You are on page 1of 8

Computer Networks (CS316)

‫ الدور األول‬2023-2022 ‫حلول اسئلة الفاينل‬

1-Which statement is true about variable-length subnet masking?

A. Subnets may only be subnetted one additional time.


B. The size of each subnet may be different, depending on requirements.
C. Bits are returned, rather than borrowed, to create additional subnets.
D. Each subnet is the same size.

2- What are two benefits of using a layered network model? (Choose two.)
A. It prevents technology in one layer from affecting other layers.
B. It assists in protocol design.
C. It ensures a device at one layer can function at the next higher layer.
D. It prevents designers from creating their own model.
E. It speeds up packet delivery.

3- What is a key characteristic of the peer-to-peer networking model?

A. wireless networking.
B. resource sharing without a dedicated server.
C. social networking without the Internet.
D. network printing using a print server.

4- A network administrator is troubleshooting connectivity issues on a server. Using a


tester, the administrator notices that the signals generated by the server NIC are
distorted and not usable. In which layer of the OSI model is the error categorized?

A. data link layer.


B. physical layer.
C. network layer
D. presentation layer network printing using a print server.

5- What service is provided by SMTP?


A. Allows remote access to network devices and servers.
B. Uses encryption to provide secure remote access to network devices and servers.
C. Allows clients to send email to a mail server and the servers to send email to other
servers.
D. An application that allows real-time chatting among remote users.
6- A client packet is received by a server. The packet has a destination port number of
21. What service is the client requesting?

A. DHCP
B. FTP
C. TFTP
D. DNS

7- A network administrator is adding a new LAN to a branch office. The new LAN must
support 4 connected devices. What is the smallest network mask that the network
administrator can use for the new network?

A. 255.255.255.192
B. 255.255.255.248
C. 255.255.255.240
D. 255.255.255.224

8- What service is provided by DNS?

A. Allows for data transfers between a client and a file server.


B. Uses encryption to secure the exchange of text, graphic images, sound, and video on
the web.
C. A basic set of rules for exchanging text, graphic images, sound, video, and other
multimedia files on the web.
D. Resolves domain names, such as cisco.com, into IP addresses.

9- Which layer of the TCP/IP model provides a route to forward messages through an
internetwork?

A. transport
B. application
C. network access
D. internet

10- A client packet is received by a server. The packet has a destination port number of
110. What service is the client requesting?

A. DNS
B. DHCP
C. POP3
D. SMTP
11- Refer to the exhibit. Which two network addresses can be assigned to the network
containing 10 hosts? Your answers should waste the fewest addresses, not reuse
addresses that are already assigned, and stay within the 10.18.10.0/24 range of
addresses. (Choose two.)

A. 10.18.10.224/27
B. 10.18.10.208/28
C. 10.18.10.200/27
D. 10.18.10.200/28
E. 10.18.10.224/28

12- What service is provided by POP3?

A. Uses encryption to provide secure remote access to network devices and servers.
B. Retrieves email from the server by downloading the email to the local mail application
of the client.
C. Allows remote access to network devices and servers.
D. An application that allows real-time chatting among remote users.

13- What subnet mask is needed if an IPv4 network has 40 devices that need IP
addresses and address space is not to be wasted?

A. 255.255.255.224
B. 255.255.255.128
C. 255.255.255.240
D. 255.255.255.192
E. 255.255.255.0

14- A user is attempting to access http://www.cisco.com/ without success. Which two


configuration values must be set on the host to allow this access? (Choose two.)

A. source port number


B. HTTP server
C. source MAC address
D. DNS server
E. Default gateway

15- A client packet is received by a server. The packet has a destination port number of
80. What service is the client requesting?
A. DNS
B. HTTP
C. DHCP
D. SMTP
16- A technician with a PC is using multiple applications while connected to the
Internet. How is the PC able to keep track of the data flow between multiple application
sessions and have each application receive the correct packet flows?

A. The data flow is being tracked based on the source port number that is used by each
application.
B. The data flow is being tracked based on the destination IP address that is used by the
PC of the technician.
C. The data flow is being tracked based on the source IP address that is used by the PC
of the technician.
D. The data flow is being tracked based on the destination MAC address of the technician
PC.

17- Refer to the exhibit. Match the network with the correct IP address and prefix that
will satisfy the usable host addressing requirements for each network.

A. Network B=192.168.0.0/25 A=192.168.0.128/26 C=192.168.0.192/27 D=192.168.0.224/30


B. Network A=192.168.0.0/25 B=192.168.0.128/26 C=192.168.0.192/27 D=192.168.0.224/30
C. Network A=192.168.0.0/25 B=192.168.0.128/26 D=192.168.0.192/27 C=192.168.0.224/30
D. Network D=192.168.0.0/25 B=192.168.0.128/26 C=192.168.0.192/27 A=192.168.0.224/30
E. Network A=192.168.0.0/25 D=192.168.0.128/26 C=192.168.0.192/27 B=192.168.0.224/30

18- A user sends an HTTP request to a web server on a remote network. During
encapsulation for this request, what information is added to the address field of a frame
to indicate the destination?

A. the network domain of the destination host


B. the MAC address of the default gateway
C. the IP address of the default gateway
D. the MAC address of the destination host

19- Given the Subnet mask of 255.255.240.0,how many active hosts are there?

A. 256
B. 4094
C. 100
D. 2048

20- What are two functions that are provided by the network layer? (Choose two.)
A. carrying data between processes that are running on source and destination hosts
B. directing data packets to destination hosts on other networks
C. providing dedicated end-to-end connections
D. placing data on the network medium
E. providing end devices with a unique network identifier

21- Which of the following is the correct "top down" order of the OSI model?

A. Application, presentation, session, network, transport, data link, physical


B. Application, presentation, session, transport, network, data link, physical
C. Application, session, presentation, transport, network, data link, physical
D. Application. presentation, session, network, data link, transport, physical

22- What service is provided by HTTPS?

A. Allows remote access to network devices and servers.


B. Resolves domain names, such as cisco.com, into IP addresses.
C. Uses encryption to provide secure remote access to network devices and servers.
D. Uses encryption to secure the exchange of text, graphic images, sound, and video on
the web.

23- A client packet is received by a server. The packet has a destination port number of
53. What service is the client requesting?

A. SSH
B. FTP
C. Telnet
D. DNS

24- what is the broadcast address for the network in which 192.168.242.5/20is located?

A. 192.168.251.251
B. 192.168.250.250
C. 192.168.255.255
D. 192.168.254.255

25- Three bank employees are using the corporate network. The first employee uses a
web browser to view a company web page in order to read some announcements. The
second employee accesses the corporate database to perform some financial
transactions. The third employee participates in an important live audio conference with
other corporate managers in branch offices. If QoS is implemented on this network,
what will be the priorities from highest to lowest of the different data types?

A. financial transactions, web page, audio conference


B. financial transactions, audio conference, web page
C. audio conference, financial transactions, web page
D. audio conference, web page, financial transactions

26- Which value, that is contained in an IPv4 header field, is decremented by each router
that receives a packet?

A. Differentiated Services
B. Fragment Offset
C. Header Length
D. Time-to-Live

27- A wired laser printer is attached to a home computer. That printer has been shared
so that other computers on the home network can also use the printer. What networking
model is in use?

A. point-to-point
B. client-based
C. peer-to-peer (P2P)
D. master-slave

28- A client packet is received by a server. The packet has a destination port number of
67. What service is the client requesting?

A. Telnet
B. FTP
C. SSH
D. DHCP

29- What service is provided by HTTP?

A. An application that allows real-time chatting among remote users.


B. Uses encryption to secure the exchange of text, graphic images, sound, and video on
the web.
C. Allows for data transfers between a client and a file server.
D. A basic set of rules for exchanging text, graphic images, sound, video, and other
multimedia files on the web.

30- Which subnet would include the address 192.168.1.96 as a usable host address?
A. 192.168.1.32/27
B. 192.168.1.32/28
C. 192.168.1.64/29
D. 192.168.1.64/26

1-For the Digital data (01001101), sketch the Graph for Manchester Encoding

0 1 0 0 1 1 0 1

2- what are the advantages of Ring topology Networks?

Ring networks offer high performance for a small number of workstations or for larger
networks where each station has a similar workload.
Ring networks can span longer distances than other types of networks.
Ring networks are easily extendable.
Unlike Bus topology, there is no signal loss in Ring topology because the tokens are
data packets that are re-generated at each node.

4- Given FOUR differences only Switch and Router?

Switch Router
The main objective of a Switch is to connect The primary objective of a Router is to
several devices in a network. connect multiple networks.
Switches work at the Data Link Layer. Routers work at the Network Layer.

Switch is used only in LAN. Router is used in LAN and MAN.

Switching can be of three types: circuit There are two forms of


switching, packet switching, and message routing: adaptive and non-adaptive.
switching.
6- What are the differences between Single-Mode and Multi-mode optical fiber?
Single-Mode Multi-Mode
Small glass core:8-10 microns Larger core:50 + microns, can be glass or
plastic
Less dispersion of light Greater dispersion (loss of light)
Longer distance: Up to about 100 km Shorter distance: Up to 2 km
Uses lasers as light source Uses LEDs as light source on shorter runs

7- What are advantages of static routing over dynamic routing?

Static routing is more secure because it does not advertise over the network.
Static routing uses fewer router resources than dynamic routing.

8- what are the Three Methods of Switching that are used by the Switch?
Store and Forward
Cut and Through
Fragment Free

9- what are the differences between the applications that uses TCP and UDP?
TCP UDP
Web browsers, E-mail, File transfers Domain Name System (DNS), Video
streaming, Voice over IP (VoIP)

You might also like