You are on page 1of 7

Model Exam For 4th Year CS Students (1pts Each)

1. Which one of the following is does not describe the effectiveness of data
communication?
A. Delivery B. Accuracy C. Timeliness D. Jitter E. None
2. The characteristic of the system defining that data must be received by the
intended device, is said to be?
A. Jitter B. Delivery C. Accuracy D. Timeliness
3. __________ is the path through which information is transmitted from one device
to another.
A. Transmission media B. Protocol C. Sender D. Receiver
4. ________ are electric or electromagnetic representations of data.
A. Data B. Signal C. Signaling D. Information
5. __________ is the process for converting digital data into digital signal
A. Line coding B. Block Coding C. Quantization D. Encoding
6. _______ is the random motion of electrons in analog or digital signals which may distort
the actual information being carried.
A. Distortion B. Noise C. Attenuation D. All
7. Which one of the following is disadvantages of serial transmission?
A. High speed B. Cost of wires C. Delay D. All except A
8. ________ is one-way street where traffic can flow in one direction at a time.
A. Full-duplex B. Simplex C. Half-duplex D. None
9. What is the role of protocols in data communication?
A. To define the structure or the format of data to be communicated
B. To define when data should be send and how fast they can be sent
C. To define the interpretation of the data to be communicated
D. All
10. _________ is a network in which a dedicated circuit is established between sender
and receiver and all data passes over this circuit
A. Packet-switched network C. Circuit-switched network
B. Virtual-circuit network D. Datagram networks
11. Which one of the following is false about packet-switched networks
A. The connection between two devices is a dedicated path
B. The message needs to be divided into packets of fixed or variable size
C. Bandwidth allocation is on-demand
D. Each packet is treated independently of all others
12. ___________ is measured by the frequency of failure, the time it takes a link to
recover from a failure.
A. Performance B. Reliability C. Security D. All
13. Which one of the following is not the use of network?
A. To share files B. To share resources C. To work on remote devices D. None
14. In _________ networks, resources like Printers, File Servers, Scanners and internet
are easy sharable among computers.
A. MAN B. PAN C. WAN D. LAN
15. Which one of the following is the advantages of peer-to-peer over client-server
based network?
A. Very secureB. Easy to back up C. High reliability D. Easy to manage
16. __________ are high-configuration computers that manage the resources of the
network.
A. Client B. Workstation C. Peripheral devices D. Medium
17. _______ is the device that connects two LANs using the same protocol
A. Switch B. Gateway C. Bridge D. Repeater
18. The device which is used to connect your computer with a telephone line, so that
you can access information from other servers is known as_______
A. Gateway B. Router C. Modem D. Hub
19. ________ is a device that protects your network computers and devices from intruders
on the Internet.
A. Router B. Firewall C. NIC D. Switch
20. __________ is a device that is used to connect a LAN with an internet and that is
used to receive, analyze and forward the incoming packets to another network
A. Router C. Gateway C. Hub D. Switch
21. Which one of the following is false about star topology
A. If one device fails, it does not affect the rest of network
B. The number of link required is equal to the number of devices
C. If the hub fail the whole system is fail
D. It creates multiple paths for data to travel
22. Which one of the following is false about ring topology
A. Devices are connected in a circular manner
B. Data flow is in only one direction
C. Removing of a single device can cause a disruption in network
D. Each device has repeater functionality
23. Which layer of TCP/IP is responsible for determining the best path through the
network?
A. Transport B. Internet C. Application D. Physical
24. Which of the following is not the advantages of client-server based network?
A. Centralized C. Scalability
B. Traffic congestion D. Security E. None
25. _________ is application layer protocol that translates the domain name into IP
addresses.
A. DNS B. SMTP C. FTP D. Telnet
26. ________ is a program that uses SMTP to forward the email from one device(client)
to another device (Server).
A. User agent B. Mail transfer agent C. Mail delivery agent D. All
27. __________ provides a connection to the remote computer in such a way that a
local terminal appears to be at the remote side.
A. SMTP B. FTP C. Telnet D. Post-office-protocol
28. Among the following one is not application layer service
A. File service B. Email service C. Web services D. Remote access E. None
29. ______ is that layer that establishes, maintains, and synchronizes the interaction
among communicating systems.
A. Network B. Transport C. Session D. Presentation
30. Which one of the following is not the responsibility of presentation layer?
A. Translation B. Synchronization C. Encryption D. Compression
31. Among the following one is not the responsibility of transport layer
A. Packetizing B. Reliability C. Control connection
D. Segmentation and reassembling E. None
32. Which one of the following is not true?
A. Connection oriented service is more reliable than connectionless service
B. In connection oriented service we have to establish a connection before starting
the communication
C. In connection less services, the order of message sent can be different from the
order received
D. Connection oriented protocol makes a connection and checks whether message
is received or not
E. None
33. Which one of the following is false about transport layer protocols?
A. UDP is a connectionless protocol
B. TCP is a connection-oriented protocol
C. UDP provides sequenced transport functionality
D. UDP does not offer the retransmission and flow control mechanisms
34. _______ is the layer that takes packets from Network Layer and encapsulates them
into Frames
A. Network B. Physical C. Data-link D. Transport
35. When two or more nodes transmit data at the same time, their frames will collide
and the link bandwidth is wasted during collision. What is the solution for
coordinating the access of multiple nodes to the shared link?
A. Data link control B. MAC Protocol C. MAC address D. IP address
36. How multiple access control protocol minimize collisions in order to utilize the
bandwidth?
A. By determining when a station can use the link (medium)
B. By determining what a station should do when the link is busy
C. By determining what the station should do when it is involved in collision
D. All
37. Among the following one is not responsibility of physical layer
A. Define representation of Bits C. Define data rate
B. Define transmission modes D. Define which station access to channel first
38. Which one of the following is layer-2 device used in networks?
A. Repeater B. Bridge C. Router D. Gateway
39. Which one of the following is false about circuit switched networks
A) The connection is dedicated until one party terminates the connection
B) Each connection uses only one dedicated channel on each link
C) Resource is reserved before data is transferred
D) Resource is allocated on-demand
40. Which one of the following is true about the bus topology?
A) Failure of a single host leads to shutdown of the entire network
B) Failure of the main cable affects the whole network
C) Failure of central device affects the whole network
D) Failure of each drop line and tap affects the whole network

41. From the following network layer protocols, which one is used to map MAC
address to IP address?
A) RARP B) HTTP C) ARP D) ICMP
42. In the OSI model, what is the main function of the transport layer?
A) Node-to-node delivery
B) Process-to-process message delivery
C) Synchronization
D) Updating and maintenance of routing tables
43. If one of the block addresses granted to certain organization is 123.23.45.55/25,
what is network address and broadcast address in classless addressing?
A) 123.23.45.0/25 123.23.45.255/25
B) 123.23.45.55/25 123.23.45.127/25
C) 123.23.45.0/26 123.23.45.127/26
D) 123.23.45.128/25 123.23.45.255/25
44. An Ethernet port on a router in your organization is assigned the IP address
10.65.64.1/21. What is the maximum number of hosts allowed on this subnet?
A) 254 B) 510 C) 1022 D) 2046
45. You are designing an IP address scheme for Assosa University. The Director of ICT
calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This
supplies you with a single subnetwork with 62 hosts. You need to have at least
four subnets with 14 hosts in each subnet. What custom subnet mask should you
use?
A) 255.255.255.192 C. 255.255.255.224
B) 255.255.255.128 D. 255.255.255.240
46. What is the range of assignable IP addresses for a subnet containing an IP address
of 172.16.1.10 /19?
A. 172.16.0.1 – 172.16.31.254 C. 172.16.0.1 – 172.16.63.254
B. 172.16.0.0 – 172.16.31.255 D. 172.16.0.1 – 172.16.31.255
E. 172.16.0.0 – 172.16.63.254
47. You are assigning IP addresses to hosts in the 192.168.4.0 /26 subnet. Which two of
the following IP addresses are assignable IP addresses that reside in that subnet?
A. 192.168.4.0 C. 192.168.4.63
B. 192.168.4.32 D. 192.168.4.64 E. 192.168.4.62
48. A host in your network has been assigned an IP address of 192.168.181.182 /25.
What is the subnet to which the host belongs?

A. 192.168.181.128 /25 C. 192.168.181.0 /25

B. 192.168.181.192 /25 D. 192.168.181.176 /25 E. 192.168.181.160 /25

49. Which network service can be configured on your router that is responsible for
assigning ip addresses to systems on the network?
A. DHCP B. NAT C. DNS D. HTTP
50. What is the maximum number of bits that can be borrowed to create subnets from
a class C network?
A. 8 B. 6 C. 4 D. 10
51. Which command is used to test network connectivity between two devices?
A. Ping B. traceroute C. ipconfig D. nslookup
52. Which command is used to view information in the routing table of router?
A. show ip route B. show ipconfig C. show static ip route D.
None
53. You are working with a Class B network with the private IP address of
172.16.0.0 /16. You need to maximize the number of broadcast domains, where
each broadcast domain can accommodate 1000 hosts. What subnet mask should
you use?
A. /22 B. /23 C. /24 D. /25 E. /26
54. What is the directed broadcast address of a subnet containing an IP address of
172.16.1.10 /19?
A. 172.16.15.255 C. 172.16.31.255
B. 172.16.95.255 D. 172.16.0.255 E. 172.16.255.255
55. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit
subnet mask. How many subnets can be created by using this subnet mask?
A. 32 B. 16 C. 30 D. 8 E. 14
56. Given a subnet of 172.16.56.0 /21, identify which of the following IP addresses
belong to this subnet.
A. 172.16.54.129 C. 172.16.64.1
B. 172.16.62.255 D. 172.16.65.255
57. What is the subnet address of the IP address 192.168.5.55 with a subnet mask of
255.255.255.224?
A. 192.168.5.0 /27 C. 192.168.5.16 /27

B. 192.168.5.48 /27 D. 192.168.5.32 /27 E. 192.168.5.64 /27

58. You are working for a company that will be using the 192.168.1.0 /24 private IP
address space for IP addressing inside their organization. They have multiple
geographical locations and want to carve up the 192.168.1.0 /24 address space into
subnets. Their largest subnet will need 13 hosts. What subnet mask should you use
to accommodate at least 13 hosts per subnet, while maximizing the number of
subnets that can be created?
A. 255.255.255.248 C. 255.255.255.224
B. 255.255.255.192 D. 255.255.255.252 E. 255.255.255.240
59. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit
subnet mask. How many assignable addresses are available in each of the subnets?

A. 32 B. 16 C. 30 D. 8 E. 14
60. An IP address of 192.168.0.100 /27 belongs to which of the following subnets?
A. 192.168.0.92 C. 192.168.0.64
B. 192.168.0.128 D. 192.168.0.96 E. 192.168.0.32

61. What subnet mask should be used to subnet the 192.168.10.0 network to support
the number of subnets and IP addresses per subnet shown in the following
topology?

A. 255.255.255.0 C. 255.255.255.128
B. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.192

You might also like