Professional Documents
Culture Documents
البنك
البنك
Computer Networks
Exam Bank
Total:133 questions
By:
Mohamed Abdul-Fattah Oraby
Ahmed Kamal AboElWafa
Mohamed Hassan Mohamed
*Multi Choice Questions
1-what are the types of Networks ?
2-...........is a collection of Devices that are use a set of Communication protocols that are make
them able to communicate with each other over transmission media.
a-Network Topology b-Network Protocols c-Computer Network d-None of Above
4-.......... is the computer running a program that requests the service from .............. .
5-................. network are defined by the presence of servers on a network that provide security
and administration of the network
7-Twisted-pair wires, coaxial cable, optical fiber cables are the examples of:
8-Select the correct cable that transport signals in the form of light.
a-Twisted-pair cable b-Fiber-optic cable c-coaxial cable d-Shielded Twisted Pair cable
9-The types of transmission channel or media used for LAN or WAN are .....
a-Twisted pair cables b- Coaxial cables c-Fiber optic cables d-All of above
10-................Separate the line into two signals one of them to Phone line and the other is to Modem.
11-............regenerate analog or digital signals that are distorted by transmission loss due to
attenuation.
15-they take a group of hosts and allow the network to see them as a single unit. This is done passively,
without any other effect on the data transmission.
17-................is a network device or software for controlling network security and access rules
18-The expensive software and additional computing power can be shared by the computers in a network
with he help of..........
19-A single cable connects each workstation in a linear, signals are broadcasted to all stations, but sta-
tions only act on the frames addressed to them.
21-In .............Nodes communicate across the network by passing data through the hub or switch.
29-The communication mode is specified ( simple - Half duplex – full duplex ) in the ......layer
30-The two processes, flow control and error recovery, occur in the ..... layer
32-(S-Port- D-Port -TCP/UDP -S-IP- D-IP)< this Data Header for .....layer
33-To ensure that frames are sent free of errors, a number is added to each frame. The time of
transmission is called....
37-It’s responsible for transmitting the data from a device to another device, step by step
38-It is responsible for placing the data on the transmission media, which can be cables,
or it can be wireless media
a-Two Way Handshake b-Three Way Handshake c-Three loop Handshake d-Two loop Handshake
47-all the following protocols exist in internet layer except ...............
50-the third octet is for ................in class A IPs and for ................... in class C
56-"No of network = 2^7-2 " ,This is the equation for the number of networks in ..........
57-This is the equation for the number of networks in"No of host = 2^16-2 ",This is the equation
for the number of host in..............
59-we have the ip 172.16.2.160 which its subnet mask is 255.255.255.192, its subnet is .............
62-IP Host Address: 172.16.2.121 and Subnet Mask: 255.255.255.0 so Broadcast Address = ........
63-192.168.5.32/24 , Required 5 network ., 25 user in every network so How many zeros are
in the subnet mask ?
65-in Port- Security , ........block port (no send and no receive) by default
66-Spanning-Tree Path Cost for 100 MBps according revised IEEE space is ..............
68-in transmitting frames, ...............is that Switch checks destination address and immediately
begins forwarding frame.
69-Switches and bridges use one of ..... operating modes to transmit frames
70- Switches and bridges maintain a ...... to store address-to-port mappings so it can determine the
locations of connected devices.
a-routing table b-port-number table c-MAC address table d-ip address table
a-broadcast storms b-multiple frame copies c-MAC database instability d-all of the above
72-in Spanning-Tree,One ...... per network
a-Destination addresses b-Sources it can learn from c-Possible routes and Best route d-all of above
78-........ are used between routers to determine paths and maintain routing tables.
83-Which of the following are solutions to the problem of routing loops in the process of maintaining
routing information?
2-In Client/Server network Each computer is responsible for making its own resources available to
other computers on the network.
a-True b-False
4-One of the advantages of peer to peer network is that it has Better performance than client server
Network.
a-True b-False
8-Gateways communicate using more than one protocol to connect a bunch of networks.
a-True b-False
9-The vital role that firewalls play in network security is growing inversely with the continuous increase
in cyber attacks.
10-in star topology Unidirectional links connect the transmit side of one device to the receive side
of another device.
11-In OSI Model Application,Presentation and Session layers represented to Application layer in
TCP/IP model
a-True b-False
12-TCP is connectionless protocol no session,no recovery and no control
14-The real connection between the layers is in the application layers of sender and receiver
whether the connection is through cables,wireless, but the other layers is virtual connection
16-SNMP & SMTP, they move web pages made up of texts, images, and links to other pages from web
server to the client browser and opposite
17-The UDP protocol adds sequence number (identifier) to each segment, to deliver data correctly
while TCP protocol does not sequence number.
18-ipconfig command used to test connectivity between two devices on the same LAN or on
the internet
19-arp-a command used to resolution between IP and MAC address or internet and physical address
a-True b-False
20-if we have a subdomain and we want to know its IP so we can use "ipconfig" command
21-The TCP protocol operates on port 6, while the UDP protocol operates on port 17
a-True b-False
a-True b-False
23-RARP is used for mapping between MAC address and IP address, to get IP address
a-True b-False
24-ARP is used for mapping between MAC address and IP address, to get MAC address
a-True b-False
27-In ip addresses of class A , the first bit of the first octet must be zero
a-True b-False
a-True b-False
30-If the result of a process [ source ip address (AND) Subnet mask ] equals result[ Destination ip ad-
dress (AND)Subnet mask] so the source and Destination ip address (on different networks)
a-True b-False
a-True b-False
35-One designated port per segment The highest cost to Root bridge
a-True b-False
37-Dynamic Route Uses a route that a network routing protocol adjusts automatically for topology or
traffic changes.
a-True b-False
39-Metric of Rip its Bandwidth Delay,Load,Reliability and MTU while Metric of IGRP its Hop count
40-Hold-Down Timers Router sends updates when a change in its routing table occurs(Triggered Up-
dates)
a-True b-False
a-True b-False