Vous êtes sur la page 1sur 3

NETWORK ESSENTIAL

Marks: 50
1. List the layers of OSI model in sequence. & explain Presentation and Network layer.
2. Write different types of cables.
3. Explain ring and bus topology with diagram.
4. Explain UDP,IP and IGMP protocols.
5. Write down difference between IPv4 and IPv6.
6. Write down private IP address range of Class A,B and C.
7. Write two standard of color code sequence for crimping.

Objective
1. Which one of the following topologies does FDDI (Fiber Distributed Data Interface) use?
A. Star B. Bus C. Mesh D. Ring
2. The maximum speed of 802.11g is:
A. 1 Mbps B. 2 Mbps C. 11 Mbps D. 54 Mbps
3. Which media access method is used for an IEEE (Institute and Electronics Engineers) 802.3
network?
A. Polling B. CSMA / CD (Carrier Sense Multiple Access / Collision Detection)
C. Token passing D. CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)
4. What should be used to automatically configure host computers for IP (Internet Protocol)?
A. DNS (Domain Name Service) B. SNMP (Simple Network Management Protocol)
C. SMTP (Simple Mail Transfer Protocol) D. DHCP (Dynamic Host Configuration Protocol)
5. Which of the following options are the minimal settings for connecting a computer to a TCP /
IP (Transmission Control Protocol / Internet Protocol) LAN (Local Area Network) while accessing
the Internet?
A. IP (Internet Protocol) address, subnet mask, gateway, and DNS (Domain Name Service)
B. IP (Internet Protocol) address and gateway
C. Subnet mask, IP (Internet Protocol) address, and DNS (Domain Name Service)
D. IP (Internet Protocol) address, DNS (Domain Name Service, and gateway
6. A workstation can no longer connect to the network. Which LED should a user check FIRST on
a NIC to identify the problem?
A. Link B. Activity C. Collision D. Power
7. If one of the links to a computer on a physical star topology is served, what will be the result?
A. The entire network will stop working.
B. The affected link and the adjacent network links will stop working.
C. Only the affected link will stop working.
D. Only the adjacent links will stop working.
8. Which of the following is a true statement regarding TCP and UDP?
A. TCP is connection-oriented UDP is reliable.
B. TCP is connectionless, UDP is unreliable.
C. TCP is connection-oriented, UDP is unreliable.
D. TCP is connectionless, UDP is reliable.
9. You work as a network administrator at ABC Computer. You have noticed suspicious IP traffic
on the local subnet. After successfully pinging the source, which utility does the administrator use
to find the associated MAC address?
A. ipconfig B. nbstat C. arp D. tracert
10. Which TCP/IP well-known port number identifies SMTP?
A. 21 B. 23 C. 25 D. 110
11. All of the following are valid IP addresses except:
A. 192.168.0.1 B. 172.192.4.256 C. 156.144.226.123 D. 10.24.12.0

12. Which OSI layer converts digital data into electronic signals to be put on a wire?
A. Physical B. Transport C. Data Link D. Presentation
13. Which network topology uses the most cable?
A. Star B. Ring C. Bus D. Mesh
14. How can the range of an 802.11b wireless access point be increased?
A. Lower the output power B. Remove any external antennas and use the internal one
B. Install an external antenna D. Change the transmitting frequency to the 5 GHz range
15. Which of the following can be used to cache web pages for future retrieval?
A. Switch B. Web server C. Repeater D. Proxy service
16. Which cable would users utilize to connect a client workstation directly to another client
workstation when using 100BASE-TX?
A. Category 5 crossover cable B. Coaxial cable
C. Category 3 straight cable D. Category 5 straight cable
17. Which of the following are classified as Layer 2 devices?
A. Hubs, switches and routers B. Hubs, switches and bridges
C. Switches, bridges, and NICs (network Interface Card) D. Switches, bridges and routers
18. All of the following are true statements about private IP (Internet Protocol) addressing except:
A. private IP (Internet Protocol) addresses may be duplicated across many networks without
causing address conflicts.
B. private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet
Service Provider).
C. private IP (Internet Protocol) addresses allow organizations to share a single public IP (Internet
Protocol) address.
D. large networks may be broken into several private IP (Internet Protocol) networks.
19. Which address is within an IANA (Internet Assigned Numbers Authority) private range?
A. 19.109.220.103 B. 188.209.75.46 C. 192.168.54.10 D. 216.127.51.121
20. Which layer of the OSI (Open Systems Interconnect) models handles formatting and code
conversations?
A. Transport B. Data Link C. Application D. Presentation

Vous aimerez peut-être aussi