0% found this document useful (0 votes)
17 views29 pages

CS Model Question Paper

The document consists of a series of questions and answers related to networking concepts, specifically focusing on firewalls, IP addressing, routing, and network devices. Key topics include the functions of firewalls, subnetting, commands for configuring Cisco routers, and the roles of various network devices. It serves as a quiz or study guide for individuals preparing for networking certifications or exams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views29 pages

CS Model Question Paper

The document consists of a series of questions and answers related to networking concepts, specifically focusing on firewalls, IP addressing, routing, and network devices. Key topics include the functions of firewalls, subnetting, commands for configuring Cisco routers, and the roles of various network devices. It serves as a quiz or study guide for individuals preparing for networking certifications or exams.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

1. What is the primary function of a firewall in a network?

- A) Connects multiple networks together

- B) Provides wireless connectivity to network devices

- C) Controls access to and from a network based on predetermined security rules

- D) Routes data packets between different networks

- **Answer: C) Controls access to and from a network based on predetermined security rules**

2. What is the subnet mask for a Class C network with 8 subnets?

- A) /28

- B) /29

- C) /27

- D) /26

- **Answer: A) /28**

3. What is the purpose of assigning IP addresses to interfaces on a Cisco router?

- A) To establish a secure connection to the router

- B) To configure routing protocols

- C) To identify the router on the network

- D) To manage the router remotely

- **Answer: C) To identify the router on the network**

4. Which of the following is the correct syntax for adding a static route in Cisco IOS using the ip route
command?

- A) ip route add <destination_network> <subnet_mask> <next_hop_ip>

- B) ip route <destination_network> <next_hop_ip>


- C) route add <destination_network> <subnet_mask> <next_hop_ip>

- D) ip route <destination_network> <subnet_mask> <next_hop_ip>

- **Answer: D) ip route <destination_network> <subnet_mask> <next_hop_ip>**

5. Which command is used to enter global configuration mode on a Cisco router?

- A) configure terminal

- B) interface

- C) enable

- D) exit

- **Answer: A) configure terminal**

6. Which command is used to create a numbered standard access control list (ACL) with sequence
number 10 permitting traffic from source IP address 192.168.1.0?

- A) ip access-list standard 10 permit 192.168.1.0

- B) access-list standard 10 permit 192.168.1.0

- C) access-list permit 10 192.168.1.0

- D) access-list 10 permit 192.168.1.0

- **Answer: D) access-list 10 permit 192.168.1.0**

7. What is the purpose of ARP (Address Resolution Protocol)?

- A) To route packets between networks

- B) To encrypt data transmissions

- C) To discover the MAC address of a device on the local network

- D) To translate domain names to IP addresses

- **Answer: C) To discover the MAC address of a device on the local network**


8. What is the purpose of the subnet mask in an IP address configuration?

- A) To determine the default gateway

- B) To establish a secure connection

- C) To identify the network portion of the IP address

- D) To identify the host portion of the IP address

- **Answer: C) To identify the network portion of the IP address**

9. What command is used to enable an interface on a Cisco router?

- A) start interface

- B) activate interface

- C) no shutdown

- D) enable interface

- **Answer: C) no shutdown**

10. What is the maximum number of IP addresses available in a single IPv4 Class C network?

- A) 512

- B) 1024

- C) 256

- D) 2048

- **Answer: C) 256**

11. Which of the following IP address ranges is reserved for private networks according to RFC 1918?

- A) 172.16.0.0 - 172.31.255.255

- B) 10.0.0.0 - 10.255.255.255

- C) 192.168.0.0 - 192.168.255.255
- D) All of the above

- **Answer: D) All of the above**

12. Which command is used to remove a static route in Cisco IOS?

- A) ip route delete <destination_network>

- B) remove ip route <destination_network>

- C) delete ip route <destination_network>

- D) no ip route <destination_network>

- **Answer: D) no ip route <destination_network>**

13. What is the purpose of subnetting in IP networking?

- A) Preventing IP conflicts

- B) Increasing the number of available IP addresses

- C) Improving network performance

- D) Dividing a large network into smaller, manageable sub-networks

- **Answer: D) Dividing a large network into smaller, manageable sub-networks**

14. What is the IP address used to communicate with devices outside of the local network, often
provided by an ISP?

- A) Dynamic IP address

- B) Public IP address

- C) Private IP address

- D) Static IP address

- **Answer: B) Public IP address**

15. Which command is used to assign an IP address to a Serial interface on a Cisco router?
- A) assign ip

- B) config ip

- C) interface ip

- D) ip address

- **Answer: D) ip address**

16. What is the purpose of the "shutdown" command when configured on a router interface?

- A) To restart the interface

- B) To enable the interface

- C) To reset the interface configuration

- D) To disable the interface

- **Answer: D) To disable the interface**

17. What is the purpose of a MAC address in networking?

- A) To route packets between different networks

- B) To determine the IP address of a device

- C) To encrypt data transmissions

- D) To uniquely identify a device on a local network

- **Answer: D) To uniquely identify a device on a local network**

18. What command is used to remove an IP address from an interface on a Cisco router?

- A) delete ip address

- B) clear ip address

- C) remove ip address

- D) no ip address
- **Answer: D) no ip address**

19. What is the purpose of penetration testing in cybersecurity?

- A) Analyzing user behavior

- B) Protecting against malware

- C) Identifying vulnerabilities in systems and networks

- D) Monitoring network traffic

- **Answer: C) Identifying vulnerabilities in systems and networks**

20. What is the network address of the third subnet in a Class C network with a /28 subnet mask?

A) 192.168.1.16

B) 192.168.1.0

C) 192.168.1.32

D) 192.168.1.48

Answer: C) 192.168.1.32

Which of the following is NOT a valid IP address class?

A) Class A

B) Class B

C) Class C

D) Class D

Answer: D) Class D

In IPv4, how many bits are used to represent an IP address?


A) 32 bits

B) 64 bits

C) 128 bits

D) 256 bits

Answer: A) 32 bits

What is the maximum number of IP addresses available in a single IPv4 Class C network?

A) 256

B) 512

C) 1024

D) 2048

Answer: A) 256

What is the loopback IP address in IPv4?

A) 127.0.0.1

B) 0.0.0.0

C) 255.255.255.255

D) 192.168.0.1

Answer: A) 127.0.0.1

What is the purpose of subnetting in IP networking?

A) Increasing the number of available IP addresses

B) Improving network performance

C) Dividing a large network into smaller, manageable sub-networks


D) Preventing IP conflicts

Answer: C) Dividing a large network into smaller, manageable sub-networks

What is the IP address used to communicate with devices outside of the local network, often provided
by an ISP?

A) Private IP address

B) Public IP address

C) Dynamic IP address

D) Static IP address

Answer: B) Public IP address

Which protocol is responsible for assigning IP addresses dynamically to devices on a network?

A) HTTP

B) DHCP

C) DNS

D) FTP

Answer: B) DHCP

Which of the following is NOT a potential endpoint security threat?

A) Insider threats

B) Phishing attacks

C) Data encryption

D) Ransomware

Answer: C) Data encryption

What is the total number of available host addresses in a Class C subnet with a /28 subnet mask?
A) 16

B) 14

C) 30

D) 32

Answer: B) 14

How many subnets can be created from a Class C network with a /27 subnet mask?

A) 2

B) 4

C) 6

D) 8

Answer: D) 8

What is the network address of the first subnet in a Class C network with a /26 subnet mask?

A) 192.168.1.0

B) 192.168.1.64

C) 192.168.1.128

D) 192.168.1.192

Answer: A) 192.168.1.0

How many bits are available for host addresses in a Class C network with a /28 subnet mask?

A) 2

B) 4

C) 6

D) 8
Answer: B) 4

What is the purpose of a modem in a network?

A) Connects multiple LANs together

B) Provides wireless access to network devices

C) Converts digital signals to analog signals for transmission over telephone lines

D) Filters and forwards data packets within a local network

Answer: C) Converts digital signals to analog signals for transmission over telephone lines

What is the purpose of a hub in a network?

A) Provides wireless access to network devices

B) Routes data packets between different networks

C) Connects multiple devices within the same local area network

D) Controls access to and from a network based on predetermined security rules

Answer: C) Connects multiple devices within the same local area network

Which network device is typically used to segment a large network into smaller, more manageable parts?

A) Router

B) Switch

C) Hub

D) Firewall

Answer: A) Router

What is the purpose of a switch in a network?

A) Connects devices within the same local area network


B) Determines the best path for data packets to travel between different networks

C) Provides wireless access to network devices

D) Filters and forwards data packets within a local network

Answer: A) Connects devices within the same local area network

Which network device operates at Layer 1 (Physical Layer) of the OSI model?

A) Router

B) Switch

C) Hub

D) Repeater

Answer: D) Repeater

Which network device operates at Layer 2 (Data Link Layer) of the OSI model?

A) Router

B) Switch

C) Hub

D) Firewall

Answer: B) Switch

What is the primary function of a router in a computer network?

A) Connects devices within the same local area network

B) Determines the best path for data packets to travel between different networks

C) Provides wireless access to network devices

D) Filters and forwards data packets within a local network

Answer: B) Determines the best path for data packets to travel between different networks
What is the purpose of a firewall in a network?

A) Connects multiple networks together

B) Controls access to and from a network based on predetermined security rules

C) Provides wireless connectivity to network devices

D) Routes data packets between different networks

Answer: B) Controls access to and from a network based on predetermined security rules

What is the purpose of a MAC address in networking?

A) To uniquely identify a device on a local network

B) To route packets between different networks

C) To determine the IP address of a device

D) To encrypt data transmissions

Answer: A) To uniquely identify a device on a local network

Which of the following is NOT considered an endpoint device?

A) Desktop computers

B) Servers

C) Smartphones

D) Routers

Answer: D) Routers

What is a common method of protecting endpoints from malware and other threats?

A) Installing antivirus software


B) Disabling firewalls

C) Enabling guest access

D) Running outdated operating systems

Answer: A) Installing antivirus software

What is the primary function of a router in a computer network?

A) Connects devices within the same local area network

B) Determines the best path for data packets to travel between different networks

C) Provides wireless access to network devices

D) Filters and forwards data packets within a local network

Answer: B) Determines the best path for data packets to travel between different networks

Which network device operates at Layer 2 (Data Link Layer) of the OSI model?

A) Router

B) Switch

C) Hub

D) Firewall

Answer: B) Switch

What is the primary function of a firewall in a network?

A) Connects multiple networks together

B) Controls access to and from a network based on predetermined security rules

C) Provides wireless connectivity to network devices

D) Routes data packets between different networks

Answer: B) Controls access to and from a network based on predetermined security rules
Which network device operates at Layer 1 (Physical Layer) of the OSI model?

A) Router

B) Switch

C) Hub

D) Repeater

Answer: D) Repeater

What is the purpose of a hub in a network?

A) Provides wireless access to network devices

B) Routes data packets between different networks

C) Connects multiple devices within the same local area network

D) Controls access to and from a network based on predetermined security rules

Answer: C) Connects multiple devices within the same local area network

Which network device is typically used to segment a large network into smaller, more manageable parts?

A) Router

B) Switch

C) Hub

D) Firewall

Answer: A) Router

What is the purpose of a switch in a network?

A) Connects devices within the same local area network

B) Determines the best path for data packets to travel between different networks
C) Provides wireless access to network devices

D) Filters and forwards data packets within a local network

Answer: A) Connects devices within the same local area network

1. What command is used to assign an IP address and subnet mask to a GigabitEthernet interface on a
Cisco router?

A) assign ip

B) ip address

C) set interface

D) configure terminal

Answer: B) ip address

2. What is the default subnet mask used when assigning a Class C IP address to an interface using the ip
address command?

A) 255.0.0.0

B) 255.255.0.0

C) 255.255.255.0

D) It varies depending on the interface type

Answer: C) 255.255.255.0

3. Which command is used to create a numbered standard access control list (ACL) with sequence
number 10 permitting traffic from source IP address 192.168.1.0?

A) access-list 10 permit 192.168.1.0

B) access-list standard 10 permit 192.168.1.0

C) ip access-list standard 10 permit 192.168.1.0

D) access-list permit 10 192.168.1.0

Answer: A) access-list 10 permit 192.168.1.0

4. How are standard ACLs typically used in a network?

A) To filter traffic based on source IP address


B) To filter traffic based on destination IP address

C) To filter traffic based on both source and destination IP addresses

D) To prioritize certain types of traffic

Answer: A) To filter traffic based on source IP address

5. What command is used to apply an access control list to an interface?

A) access-group

B) apply-access-list

C) interface access-list

D) ip access-group

Answer: D) ip access-group

6. Which command is used to enter global configuration mode on a Cisco router?

A) enable

B) configure terminal

C) interface

D) exit

Answer: B) configure terminal

7. What command is used to enable an interface on a Cisco router?

A) enable interface

B) activate interface

C) no shutdown

D) start interface

Answer: C) no shutdown

8. Which of the following commands is used to view the current settings of a Cisco router?

A) show interfaces

B) show ip interface brief


C) show ip address

D) show running-config

Answer: D) show running-config

9. What is the purpose of assigning IP addresses to interfaces on a Cisco router?

A) To identify the router on the network

B) To establish a secure connection to the router

C) To configure routing protocols

D) To manage the router remotely

Answer: A) To identify the router on the network

10. Which command is used to assign an IP address to a Serial interface on a Cisco router?

A) ip address

B) assign ip

C) interface ip

D) config ip

Answer: A) ip address

11. What command is used to remove an IP address from an interface on a Cisco router?

A) remove ip address

B) no ip address

C) delete ip address

D) clear ip address

Answer: B) no ip address

12. Which of the following commands is used to view the configuration of all interfaces on a Cisco
router?

A) show interfaces

B) show ip interface brief


C) show running-config

D) show interfaces brief

Answer: C) show running-config

13. What is the purpose of the "shutdown" command when configured on a router interface?

A) To disable the interface

B) To enable the interface

C) To restart the interface

D) To reset the interface configuration

Answer: A) To disable the interface

14. What command is used to apply an access control list to filter inbound traffic on an interface?

A) ip access-group

B) access-list in

C) access-group in

D) apply access-list

Answer: A) ip access-group

15. What is the purpose of penetration testing in cybersecurity?

A) Protecting against malware

B) Monitoring network traffic

C) Identifying vulnerabilities in systems and networks

D) Analyzing user behavior

Answer: C) Identifying vulnerabilities in systems and networks

16. What command is used to remove an ACL from an interface on a Cisco router?
A) remove access-group

B) delete access-list

C) clear access-list

D) no ip access-group

Answer: D) no ip access-group

17. In a Cisco router configuration, what is the purpose of the "interface" command?

A) To enter interface configuration mode

B) To specify the IP address of the router

C) To configure routing protocols

D) To enable interface security features

Answer: A) To enter interface configuration mode

18. What is the purpose of the "ip route" command in a Cisco router configuration?

A) To configure static routes

B) To enable dynamic routing protocols

C) To display the routing table

D) To configure the router's default gateway

Answer: A) To configure static routes

19. In a Cisco router configuration, what is the purpose of the "no shutdown" command when
configuring an interface?

A) To enable the interface

B) To disable the interface

C) To reset the interface

D) To configure the interface security settings

Answer: A) To enable the interface

20. Which of the following is the correct syntax for adding a static route in Cisco IOS using the ip route
command?
A) ip route <destination_network> <subnet_mask> <next_hop_ip>

B) ip route add <destination_network> <subnet_mask> <next_hop_ip>

C) ip route <destination_network> <next_hop_ip>

D) route add <destination_network> <subnet_mask> <next_hop_ip>

Answer: A) ip route <destination_network> <subnet_mask> <next_hop_ip>

21. n Cisco IOS, what does the next-hop IP address represent in the ip route command?

A) Destination network

B) Local interface

C) Remote router's IP address

D) Default gateway

Answer: C) Remote router's IP address

22. Which command is used to remove a static route in Cisco IOS?

A) no ip route <destination_network>

B) remove ip route <destination_network>

C) delete ip route <destination_network>

D) ip route delete <destination_network>

Answer: A) no ip route <destination_network>

23. In the command ip route 192.168.1.0 255.255.255.0 10.0.0.1, what does 192.168.1.0 represent?
A) Local interface

B) Remote network

C) Next-hop IP address

D) Subnet mask

Answer: B) Remote network

24. What is Burp Suite primarily used for?

A) Web development

B) Network monitoring

C) Web application security testing

D) Database management

Answer: C) Web application security testing

25. Which feature of Burp Suite allows for intercepting and modifying HTTP/S requests and responses?

A) Burp Repeater

B) Burp Spider

C) Burp Scanner

D) Burp Proxy

Answer: D) Burp Proxy

26. What does IP stand for in IP address?

A) Internet Protocol
B) Internal Protocol

C) Internet Provider

D) Internal Provider

Answer: A) Internet Protocol

27. Which of the following is NOT a valid IP address class?

A) Class A

B) Class B

C) Class C

D) Class D

Answer: D) Class D

28. In IPv4, how many bits are used to represent an IP address?

A) 32 bits

B) 64 bits

C) 128 bits

D) 256 bits

Answer: A) 32 bits

29. What is the maximum number of IP addresses available in a single IPv4 Class C network?

A) 256

B) 512
C) 1024

D) 2048

Answer: A) 256

30. What is the loopback IP address in IPv4?

A) 127.0.0.1

B) 0.0.0.0

C) 255.255.255.255

D) 192.168.0.1

Answer: A) 127.0.0.1

31. Which of the following IP address ranges is reserved for private networks according to RFC 1918?

A) 10.0.0.0 - 10.255.255.255

B) 172.16.0.0 - 172.31.255.255

C) 192.168.0.0 - 192.168.255.255

D) All of the above

Answer: D) All of the above

32. What is the purpose of subnetting in IP networking?

A) Increasing the number of available IP addresses

B) Improving network performance

C) Dividing a large network into smaller, manageable sub-networks


D) Preventing IP conflicts

Answer: C) Dividing a large network into smaller, manageable sub-networks

33. What is the IP address used to communicate with devices outside of the local network, often
provided by an ISP?

A) Private IP address

B) Public IP address

C) Dynamic IP address

D) Static IP address

Answer: B) Public IP address

34. Which protocol is responsible for assigning IP addresses dynamically to devices on a network?

A) HTTP

B) DHCP

C) DNS

D) FTP

Answer: B) DHCP

35. What is the purpose of the subnet mask in an IP address configuration?

A) To identify the network portion of the IP address

B) To identify the host portion of the IP address

C) To determine the default gateway

D) To establish a secure connection


Answer: A) To identify the network portion of the IP address

36. Which of the following is a valid IPv4 address?

A) 2001:db8::1

B) 192.168.256.1

C) FE80::1

D) 172.16.31.254

Answer: D) 172.16.31.254

37. How many bits are used for the network portion of an IPv4 address in Class B?

A) 8 bits

B) 16 bits

C) 24 bits

D) 32 bits

Answer: B) 16 bits

38. What is the purpose of ARP (Address Resolution Protocol)?

A) To translate domain names to IP addresses

B) To discover the MAC address of a device on the local network

C) To route packets between networks

D) To encrypt data transmissions


Answer: B) To discover the MAC address of a device on the local network

39. In CIDR notation, what does the number after the slash represent?

A) The number of available host addresses

B) The number of network bits

C) The number of subnet bits

D) The number of bits in the IP address

Answer: B) The number of network bits

40. Which protocol is used for translating domain names to IP addresses?

A) SMTP

B) DHCP

C) DNS

D) FTP

Answer: C) DNS

41. Which of the following is NOT considered an endpoint device?

A) Desktop computers

B) Servers

C) Smartphones

D) Routers

Answer: D) Routers
42. What is a common method of protecting endpoints from malware and other threats?

A) Installing antivirus software

B) Disabling firewalls

C) Enabling guest access

D) Running outdated operating systems

Answer: A) Installing antivirus software

43. Which of the following is NOT a potential endpoint security threat?

A) Insider threats

B) Phishing attacks

C) Data encryption

D) Ransomware

Answer: C) Data encryption

44. What is the total number of available host addresses in a Class C subnet with a /28 subnet mask?

a) 16

b) 14

c) 30

d) 32

Answer: b) 14

45. How many subnets can be created from a Class C network with a /27 subnet mask?
a) 2

b) 4

c) 6

d) 8

Answer: d) 8

46. What is the network address of the first subnet in a Class C network with a /26 subnet mask?

a) 192.168.1.0

b) 192.168.1.64

c) 192.168.1.128

d) 192.168.1.192

Answer: a) 192.168.1.0

47. How many bits are available for host addresses in a Class C network with a /28 subnet mask?

a) 2

b) 4

c) 6

d) 8

Answer: b) 4

48. What is the subnet mask for a Class C network with 8 subnets?

a) /26

b) /27
c) /28

d) /29

Answer: c) /28

49. How many usable host addresses are there in a Class C subnet with a /29 subnet mask?

a) 6

b) 8

c) 14

d) 30

Answer: a) 6

50. What is the network address of the third subnet in a Class C network with a /28 subnet mask?

a) 192.168.1.0

b) 192.168.1.16

c) 192.168.1.32

d) 192.168.1.48

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy