100% found this document useful (6 votes)
3K views8 pages

CT043 3 1 IN Questions Freshv11209

This document contains a marking scheme for a CLO1 exam with 30 multiple choice questions assessing students' understanding of fundamental network principles, standards, and protocols. The questions cover topics like network types, IP addressing, subnetting, network devices, the OSI model, and common network protocols. The marking scheme provides the questions, possible answer options, and identifies the correct answer for each question.

Uploaded by

james smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
3K views8 pages

CT043 3 1 IN Questions Freshv11209

This document contains a marking scheme for a CLO1 exam with 30 multiple choice questions assessing students' understanding of fundamental network principles, standards, and protocols. The questions cover topics like network types, IP addressing, subnetting, network devices, the OSI model, and common network protocols. The marking scheme provides the questions, possible answer options, and identifies the correct answer for each question.

Uploaded by

james smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

CT043-3-1-IN Marking Scheme 1

CLO1: Explain the fundamental principles of current network operation including the
standards and protocols used in data communication. (C2, PLO1)

Section A: Multiple Choice Questions: 30 Marks


This section consists of 30 questions. Each question carries 1 mark.

1. When the computers and printers are connected with the server through some resources for the
purpose of communication is termed as?

a. Network
b. Supercomputer
c. Mainframe Computer
d. Client

2. Two PCs are configured in a network with the IP addresses of 202.11.10.6 and 192.16.20.4
respectively. The PC is able to communicate with ____________.

a. Hub
b. Router
c. Switch
d. Bridge

3. In the process of communication, a Facebook client needs to know _________________ of its


Facebook server.

a. MAC address
b. URL
c. IP address
d. https

4. _______________ is the default subnet mask for class C IP network

a. 174.16.1.1
b. 192.168.1.0
c. 255.255.0.0
d. 255.255.255.0

Level 1 Asia Pacific University of Technology & Innovation 202103


CT043-3-1-IN Marking Scheme 2

5. Consider the diagram and identify the type of topology used.

a. Star
b. Ring
c. Mesh
d. Hybrid

6. Refer to the exhibit. Which of the command is run In Router R1 that display the following
result?

a. show ip route
b. show ip interface
c. show running-config
d. show ip interface brief

7. You have two Cisco routers setup back-to-back in a lab using DTE/DCE cables. To which router
would you add the clock rate command?

a. The serial port on the DCE router


b. The Ethernet port on the DTE router
c. The Ethernet port on the DCE router
d. The serial port on the DTE router

Level 1 Asia Pacific University of Technology & Innovation 202103


CT043-3-1-IN Marking Scheme 3

8. Identify the device that helps prevent bottleneck and data collisions __________________.

a. Switch
b. Router
c. Gateway
d. Proxy Server

9. Which network device is used to transmit the Frames from one LAN to another LAN?

a. Router
b. Bridge
c. Repeater
d. Modem

10. _________________ is the computer operating system utility command that allows a user to
manually query the DNS servers configured on the device to resolve a given hostname.

a. ping
b. show ip route
c. ipconfig
d. nslookup

11. Consider the given figure and identify the type of network.

a. Wide Area Network


b. Local Area Network
c. Metropolitan Area Network
d. Home Network

Level 1 Asia Pacific University of Technology & Innovation 202103


CT043-3-1-IN Marking Scheme 4

12. When you want to interact with network for the purpose of communication such as Facebook,
Twitter etc. Then you will start your communication with ________________ layer.

a. Presentation Layer
b. Application Layer
c. Network Layer
d. Transport Layer

13. State the process in which the communication takes place in one direction.

a. Half-duplex
b. Simplex
c. Duplex
d. Multiplex

14. Which of the following in the OSI layer merged with the application layer of the TCP/IP model?

a. Session Layer & Transport layer


b. Application Layer & Session Layer
c. Session Layer & Presentation Layer
d. Only Transport Layer

15. The following processes are carried out by the Datalink layer except _____________.

a. Framing
b. Error Control
c. Flow Control
d. Channel Coding

16. Errors are common in a network when the Frames are sent and received that cannot be viewed
by human eyes nor resolved by any human. This error cannot be neglected and detected by
____________ layer of the OSI model.

a. Network Layer
b. Transport Layer
c. Data link Layer
d. Physical Layer

17. Mr. A is interacting with a server in a LAN and he is trying to download an account statement of
the previous year for auditing purposes. Which protocol will help him to download the statement
from the server?

a. HTTP
b. HTTPS
c. FTP
d. SMTP

Level 1 Asia Pacific University of Technology & Innovation 202103


CT043-3-1-IN Marking Scheme 5

18. Which protocol is used when the user communication with Facebook server?

a. FTP
b. SMTP
c. HTTPS
d. HTTP

19. Which protocol will send a message to routers if a network outage or bottleneck occurs?

a. ARP
b. TCP
c. IP
d. ICMP

20. ____________ message is sent to the source when the router cannot route the datagram and
the datagram is discarded.

a. Destination Unavailable
b. Destination Unverified
c. Destination Unreachable
d. Destination no-entry

21. Email server such as Gmail, Yahoo mail etc, receives and store huge amount of email every day
in a server and sometimes these emails were retrieved from the email server that is done by
____________ protocol.

a. SMTP
b. SNMP
c. POP3
d. IMAP

22. SMTP protocol is used to send an email from source to destination. Which of the Transport layer
protocol support SMTP?

a. UDP
b. TCP
c. POP3
d. DHCP

23. One of the Routers Ethernet port was assigned an IP address of 194.168.10.2/25, what would be
the valid subnet address of this host?

a. 192.168.10.0
b. 172.11.0.0
c. 194.168.10.0
d. 194.168.10.255

Level 1 Asia Pacific University of Technology & Innovation 202103


CT043-3-1-IN Marking Scheme 6

24. You need to come up with a TCP/IP addressing scheme for your company. How many network
IDs must you allow for when you define the subnet mask for the network?

a. One for each WAN link and one for each subnet
b. One for each router interface
c. One for each NIC installed in each client
d. One for each subnet with hosts

25. What is the subnet mask value for 500 subnets when the given IP is 175.16.2.5?

a. 255.255.255.128
b. 255,255.254.0
c. 255.255.128.0
d. 255.255.255.192

26. Refer to the exhibit. PC 1 is connected with R1 fa0/0 where PC 1 is in subnet 1 and PC2 is
connected with R2 fa0/0 and in subnet 2. If PC 1 is in subnet 1 then identify the broadcast IP
address of subnet 1 for the given IP address 192.168.10.0/26.

a. 192.168.10.255
b. 192.168.10.11
c. 192.168.10.63
d. 192.168.10.0

27. A network topology which connects the bi-directional links whereby the link gets synchronize if
anyone link is failed.

a. Star topology
b. Bus topology
c. Mesh Topology
d. Ring Topology

Level 1 Asia Pacific University of Technology & Innovation 202103


CT043-3-1-IN Marking Scheme 7

28. Identify the subnet mask value for the given IP 10.0.0.15/13.

a. 255.128.0.0
b. 255.248.0.0
c. 255.192.0.0
d. 255.255.224.0

29. A technician with a PC is using multiple applications while connected to the Internet. How
the PC is able to keep track of the data flow between multiple application sessions and have
each application receive the correct packet flows?
a. The data flow is being tracked based on the source port number that is used by each
application
b. The data flow is being tracked based on the destination MAC address of the technician
PC
c. The data flow is being tracked based on the source IP address that is used by the PC of
the technician
d. The data flow is being tracked based on the destination IP address that is used by the PC
of the

30. What is the CIDR value for 16 subnets when the given IP is 10.0.40.103?
a. 13
b. 14
c. 12
d. 25

Level 1 Asia Pacific University of Technology & Innovation 202103


CT043-3-1-IN Marking Scheme 8

Section B: Structured Questions: 20 Marks


This section consists of 3 questions. Answer all the questions.

31. IP addresses and MAC addresses are very important for data communication. Discuss
how IP addresses and MAC addresses are different from each other (Any Five points).
(5 Marks)

32. Assuming you are using a Class C IP address (195.16.1.0) and you need to create the
following numbers of subnets for your network plan (as per stated in item a to below).
For each of the numbers of required subnets below, provide how many bits would you
borrow as subnet bits and what would be the subnet mask? (5 Marks)

1) 5 subnets

2) 3 subnets

3) 8 subnets

4) 10 subnets

5) 25 subnets

33. Refer to the exhibit below. Identify the Network ID and subnet mask for the following
subnets. Given the IP address is 10.11.48.0/24. [10 Marks]

END OF QUESTIONS

Level 1 Asia Pacific University of Technology & Innovation 202103

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy