Network exam 1
12. The screen shot below must be a partial view of ________. A. a host's ARP table B. a router's routing table C. a DNS table D. a host's routing table E. a switch's switch table
ANS: A
Chapter 2 1. The standard ________ broadly depicts necessary functions of computer networking in terms of a layer structure. A. topology B. architecture C. platform D. reference E. protocol
ANS: B
10. The campus network is a type of ________. A. local area network B. metropolitan area network C. personal area network D. wide area network E. wireless network
ANS: A
24. Which PDU type generally has a header and a trailer? A. Data B. Segment C. Packet D. Frame E. Bit
ANS: D
5. Which may NOT be an advanced router function? A. ACL for packet filtering B. Network address translation between private and public IPs C. Provision of dynamic IPs to requesting stations using DHCP D. Intrusion detection and prevention E. Automatic assignment of an IP address to the router port (interface)
ANS: E
7. The throughput of a network A. represents the speed guaranteed by a service provider. B. describes the strength of a signal. C. is interchangeably used with rated speed. D. represents the maximum capacity of its cabling. E. represents its actual speed.
ANS: E
Connects end devices to intermediary devices
Access link
actual data rate that can be pushed through a switch at any moment
Aggregate throughput
Hybrid Layer 5 Name & PDU
Application & Data
Switch type where all ports use different delivery speed
Asymmetric
Wireless Access Points are a type of
Bridge
Hybrid Layer 2 Name & PDU
Data link & Frame
Combined data rate of all ports in a switch
Forwarding rate
Hybrid Layer 3 Name & PDU
Internet & Packet
What makes a switch managed
It has an OS
What layer are hubs?
Layer 1
What layers are bridges
Layer 2
What layer are switches?
Layer 2, sometimes 3
What layer are Routers
Layer 3
Hybrid Layer 1 Name & PDU
Phsyical & No PDU
Number of ports available on a switch
Port density
Hybrid Layer 4 Name & PDU
Transport & Segment Datagram
Connects intermediary devices
Trunk links
Maximum rate speed of a switch port
Wired speed
When the aggregate throughput of a switch can match its forwarding rate the switch is
non-blocking
Switch type where all ports use the same delivery speed
symmetric
13. Which is TRUE regarding the MAC address? A. It is a permanent address. B. It is stored in a computer's RAM in eight hex digits. C. It is dynamically provided by a designated server to requesting stations. D. It is determined by a computer's operating system. E. Two computers can own the same MAC address.
ANS: A
15. A switch has eight gigabit LAN ports. What is its wire speed and forwarding rate? Also, what aggregate throughput is needed to give the switch 80% nonblocking capacity? A. 1 Gbps, 8 Gbps, 6.4 Gbps B. 1 Gbps, 1 Gbps, 8 Gbps C. 1 Gbps, 16 Gbps, 1.6 Gbps D. 2 Gbps, 16 Gbps, 6.4 Gbps E. 2 Gbps, 8 Gbps, 8 Gbps
ANS: A
16. Which is a legitimate MAC address? A. ab-01-cd-ef-23-45 B. ab-01-cd-ef-23-4 C. ab-01-cd-ef-23 D. ab-01-cd-ef-2 E. ab-01-cd-ef
ANS: A
2. When a host station's NIC is connected to a hub, the link should use ________ transmission. A. half duplex B. full duplex C. partial duplex D. simplex E. partial simplex
ANS: A
21. 21. When the command "C:\ping www.yahoo.com" is issued by a client PC, the two hosts (the PC and Yahoo web server) communicate based on ________ protocol in the internet layer: A. ICMP (Internet Control Message Protocol) B. UDP (User Datagram Protocol) C. ARP (Address Resolution Protocol) D. HTTP (Hypertext Transfer Protocol) E. SNMP (Simple Network Management Protocol)
ANS: A
3. An email message goes through encapsulations in the sequence of ________ before it is released to the network. A. segment-packet-frame B. segment-frame-packet C. frame-segment-packet D. packet-segment-packet E. packet-frame-segment
ANS: A
6. The organizationally unique identifier (OUI) is an element of ________. A. MAC addresses B. public addresses C. IP addresses D. global addresses E. local addresses
ANS: A
8. Messages (or data) are produced and exchanged according to meticulously defined rules of communication. These rules are implemented in ________. A. protocols B. messages C. network links D. applications E. data
ANS: A
9. Which is NOT accurate in terms of layer functions? A. Application layer—to establish sessions (or handshaking) B. Transport layer—to provide message (or data) integrity C. Internet layer—to execute packet routing D. Data link layer—to conduct frame switching E. Physical layer—for actual transportation of frames in signals
ANS: A
20-21: A system administrator issued a command to a network node, and it displayed summary information as shown below. Interface IP Address MAC Address Fa 0/0 192.168.2.10/24 0001.34AB.1234 Fa 0/1 <not set> 0001.3464.A23C Fa 0/2 <not set> 0001.3486.B18A Serial 0/0 192.168.5.10/24 0001.3412.B23A Serial 0/1 <not set> 20. What kind of network node should it be? A. router B. switch C. bridge D. hub E. server 21. Which entry must be an INCORRECT one? A. FastEthernet 0/0 B. 192.168.2.10/24 C. 0001.3464.A23C D. 0001.3412.B23A E. Serial 0/1
ANS: A,D
10. The media access protocol, CSMA/CD, is activated by the host station when it is connected to a ________. A. switch B. hub C. bridge D. either a switch or a hub E. router
ANS: B
11. A switch has eight gigabit LAN ports. What aggregate throughput is needed to give the switch 100% nonblocking capacity? A. 6.4 Gbps B. 8.0 Gbps C. 8.4 Gbps D. 4.0 Gbps E. 3.2 Gbps
ANS: B
11. What is the binary correspondence of hex digits "B301"? A. 1110001100000001 B. 1011001100000001 C. 1001001100010001 D. 1011001100101001 E. 1011001100100101
ANS: B
14. The TTL value in the IP packet's header indicates the maximum number of ________ a packet can go through before reaching the destination: A. switches B. routers C. hosts D. networks E. circuits
ANS: B
15. At the command prompt, "C:Ä>netstat-n" can be issued to A. check available host stations within a network. B. list sockets in TCP sessions. C. check the subnetwork address of a host. D. find the DNS server address of a host. E. locate the DHCP server address of a host.
ANS: B
15. When the nearby laptop, wireless mouse and keyboard, smart phone, and digital camera exchange data, a ________ standard is used: A. WAN (wide area network) B. PAN (personal area network) C. NFC (near-field communication) D. LAN (local area network) E. MAN (metropolitan area network)
ANS: B
17. The difference between asymmetric and symmetric switches is judged by ________. A. accessibility to the operating system B. available port speeds C. number of ports D. expandability of port density E. operational layers (e.g., layer 2 vs. layer 3)
ANS: B
18. Network nodes include ________. A. intra-networking and inter-networking devices B. intermediary devices and end stations C. intermediary devices and network links D. intermediary devices and networking devices E. end devices and network links
ANS: B
18. The ________ restricts frame delivery between two host stations to a single path? A. modem B. switch C. router D. layer 3 switch E. CSU/DSU
ANS: B
22. The three main sources of network latency (or delay) include A. propagation delay, delay at hosts, and delay of server processing. B. propagation delay, delay at hosts, and delay at intermediary devices. C. delay at intermediary devices, delay at hosts, and delay of client processing. D. delay of application processing, propagation delay, and delay at hosts. E. delay of server processing, delay at intermediary devices, and delay at hosts.
ANS: B
3. Which topology is used widely when network redundancy is important to prepare for node or link failures? A. point-to-point B. partial mesh C. star D. bus E. hub-and-spoke
ANS: B
4. Which two layer functions are generally built into an operating system such as Windows and Linux? A. Physical and transport layers B. Transport and internet layers C. Internet and data link layers D. Physical and internet layers E. Transport and data link layers
ANS: B
7. The TCP port is used to A. prioritize a service request. B. forward a service request/response to a specific application. C. identify a sender's IP address. D. translate a domain name into an IP address. E. identify a sender's MAC address.
ANS: B
9. When switching and routing are compared: A. Both switching and routing are data link layer concepts. B. Networks relying on switching can be more vulnerable to a single point of failure than those relying on routing. C. Both switching and routing are internet layer concepts. D. Switching is connectionless (no predetermined delivery path between two hosts), but routing is connection-oriented in forwarding user data. E. Both switching and routing presume availability of multiple active delivery paths between two hosts.
ANS: B
10. Which layer function(s) is/are implemented in the NIC? A. Physical layer only B. Data link layer only C. Physical layer and data link layer D. Physical layer, data link layer, and internet layer E. Physical layer, data link layer, internet layer, and transport layer
ANS: C
16. Choose the CORRECT statement. A. A standard protocol should define either semantics or syntax, but not both. B. The term "standard" is used interchangeably with "architecture." C. The semantics of a protocol is about how to interpret PDUs exchanged. D. A reliable protocol detects transmission errors, but it does not correct them. E. All standard protocols of the application layer are reliable protocols.
ANS: C
16. Cut-through switching is when A. all switch ports use the same wire speed. B. switch ports have different wire speeds. C. the switch forwards a frame without waiting for its arrival in its entirety. D. there is no switch learning or aging. E. switch ports have different throughputs.
ANS: C
17. Assume that an email should cross three subnetworks for its delivery to a destination host. How many different packets are produced along the way? A. 0 B. 1 C. 2 D. 3 E. 4
ANS: C
17. Switches within a network are interconnected by ________. A. access links B. peer-to-peer links C. trunk links D. channel links E. internet links
ANS: C
19. If a host computer develops a TCP segment with 80 as the source port and 54399 as the destination port, the host is most likely a(n) ________. A. client PC B. DHCP server C. web server D. email server E. DNS server
ANS: C
19. Which is NOT NECESSARILY an accurate description of the intermediary device? A. It has at least one built-in network card. B. It also becomes a network node. C. It always operates in the full-duplex mode. D. It relies on network addressing to exchange data. E. It operates for either intra-networking or inter-networking.
ANS: C
21. There are many websites that offer audio or video streaming of TV programs and movies over the Internet. These services generally rely on the ________ technology. A. unicasting B. anycasting C. multicasting D. broadcasting E. dualcasting
ANS: C
22. The end-to-end error control and flow control are performed in the ______ layer. A. application B. internet C. transport D. data link E. session
ANS: C
24. The following message is produced by the web browser according to the ________. "GET/HTTP/1.1 Host: www.google.com" A. semantic rule B. lexicon rule C. syntactic rule D. message rule E. link rule
ANS: C
25. How many collision domains do you see in the figure? A. 2 B. 3 C. 4 D. 5 E. 6
ANS: C
25. When the command tracert www.gmail.com is issued, at least two protocols are used to obtain information shown in the screenshot. What are they? A. DHCP and UDP B. HTTP and DHCP C. DNS and ICMP D. DNS and HTTP E. ARP and HTTP
ANS: C
3. Which is correctly pairing an intermediary device with its standard layer? A. hub: layer 2 device B. switch: layer 3 device C. bridge: layer 2 device D. router: layer 2 device E. repeater: layer 2 device
ANS: C
4. What protocol is used to find the MAC address of a computer based on its IP address? A. HTTP (Hypertext Transfer Protocol) B. TCP (Transmission Control Protocol) C. ARP (Address Resolution Protocol) D. IP (Internet Protocol) E. CSMA/CD Protocol
ANS: C
5. The socket is/represents. A. a group of applications providing similar services. B. used to indicate a range of available ports on a server. C. the combination of an IP address and a port number. D. the combination of an IP address and an application layer protocol. E. the combination of an IP address and a session identification.
ANS: C
7. Choose a CORRECT statement about the switch. A. The switch cannot be assigned an IP address. B. The switch is also known as a multiport repeater. C. The switch port mostly operates in the full-duplex mode. D. The risk of frame collisions gets higher as the number of hosts attached to a switch increases. E. CSMA/CD is used to avoid frame collisions when a network is running on switches.
ANS: C
8. The ________ bit in the TCP header is used to request handshaking. A. FIN B. ACK C. SYN D. CON E. SEQ
ANS: C
9. Choose an INCORRECT statement regarding the network link. A. Copper wires and optical fibers are popular wired media these days. B. Network links are divided into access and trunk links. C. Creating a computer network needs to have at least one trunk link. D. The access link provides connectivity between a host and an intermediary device. E. The trunk link interconnects intermediary devices.
ANS: C
Chapter 3 1. If the wireless access point connects two different LAN standards, generally Ethernet and WiFi, then it must be a type of ________. A. router B. hub C. bridge D. gateway E. switch
ANS: C
Chapter1 1. The ________ represents the layout of network nodes and links. A. network node B. network domain C. network topology D. network architecture E. network blueprint
ANS: C
12. Port numbers have to be included in the header of ________. A. packets only B. datagrams only C. segments only D. segments and datagrams E. packets, segments, and datagrams
ANS: D
13. Which protocol uses broadcasting? A. Simple mail transfer protocol (SMTP) B. Hypertext transfer protocol (HTTP) C. Transmission control protocol (TCP) D. Address resolution protocol (ARP) E. Internet control message protocol (ICMP)
ANS: D
14. Which three terms are used interchangeably as metrics of network performance? A. channel capacity, bandwidth, throughput B. channel capacity, throughput, flow C. reliability, accuracy, availability D. channel capacity, bandwidth, rated speed E. reliability, accuracy, latency
ANS: D
18. The IP packet is encapsulated within the ________ to travel to the destination node. A. application message B. TCP segment C. UDP datagram D. frame E. ICMP packet
ANS: D
20. Choose the CORRECT statement on port numbers. A. For a Windows host, 55953 becomes a well-known port number. B. Port numbers are divided into well-known and unknown ones. C. If a Linux machine sends a TCP segment with source port 45780 and destination port 7200, then the host must be an email server. D. Well-known port numbers are generally assigned to server applications. E. Well-known port numbers are also called ephemeral port numbers.
ANS: D
20. Which is a right sequence of data rate metrics from the smallest to the largest? A. Kbps—Mbps—Pbps—Gbps—Tbps B. Tbps—Pbps—Kbps—Mbps—Gbps C. Kbps—Gbps—Mbps—Tbps—Pbps D. Kbps—Mbps—Gbps—Tbps—Pbps E. Kbps—Mbps—Gbps—Pbps—Tbps
ANS: D
22. Choose a CORRECT statement about the operating system of an intermediary device. A. Hubs and repeaters need an OS to function. B. The switch's OS does not allow modification of its port security. C. The router's OS is about the same size as Windows or Linux developed for personal computers. D. The router's OS is generally stored in the nonvolatile flash memory. E. When the router is powered on, the OS stored in its hard disk drive is copied into the RAM.
ANS: D
23. Imagine a 50% nonblocking Ethernet switch with 24 ports, each port with a speed of 100 Mbps. What can be the switch's aggregate throughput? A. 24 ports B. 100 Mbps C. 200 Mbps D. 1200 Mbps E. 2400 Mbps
ANS: D
23. The primary dimensions of network performance include ________. A. delay, cost, and reliability B. capacity, reliability, and accessibility C. capacity, reliability, and cost D. delay, capacity, and reliability E. reliability, delay, and accessibility
ANS: D
24. How does the layer 3 switch differ from the layer 2 switch? A. The layer 3 switch has more ports than the layer 2 switch. B. The layer 3 switch has more throughput than the layer 2 switch. C. The layer 3 switch has better network management capability than the layer 2 switch. D. The layer 3 switch port can be either a switch port or a router port. E. The layer 3 switch port has higher security than the layer 2 switch port.
ANS: D
25. Which statement CORRECTLY describes network topology? A. Tree: All network nodes are either a hub or a spoke. B. Bus: All network nodes are directly connected. C. Hierarchy: Host stations are linked to a main transmission line. D. Star: All locations connect to a central site, and thus the network is susceptible to a single point of failure. E. Full mesh: It is a cost-effective approach in creating a highly reliable network with redundancy.
ANS: D
5. Which is an access link? A. router-router link B. switch-switch link C. switch-router link D. web server-switch link E. hub-switch link
ANS: D
6. Which of these may be an adequate naming of a router's WAN port? A. FastEthernet0/0 B. Console port C. Auxiliary port D. Serial0/0 E. Fiber0/1
ANS: D
6. Which statement is true? A. IP is a connection-oriented protocol. B. UDP is a reliable protocol. C. IP is a reliable protocol. D. TCP is a reliable protocol. E. E TCP is a connectionless protocol.
ANS: D
8. Which intermediary device defines the boundary of a broadcast domain? A. switch B. repeater C. hub D. router E. modem
ANS: D
11. ________ most likely depend(s) on UDP in the transport layer. A. Emails B. Internet surfing with a web browser C. Online credit card authorization for Internet shopping D. File transfer using FTP E. Three-way video conferencing over the Internet
ANS: E
12. Select an ACCURATE statement on network addressing. A. MAC addresses of a university's PCs are the same in their first six hex digits. B. The primary usage of the MAC address is for inter-networking. C. The IPv4 address is longer in its length than the MAC address. D. An IP address should be permanently assigned to a host station. E. A host station should have an MAC and an IP address for networking.
ANS: E
13. TCP and UDP are compared. Which is CORRECT? Protocol TCP UDP A. Defined layer Transport Internet B. Require handshaking Yes Yes C. Require acknowledgment Yes Yes D. Burden on communicating hosts Low Low E. Burden on the network High Low
ANS: E
14. The router uses ARP ________. A. to notify its presence when it becomes active B. to notify that it will become inactive soon C. every time it forwards an IP packet to a host (e.g., web server) D. whenever it has to broadcast an IP packet E. when it needs to forward an IP packet to another router whose MAC address is not available
ANS: E
19. Imagine a hypothetical network on which a wireless bridge with two ports (say 0 and 1) connects two hubs (Hub A to port 0 and Hub B to port 1). The connectivity of five host computers to the bridge ports is summarized below. Remember that the MAC addresses are in hexadecimal. End Stations MAC Address Port 1 1100.0000.1111 0 2 1100.0000.2222 0 3 1100.0000.3333 0 4 1100.0000.4444 1 5 1100.0000.5555 1 Which entry in the Filter or Forward column of the bridge table is CORRECT? Source MAC Address Destination MAC Address Filter or Forward 1100.0000.1111 1100.0000.2222 (A) Forward 1100.0000.1111 1100.0000.4444 (B) Filter 1100.0000.5555 1100.0000.4444 (C) Forward 1100.0000.3333 FFFF.FFFF.FFFF (D) Filter 1100.0000.2222 1100.0000.4444 (E) Forward
ANS: E
2. All layers of a standard architecture have their own PDU, except the ________ layer. A. application B. transport C. internet D. data link E. physical
ANS: E
2. Choose an ACCURATE statement regarding the relationship between hosts, intermediary devices, and network nodes. A. Hosts are intermediary devices. B. Hosts are also called networking devices. C. Intermediary devices include network nodes and hosts. D. An intermediary device is either a network node or a host. E. Network nodes include intermediary devices and hosts.
ANS: E
23. Choose a mismatch between a standard and its corresponding layer. A. ICMP = internet layer B. Ethernet = data link layer C. Digital signaling = physical layer D. DNS = application layer E. DHCP = internet layer
ANS: E
4. Star topology is also known as A. ring B. partial mesh C. full mesh D. bus E. hub-and-spoke
ANS: E