Sunteți pe pagina 1din 14

Assiut University Faculty of Engineering Communication Departments Select the correct answer:

Final 2010. Exam Time: 3 Hours Elective Course (LAN)

10

Question What is the function of a NIC in a PC? A. A NIC connects the PC to the network media. B. A NIC checks the formatting of data before it is transmitted. C. A NIC acknowledges and retransmits data that was not received properly. D. A NIC discards frames when the destination IP address does not match the local host. At what layer of the OSI model does a MAC address reside? A. 1 B. 2 C. 3 D. 4 E. 7 In an Ethernet LAN, how does the NIC know when it can transmit data? A. An Ethernet NIC transmits data as soon as the frame is received. B. An Ethernet NIC transmits data as soon as the NIC receives a token. C. An Ethernet NIC transmits data when it senses a collision. D. An Ethernet NIC transmits data after listening for the absence of a signal on the media. On a local area network, one workstation can send data on the line while it is receiving data. What type of data transfer does this describe? A. hybrid B. half duplex C. full duplex D. multilink When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired? A. The hosts return to a listen-before-transmit mode. B. The hosts creating the collision have priority to send data. C. The hosts creating the collision retransmit the last 16 frames. D. The hosts extend their delay period to allow for rapid transmission. Where does the MAC address originate? A. DHCP server database B. configured by the administrator C. included in the creation of the processor chip D. network configuration on the computer E. burned into ROM on the NIC card If a PC does not have network connectivity to a router, which router port can be used to establish communication? A. console B. Ethernet C. serial D. VTY What is the primary function of a router? A. prevent collisions on the network LAN B. regulate flow control between sender and receiver C. provide domain name resolution D. forward packets to the appropriate interface Which of the following devices can an administrator use to segment their LAN? (Choose two) A. Hubs B. Repeaters C. Switches D. Bridges E. Media Converters Which of the following is not a metric used in dynamic routing protocols? A. Hop count B. Cost C. Reliability D. Bandwidth E. Delay F. Runs G. Load

Answer A

C, D

11

12

13

14

15

H. ticks You decide to segment a large flat network into two separate networks with a router. What will be the affect of this change? A. The number of broadcast domains will be decreased. B. It will make the broadcasting of traffic between domains more efficient between segments. C. It will increase the number of collisions. D. It will prevent segment 1's broadcasts from getting to segment 2. E. It will connect segment 1's broadcasts to segment 2. Which of the following are benefits of segmenting a network with a router? (Choose two) A. Broadcasts are not forwarded across the router. B. All broadcasts are completely eliminated. C. Adding a router to the network decreases latency. D. Filtering can occur based on Layer 3 information. E. Routers are more efficient than switches and will process the data more quickly. What is characteristic of the operation of a Layer 2 switch? A. forwards data based on logical addressing B. duplicates the electrical signal of each frame to every port C. learns the port assigned to a host by examining the destination MAC address D. uses the destination MAC address to determine the specific interface to forward a frame An administrator would like to connect ten workstations on a 192.168.0.0/24 network. The device selected by the administrator must allow connectivity between hosts without sharing bandwidth. Which device would be appropriate? A. hub B. router C. switch D. repeater Which networking devices use the MAC address to make forwarding decisions? (Choose two.) A. NIC B. bridge C. hub D. switch E. repeater

A, D

B,D

16 Refer to the Figure. Forty-eight workstations are connected to a hub. The users are able to connect to the network, but access is very slow. An entry-level technician replaces the 10 Mbps hub with 100 Mbps hub but the problem still exists. What is the most economical way to correct the problem? A. Replace the hub with a switch. B. Replace the hub with a router. C. Replace the hub with a 1 Gbps hub. D. D) Replace the hub with a 10 Mbps fiber hub. 15

Refer to the Figure. The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will receive the data when workstation A sends a unicast packet to workstation C? A. workstation C B. workstations B and C C. workstations B, C, and the E0 interface of the router

D. workstations B, C, D, E, F, and the E0 interface of the router Which devices will create multiple collision domains in an Ethernet network? (Choose two.) A. NIC B. hub C. switch D. router E. repeater A network administrator has a multi-floor LAN to monitor and maintain. Through careful monitoring, the administrator has noticed a large amount of broadcast traffic slowing the network. Which device would you use to best solve this problem? A. bridge B. hub C. router D. transceiver What will a bridge do if it receives a frame with a MAC address that is not within the table? A. discard frame B. ignore frame C. send frame to appropriate port D. send frame to all ports except source port How are binary ones and zeros represented in fiber optic installations? A. +5 volts/-5 volts B. 0 volts/5 volts C. light/no light D. high to low electrical transition E. low to high electrical transition What factors need to be considered to limit the amount of signal attenuation in Ethernet cable? (Choose two.) A. type of users B. number of users C. length of cable D. type of electrical equipment E. installation of connectors on the cable What condition is described when transmission signals from one wire pair affect another wire pair? A. noise B. resistance mismatch C. crosstalk D. attenuation A company needs to extend the LAN to six separate buildings. To limit the amount of signal attenuation on the LAN media, what type of media would be the best to use between the buildings? A. air (wireless) B. coaxial cable C. fiber D. shielded twisted pair E. unshielded twisted pair How does a router decide where the contents of a received frame should be forwarded? A. by matching destination IP addresses with networks in the routing table B. by matching the destination IP address with IP addresses listed in the ARP table C. by matching the destination MAC address with MAC addresses listed in the CAM table D. by forwarding the frame to all interfaces except the interface on which the frame was received Which device would add security to a network by not forwarding broadcasts? hub router switch bridge repeater An IP network address has been subnetted so that every subnetwork has 14 usable host IP addresses. What is the appropriate subnet mask for the newly created subnetworks? 255.255.255.128 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252

18

C,D

19

20

21

22

C,E

23

24

25

A. B. 26 C. D.

A. 27 B. C. D. E.

28 A. B. C. D.

What is the primary purpose of a routing protocol? to propagate broadcast messages to map IP addresses to MAC addresses to switch traffic to all available interfaces sharing network information between routers

29 Refer to the Figure. A student in the Cisco network class has designed a small office network to enable hosts to access the Internet. What recommendation should the teacher provide to the student in regards to the network design? A. Replace the Layer 2 switch with a hub. B. Replace the Layer 2 switch with a router. C. Replace the Layer 2 switch with a bridge. D. Replace the Layer 2 switch with a transceiver. What is the purpose of a subnet mask in a network? A. A subnet mask is not necessary when a default gateway is specified. B. A subnet mask is required only when bits are borrowed on a network. C. A subnet mask is used to determine in which subnet an IP address belongs. D. A subnet mask is used to separate the 48-bit address into the OUI and the vendor serial number.

30

31

A. 32 B. C. D. 33

Refer to the Figure. A network administrator is planning the addressing scheme for the LAN using 172.25.14.0/26. The hosts are to be assigned addresses 172.25.14.1to 172.25.14.25. The LAN interface of the router is to be configured using 172.25.14.63 as the IP address. What would describe this addressing scheme? A. The LAN is being addressed properly. B. The subnet that is being assigned is not a usable subnet address. C. The router LAN interface is being assigned a broadcast address. D. The subnet mask does not allow enough host addresses in a single subnet. How does subnetting provide some level of security in a network? The number of switches must increase. The collisions prevent the copying of data. The broadcasts are contained within a subnet. The number of host IP addresses is increased. What does the term "attenuation" mean in data communication? A. loss of signal strength as distance increases B. time for a signal to reach its destination C. leakage of signals from one cable pair to another D. strengthening of a signal by a networking device

C A

34

A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre-existing building with limited cabling space. Which type of media would best meet these requirements? A. STP B. UTP C. coaxial D. single-mode fiber E. multimode fiber

35

Refer to the figure. A newly hired technician is testing the connectivity of all hosts by issuing a ping command. The technician notices that a default gateway is not configured on all the hosts, but all hosts have connectivity between hosts, a fact which seems to confuse the technician. How would you explain the connectivity to the technician? A. The hosts are detecting the default gateway configured on the hub. B. The hosts are all in one LAN, so default gateway information is not needed. C. The hosts in the network only require that one host has a gateway configured. D. The hosts in the network would only need a gateway if a switch replaces the hub. E. The hosts are using broadcast to reach each other since no gateway is configured.

36

37

What do switches and routers use to make forwarding decisions? A. Switches and routers both use IP addresses. B. Switches and routers use both MAC and IP addresses. C. Switches use IP addresses. Routers use MAC addresses. D. Switches use MAC addresses. Routers use IP addresses. E. Switches use MAC and IP addresses. Routers use IP addresses. A company is using a Class B IP addressing scheme and expects to need as many as 100 networks. What is the correct subnet mask to use with the network configuration? A. 255.255.0.0 B. 255.255.240.0 C. 255.255.254.0 D. 255.255.255.0 E. 255.255.255.128 F. 255.255.255.192

38 Host A is connected to the LAN, but it cannot connect to the Internet. The host configuration is shown in the Figure. What are the two problems with this configuration? (Choose two.) A. The host subnet mask is incorrect. B. The host is not configured for subnetting. C. The default gateway is a network address. D. The default gateway is on a different network than the host. E. The host IP address is on a different network from the Serial interface of the router. 39

A,D

40

41

42

43

44

A. The subnet mask of host 2 is incorrect. B. Host 1 and host 2 are on different networks. C. The switch needs an IP address that is not configured. D. The router LAN interface and host 1 are on different networks. E. The IP address of host 1 is on a different network than is the LAN interface of the router. At which layer of the OSI model does the device reside that is functioning as the default gateway for hosts on a network? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 F. Layer 7 A company is planning to subnet its network for a maximum of 27 hosts. Which subnet mask would provide the needed hosts and leave the fewest unused addresses in each subnet? A. 255.255.255.0 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.248 Which type of routing allows routers to adapt to network changes? A. static routes B. dynamic routing C. only default routes D. No routing is necessary. Given a host with the IP address 172.32.65.13 and a default subnet mask, to which network does the host belong? A. 172.32.65.0 B. 172.32.65.32 C. 172.32.0.0 D. 172.32.32.0 Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to create subnets. What is the maximum number of usable hosts in each subnet? A. 6 B. 14 C. 30 D. 62

45

46

Refer to the Figure. A technician is planning an addressing scheme for a branch office as shown in the Figure. What is the status of the intended network? A. The configuration will work as planned. B. The subnet mask of host A is incorrect. C. The default gateway of host A is a network address. D. The addresses on the router LAN interfaces are on the same subnet. E. The IP address of host A is on a different subnet than the subnet that the Ethernet router interface is on. Which type of cable run is most often associated with fiber-optic cable? A. backbone cable B. horizontal cable C. patch cable

47

D. work area cable In most business LANs, which connector is used with twisted-pair networking cable? A. BNC B. RJ-11 C. RJ-45 D. Type F

48 In the graphic, Host A has reached 50% completion in sending a 1 KB Ethernet frame to Host D when Host B wishes to transmit its own frame to Host C. What must Host B do? A. Host B can transmit immediately since it is connected on its own cable segment. B. Host B must wait to receive a CSMA transmission from the hub, to signal its turn. C. Host B must send a request signal to Host A by transmitting an interframe gap. D. Host B must wait until it is certain that Host A has completed sending its frame. Which two statements are true about the role of routers in the network? (Choose two) A. They propagate broadcasts. B. They enlarge collision domains. C. They segment broadcast domains. D. Each router interface requires a separate network or subnet. What is the automated service that matches resource names with the required IP address? A. HTTP B. SSH C. FQDN D. DNS E. Telnet Which method of signal transmission uses radio waves to carry signals? A. electrical B. optical C. wireless D. acoustic Which transport layer protocol provides low overhead and would be used for applications which do not require reliable data delivery? A. TCP B. IP C. UDP D. HTTP E. DNS What is the feature of the User Datagram Protocol (UDP)? A. flow control B. connectionless C. connection-oriented D. sequence and acknowledgements Which two features allow TCP to reliably and accurately track the transmission of data from source to destination? (Choose two) A. encapsulation B. flow control C. connectionless services D. numbering and sequencing E. best effort delivery Which OSI model layer is responsible for regulating the flow of information from source to destination, reliably and accurately? A. application

49

C,D

50

51

5 2

5 3

5 4

B,D

5 5

B. C. D. E.

presentation session transport network

5 6

5 7

5 8

5 9

6 0

6 1

6 2

6 3

6 4

A network technician wants to connect a host to the console of a Cisco switch to initialize the configuration. What type of cable is required for this connection? A. straight-through cable B. crossover cable C. rollover cable D. serial cable A PC cannot connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? A. Use the ipconfig /all command at the host command prompt. B. Use the ping 127.0.0.1 command at the command prompt. C. Use the traceroute command at the command prompt to identify any failures on the path to the gateway. D. Use FTP to check for connectivity to remote sites. E. Download a troubleshooting tool from the PC manufacturer's website What are two characteristics of CSMA/CD? (Choose two.) A. It monitors the media for presence of a data signal. B. After detecting a collision, hosts can resume transmission after a random timer has expired. C. Devices can be configured with a higher transmission priority. D. Data is transmitted only when the data signal is present. E. It uses a token system to avoid collisions. Which two addresses belong to the category of public IP addresses? (Choose two) A. 127.0.0.1 B. 196.1.105.6 C. 132.11.9.99 D. 10.0.0.1 E. 172.16.9.10 An organization wants to create a subnet of the IP network 172.16.0.0. This subnet will accommodate 1000 hosts. Which subnet mask should be assigned to this network? A. 255.255.0.0 B. 255.255.248.0 C. 255.255.252.0 D. 255.255.254.0 E. 255.255.255.0 F. 255.255.255.128 A network technician wants to configure an IP address on a router interface by using the ip address 192.168.1.0 255.255.255.0 command. Which prompt should the technician see when entering this command? A. Router> B. Router(config-if)# C. Router# D. Router(config)# An organization has been assigned network ID 10.10.128.0 and subnet mask 255.255.224.0. Which IP address range can be used for this organization? A. 10.10.128.0 to 10.10.160.255 B. 10.10.128.0 to 10.10.159.255 C. 10.10.128.0 to 10.10.192.255 D. 10.10.128.0 to 10.10.0.159 E. 10.10.128.0 to 10.10.159.0 Which two statements are true about network layer addressing? (Choose two) A. It uniquely identifies each host. B. It uses a logical 32-bit IPv4 address. C. It is not a configurable address. D. It is a physical address. E. It identifies the host from the first part of the address. Which information is used by the router to determine the path between the source and destination hosts? A. the host portion of the IP address B. the network portion of the IP address C. host default gateway address D. the MAC address

A,B

B,C

A,B

6 5 Refer to the Figure. Host X is unable to communicate with host Y. Which command can be run at host X to determine which intermediary device is responsible for this failure? A. telnet 192.168.1.1 B. ping 192.168.1.1 C. ftp 192.168.1.1 D. tracert 192.168.1.1

6 6

A,C

Refer to the Figure. Which statements are true about the IP configuration that is displayed? (Choose two.) A. The assigned address is a private address. B. The network can have 126 hosts. C. The prefix of the computer address is /26. D. The IP address is routable on the Internet. E. The IP address is a multicast address.

6 8 Refer to the Figure. The NAT functionality of the router is enabled to provide Internet access to the PC. However, the PC is still unable to access the Internet. Which IP address should be changed to 209.165.201.1 to enable the PC to access the Internet? A. 192.168.1.191 B. 192.168.1.101 C. 192.168.1.1 D. 192.168.1.254

6 7

6 9

7 0

7 1

7 2

7 3

7 4

Refer to the Figure. Host A is accessing multiple servers. Which combination of port number and address will uniquely identify a particular process running on a specific server? A. MAC address of the server and port number of the service B. IP address of the host and port number of the service C. MAC address of the host and port number of the service D. IP address of the server and port number of the service When is a straight-through cable used in a network? A. when connecting a router through the console port B. when connecting one switch to another switch C. when connecting a host to a switch D. when connecting a router to another router What makes fiber preferable to copper cabling for interconnecting buildings? (Choose two) A. greater distances per cable run B. lower installation cost C. durable connections D. greater bandwidth potential E. easily terminated Which information is found in both the TCP and UDP header information? sequencing flow control acknowledgments source and destination A small company is experiencing difficulties on its LAN. After performing some tests, a technician has determined that the copper media supporting the LAN is experiencing abnormal attenuation. What are two possible causes of the problem? (Choose two.) defective connectors excessively long cable lengths use of higher grade cabling low frequency signals used in the media network cable runs isolated from other cables Which two statements describe the benefits of VLANs? (Choose two.) A. VLANs improve network performance by regulating flow control and window size. B. VLANs reduce network cost by reducing the number of physical ports required on switches. C. VLANs improve network security by isolating users that have access to sensitive data and applications. D. VLANs divide a network into smaller logical networks, resulting in lower susceptibility to broadcast storms. A user initiates three simultaneous FTP connections from the local host to the same FTP server. Which OSI layer is responsible for establishing and managing these different FTP connections? A. application B. session C. transport D. network E. data link

A,D

A,B

C,D

7 5

7 6

7 7

7 8

7 9

8 0

8 1

8 2

8 3

8 4

Which of the following increases the potential for a collision to occur? A. the use of an active hub instead of an intelligent hub B. the use of an intelligent hub instead of an active hub C. a reduction in the number of devices attached to the hub D. an increase in the number of devices attached to the hub What should a network administrator consider when migrating to Gigabit Ethernet architecture from Fast Ethernet? (Choose two) A. Existing NICs might need to be upgraded. B. Existing switches might need to be upgraded. C. Existing NICs must support half-duplex mode. D. Existing UTP wiring must be replaced with fiber. E. Existing network topology must support shared media. A collision has occurred on an Ethernet network. Which two statements explain the CSMA/CD process? (Choose two.) A. After the jam signal, all transmission stops for a random period. B. When the collision is detected, the hosts stop transmission after eight microseconds C. When the backoff period expires, the hosts involved in the collision have priority to transmit D. When the backoff period expires, each host checks to see whether the networking media is idle and then attempts to transmit. Which devices segment collision domains? (Choose two.)? A. transceiver B. router C. switch D. hub E. media What is true about static VLANs? [Choose the best answer]. A. The VLAN is configured by a TFTP server. B. It automatically notify a new network user. C. The administrator assigns VLAN by port. D. Static VLAN are more appropriate when the switch fabric becomes more complex. Link state protocols issue what to update neighbor routers regarding route status? A. Hop status B. Link state advertisements C. hello packets D. Adjacencies Link state protocols use what to verify that communication is still established with neighbor routers. A. Hop status B. Link state advertisements C. hello packets D. Adjavencies RIP is classified as a? (Choose two) A. Distance vector protocol B. Dynamic routing protocol C. Link state protocol D. Static protocol Which address could be the beginning address of a block of 16 classless addresses? A. 2.4.6.5 B. 2.4.6.15 C. 2.4.6.62 D. None of the above A network administrator has installed a 24 port switch and connected 10 computers with 10/100/1000 NICs. If the NICs are operating at 1000 Mbps, how much bandwidth is available for each computer to receive data? A. 1 Mbps B. 10 Mbps C. 100 Mbps D. 1000 Mbps

A,B

A,D

B,C

A,B

8 5

8 6

8 7

8 8

Which technology is considered to be WAN technology? A. Ethernet B. DSL C. Token Ring D. FDDI What type of routing is it when the network administrator manually configures a route? A. static B. dynamic C. interior D. exterior What is the primary purpose of the routing process? A. to propagate broadcast messages B. to map IP addresses to MAC addresses C. to switch traffic to all available interfaces D. to map IP addresses to MAC addresses E. to find paths from one network or subnet to another What is the purpose of a DHCP server on a network? A. to resolve MAC addresses to IP addresses B. to resolve IP addresses to MAC addresses C. to resolve host names to IP addresses D. to assign IP addresses dynamically to hosts E. to assign a MAC address to a host

What is th What is the purpose of a default gateway? A. physically connects a computer to a network B. provides a permanent address to a computer C. identifies the network to which a computer is connected 90 D. identifies the logical address of a networked computer and uniquely identifies it to the rest of the network E. identifies the device that allows local network computers to communicate with devices on other networks How many bits make up an IPv4 address? A. 128 9 B. 64 1 C. 48 D. 32 Which of the following protocols would exchange information between routers to share network addresses and their metrics? 9 A. TCP 2 B. RIP C. CSMA/CD D. Ethernet When using Category 5 UTP cable, which RJ-45 pin pairs are used to exchange data between hosts on an Ethernet network? 9 A. 1 and 2; 4 and 5 3 B. 1 and 2; 3 and 6 C. 3 and 6; 7 and 8 D. 4 and 5; 7 and 8 ________ is a type of transmission impairment in which the signal loses strength due to the resistance of the transmission medium. 9 A. Distortion 4 B. Noise C. Decibel D. Attenuation In an environment with many high-voltage devices, the best transmission medium would be ________. A. Twisted-pair cable 9 B. Coaxial cable 5 C. The atmosphere D. Optical fiber

9 6

9 7

9 8

9 9

1 0 0 1 0 1

1 0 2

_______ is a device at the telephone company site that can packetize data to be sent to the ISP server. A.A filter B. A splitter C. A DSLAM D.An ADSL modem _______ has a higher transmission rate in the downstream direction than in the upstream direction. A. SDSL B. ADSL C. HDSL D. None of the obove _______ data go from the subscriber to the Internet. A. Downstream B. Upstream C. Midstream D. None of the above The smallest portion of the bandwidth for ADSL carries _______. A. Voice communication B. Downstream data C. Upstream data D. Control data A repeater takes a weakened or corrupted signal and _______ it. A. Resamples B. Reroutes C. Amplifies D. Regenerates On a network that uses NAT, the _______ has a translation table. A. Router B. Switch C. Server D. Hub _______ is a client-server program that provides an IP address, subnet mask, IP address of a router, and IP address of a domain name server to a computer. A. NAT B. ISP C. CIDR D. DHCP

1 0 3

An ARP reply is _______ to _______.


A. B. C. D. A. B. C. D. Unicast; one host Broadcast; all hosts Multicast; one host Unicast; all hosts Unicast; one host Broadcast; all hosts Multicast; one host Unicast; all hosts A

1 0 4

An ARP request is _______ to _______.


B

1 0 5

What does the 127.0.0.1 address represent? A. A broadcast address B. A loopback address C. A network address D. A subnet address

S-ar putea să vă placă și