CT043 3 1 IN Questions Freshv11209
CT043 3 1 IN Questions Freshv11209
CLO1: Explain the fundamental principles of current network operation including the
standards and protocols used in data communication. (C2, PLO1)
1. When the computers and printers are connected with the server through some resources for the
purpose of communication is termed as?
a. Network
b. Supercomputer
c. Mainframe Computer
d. Client
2. Two PCs are configured in a network with the IP addresses of 202.11.10.6 and 192.16.20.4
respectively. The PC is able to communicate with ____________.
a. Hub
b. Router
c. Switch
d. Bridge
a. MAC address
b. URL
c. IP address
d. https
a. 174.16.1.1
b. 192.168.1.0
c. 255.255.0.0
d. 255.255.255.0
a. Star
b. Ring
c. Mesh
d. Hybrid
6. Refer to the exhibit. Which of the command is run In Router R1 that display the following
result?
a. show ip route
b. show ip interface
c. show running-config
d. show ip interface brief
7. You have two Cisco routers setup back-to-back in a lab using DTE/DCE cables. To which router
would you add the clock rate command?
8. Identify the device that helps prevent bottleneck and data collisions __________________.
a. Switch
b. Router
c. Gateway
d. Proxy Server
9. Which network device is used to transmit the Frames from one LAN to another LAN?
a. Router
b. Bridge
c. Repeater
d. Modem
10. _________________ is the computer operating system utility command that allows a user to
manually query the DNS servers configured on the device to resolve a given hostname.
a. ping
b. show ip route
c. ipconfig
d. nslookup
11. Consider the given figure and identify the type of network.
12. When you want to interact with network for the purpose of communication such as Facebook,
Twitter etc. Then you will start your communication with ________________ layer.
a. Presentation Layer
b. Application Layer
c. Network Layer
d. Transport Layer
13. State the process in which the communication takes place in one direction.
a. Half-duplex
b. Simplex
c. Duplex
d. Multiplex
14. Which of the following in the OSI layer merged with the application layer of the TCP/IP model?
15. The following processes are carried out by the Datalink layer except _____________.
a. Framing
b. Error Control
c. Flow Control
d. Channel Coding
16. Errors are common in a network when the Frames are sent and received that cannot be viewed
by human eyes nor resolved by any human. This error cannot be neglected and detected by
____________ layer of the OSI model.
a. Network Layer
b. Transport Layer
c. Data link Layer
d. Physical Layer
17. Mr. A is interacting with a server in a LAN and he is trying to download an account statement of
the previous year for auditing purposes. Which protocol will help him to download the statement
from the server?
a. HTTP
b. HTTPS
c. FTP
d. SMTP
18. Which protocol is used when the user communication with Facebook server?
a. FTP
b. SMTP
c. HTTPS
d. HTTP
19. Which protocol will send a message to routers if a network outage or bottleneck occurs?
a. ARP
b. TCP
c. IP
d. ICMP
20. ____________ message is sent to the source when the router cannot route the datagram and
the datagram is discarded.
a. Destination Unavailable
b. Destination Unverified
c. Destination Unreachable
d. Destination no-entry
21. Email server such as Gmail, Yahoo mail etc, receives and store huge amount of email every day
in a server and sometimes these emails were retrieved from the email server that is done by
____________ protocol.
a. SMTP
b. SNMP
c. POP3
d. IMAP
22. SMTP protocol is used to send an email from source to destination. Which of the Transport layer
protocol support SMTP?
a. UDP
b. TCP
c. POP3
d. DHCP
23. One of the Routers Ethernet port was assigned an IP address of 194.168.10.2/25, what would be
the valid subnet address of this host?
a. 192.168.10.0
b. 172.11.0.0
c. 194.168.10.0
d. 194.168.10.255
24. You need to come up with a TCP/IP addressing scheme for your company. How many network
IDs must you allow for when you define the subnet mask for the network?
a. One for each WAN link and one for each subnet
b. One for each router interface
c. One for each NIC installed in each client
d. One for each subnet with hosts
25. What is the subnet mask value for 500 subnets when the given IP is 175.16.2.5?
a. 255.255.255.128
b. 255,255.254.0
c. 255.255.128.0
d. 255.255.255.192
26. Refer to the exhibit. PC 1 is connected with R1 fa0/0 where PC 1 is in subnet 1 and PC2 is
connected with R2 fa0/0 and in subnet 2. If PC 1 is in subnet 1 then identify the broadcast IP
address of subnet 1 for the given IP address 192.168.10.0/26.
a. 192.168.10.255
b. 192.168.10.11
c. 192.168.10.63
d. 192.168.10.0
27. A network topology which connects the bi-directional links whereby the link gets synchronize if
anyone link is failed.
a. Star topology
b. Bus topology
c. Mesh Topology
d. Ring Topology
28. Identify the subnet mask value for the given IP 10.0.0.15/13.
a. 255.128.0.0
b. 255.248.0.0
c. 255.192.0.0
d. 255.255.224.0
29. A technician with a PC is using multiple applications while connected to the Internet. How
the PC is able to keep track of the data flow between multiple application sessions and have
each application receive the correct packet flows?
a. The data flow is being tracked based on the source port number that is used by each
application
b. The data flow is being tracked based on the destination MAC address of the technician
PC
c. The data flow is being tracked based on the source IP address that is used by the PC of
the technician
d. The data flow is being tracked based on the destination IP address that is used by the PC
of the
30. What is the CIDR value for 16 subnets when the given IP is 10.0.40.103?
a. 13
b. 14
c. 12
d. 25
31. IP addresses and MAC addresses are very important for data communication. Discuss
how IP addresses and MAC addresses are different from each other (Any Five points).
(5 Marks)
32. Assuming you are using a Class C IP address (195.16.1.0) and you need to create the
following numbers of subnets for your network plan (as per stated in item a to below).
For each of the numbers of required subnets below, provide how many bits would you
borrow as subnet bits and what would be the subnet mask? (5 Marks)
1) 5 subnets
2) 3 subnets
3) 8 subnets
4) 10 subnets
5) 25 subnets
33. Refer to the exhibit below. Identify the Network ID and subnet mask for the following
subnets. Given the IP address is 10.11.48.0/24. [10 Marks]
END OF QUESTIONS