-None of the mentioned

86-IGRP protocol accepts a maximum of .... paths .


a-four b-five c-six d-three

87-ospf its ....prptocol.

a-Distace Vector b-Link State c-Hybrid Routing d-A and b

88-Rip its ....prptocol.

a-Hybrid Routing b-Link State c-A & B d-Distance Vector


*True & False Questions:
1-Data speed of LAN is low and its bandwidth is low.

a-True b-False (correct:High)

2-In Client/Server network Each computer is responsible for making its own resources available to
other computers on the network.

a-True b-False (correct:Peer to Peer Network)


3-Peer to peer Networks do not have a central control system.

a-True b-False
4-One of the advantages of peer to peer network is that it has Better performance than client server
Network.

a-True b-False (correct:Less)

5-Switch and Pc are connected together using crossover cable

a-True b-False (correct:Straight)

6-Router and Pc are connected together using crossover cable

a-True b-False

7-bridges and switch does not convert data transmission formats

a-True b-False (correct:bridges converts but switches not)

8-Gateways communicate using more than one protocol to connect a bunch of networks.

a-True b-False

9-The vital role that firewalls play in network security is growing inversely with the continuous increase
in cyber attacks.

a-True b-False (corrcet:in parallel)

10-in star topology Unidirectional links connect the transmit side of one device to the receive side
of another device.

a-True b-False (corrcet:ring topology)

11-In OSI Model Application,Presentation and Session layers represented to Application layer in
TCP/IP model

a-True b-False
12-TCP is connectionless protocol no session,no recovery and no control

a-True b-False (corrcet:Connectionoriented)

13-UDP wait acknowledgement from the destination

a-True b-False (corrcet:TCP)

14-The real connection between the layers is in the application layers of sender and receiver
whether the connection is through cables,wireless, but the other layers is virtual connection

a-True b-False (corrcet:Physical)

15-SNMP "Simple Network Management Protocol" used in network layer

a-True b-False (corrcet:Application)

16-SNMP & SMTP, they move web pages made up of texts, images, and links to other pages from web
server to the client browser and opposite

a-True b-False (corrcet:HTTP&HTTPS)

17-The UDP protocol adds sequence number (identifier) to each segment, to deliver data correctly
while TCP protocol does not sequence number.

a-True b-False (corrcet:TCP&UDP)

18-ipconfig command used to test connectivity between two devices on the same LAN or on
the internet

a-True b-False (corrcet:ping)

19-arp-a command used to resolution between IP and MAC address or internet and physical address

a-True b-False

20-if we have a subdomain and we want to know its IP so we can use "ipconfig" command

a-True b-False (corrcet:nslookup)

21-The TCP protocol operates on port 6, while the UDP protocol operates on port 17

a-True b-False

22-RARP & ARP Protocol exist in internet layer

a-True b-False

23-RARP is used for mapping between MAC address and IP address, to get IP address

a-True b-False
24-ARP is used for mapping between MAC address and IP address, to get MAC address

a-True b-False

25-IGMP protocol Test connectivity between two PCs

a-True b-False (corrcet:ICMP)

26-the path between destination and source is based on source ip

a-True b-False (corrcet:destination)

27-In ip addresses of class A , the first bit of the first octet must be zero

a-True b-False

28-In Class A the size of Network bits is 8 bits

a-True b-False (corrcet:7bits)

29-the expression “/24” represents the number of 1s in the mask.

a-True b-False

30-If the result of a process [ source ip address (AND) Subnet mask ] equals result[ Destination ip ad-
dress (AND)Subnet mask] so the source and Destination ip address (on different networks)

a-True b-False (corrcet:on the same network)

31-in Spanning-Tree,two root port per nonroot bridge.

a-True b-False (corrcet:one)

32-in Spanning-Tree,One designated port per segment.

a-True b-False

33-Root bridge is Bridge with the highest bridge ID.

a-True b-False (corrcet:lowest)

34-All port at the root bridge is designated forward.

a-True b-False

35-One designated port per segment The highest cost to Root bridge

a-True b-False (corrcet:lowest)


36-Routers must learn destinations that are not directly connected.

a-True b-False

37-Dynamic Route Uses a route that a network routing protocol adjusts automatically for topology or
traffic changes.

a-True b-False (corrcet:static)

38-IGRP Administrative Distance = 100.

a-True b-False

39-Metric of Rip its Bandwidth Delay,Load,Reliability and MTU while Metric of IGRP its Hop count

a-True b-False (correct:IGRP,Rip)

40-Hold-Down Timers Router sends updates when a change in its routing table occurs(Triggered Up-
dates)

a-True b-False (correct:Triggered Updates)

41-Hybrid Routing Share attributes of both distance-vector and link-state routing.

a-True b-False

42-RIP More scalable than IGRP.

a-True b-False (correct:IGRP,Rip)

43-Classless routing protocols not support variable-length subnet masking.

a-True b-False (correct:support)

44-EIGRP,OSPF,IS-IS and RIPv2 its classful routing protocols.

a-True b-False (correct:classless)

45-Physical interfaces can be divided into multiple subinterfaces.

a-True b-False

You might also like