Networking MockExit
Networking MockExit
A. Data Link
B. Presentation
C. Network
D. Transport
A. 10 Byte
B. 8 Byte
C. 20 Byte
D. 16 Byte
4. Which of the following can be used as a solution for network congestion solution?
A. Policies
B. Congestion notification
C. Buffer management
D. A and B
E. All
A. Transport
B. Physical
C. Network
D. Data-link
E. None
6. Which of the following protocols is used to monitor network devices such as hubs, switches,
and routers?
A. SMTP
B. SNMP
C. RIP
D. OSPF
A. Zero
B. Nonzero
8. If a company decides to implement VPN service within the organization and for its customers,
You desire to secure a connection. Which protocol should you use
A. HTTPS
B. IPsec
C. SSL
D. IGMP
9. Which of the following protocols is used to monitor network devices such as hubs, switches,
and routers?
A. SMTP
B. SNMP
C. RIP
D. OSPF
10. Which one of the following can’t be considered a link layer service?
A. Flow control
B. Error detection
C. Error Correction
D. Segmentation
11. A piece of network equipment including its software resides on a managed network.
A. Managed Entity
B. Managed Device
C. Agent
D. None
12. Virtual circuit signaling protocol is not used in one of the following?
A. ATM
B. Internet
C. Frame relay
D. X.25
13. Company XYZ uses a network address of 192.168.4.0. It uses the mask of 255.255.255.224 to
create subnets. What is the maximum number of usable hosts in each subnet?
A. 6 B. 30 C. 14 D. 62
14. Which of the following is an example of a private IP address, which is not to be used on the
Internet?
15. __________refers to the techniques, which allow more than one message to be transferred via
the same communication channel.
17. Which of the following layer establishes, maintains, and synchronizes the interactions between
communicating devices?
19. A router normally connects LANs and WANs on the Internet and has a table that is
used for making decisions about the route.
21. Network activity that allows to creation of multiple logical networks from a single address block.
22. The number of point-to-point links required in a fully connected network for 50 entities is
A. Process
B. Computer
C. Network
D. All
A. Addressing
B. Compression
C. Dialog Control
D. Authentication
27. Among the following IPv4 address, which IP can be assigned for a host?
A. 10.255.255.255
B. 33.55.99.12
C. 200.124.1.0
D. 0.0.0.0
28. In order for subnetting to work, the router must be told which portion of the host ID to use for
the subnet’s network ID, and this address is _______.
31. Which IPv4 address can be pinged to test the internal TCP/IP operation of a host.
32. A user opens three browsers on the same PC to access www.bdu.edu.et to search for
certification course information. As the server replay, which information is used by the TCP/IP
protocol stack in the PC to identify the destination web browser?
A. Destination IP address
D. Source IP address
33. Which of the following layer establishes, maintains, and synchronizes the interactions
between communicating devices?
34. Which address on a PC does not change, even if the PC is moved to different place or
network?
36. The transport layer works _______________ for the entire message delivery.
37. A type of topology in which one computer can have several alternative communication paths
with all other computers on the network.
A. Star
B. Bus
C. Mesh
D. None
38. Which one of the following characteristics of network architecture refers to the capability of
expanding to support new users without any performance impact?
A. Security
B. Quality of Service
C. Scalability
D. Fault tolerance
39. Additional to the data signal, the start and stop bit will be added in _____ data transmission.
A. Synchronous
B. Asynchronous
C. Both A&B
D. None
40. An important component of bus topology that protects the signal bounce problem?
41. A basic element of a network platform which can transport messages from one device to
another is called__________.
A. Rule
B. Message
C. Medium
D. Node
A. Verbal
B. Non-Verbal
C. Written
D. Visualizations
44. Which one of the following is NOT true about bus topology?
A. inexpensive
B. easy to design
C. easy to troubleshoot
D. termination needed
45. In _____ data transmission, both the communicating devices can send data signal in both
direction.
A. Full-duplex
B. Half-duplex
C. Both A&B
D. None
46. An important component of bus topology which protect the signal bounce problem?
47. A basic element of network platform which provide the functionality that directs and moves the
messages through the network called __________.
A. Rule
B. Service
C. Medium
D. Process
49. Which of the following is the media standard for most LAN installations?
51. One of the following connectors is similar to the fiber optic ST connector.
52. Which of the following network term refers to private network infrastructure?
53. A type of topology in which one computer can have several alternative communication path
with all other computers on the network.
A. Star
B. Bus
C. Mesh
D. Hybrid
E. None
54. The situation when both transmitter devices and receiver devices have to work in a timely
manner is referred to as:
A. Synchronous
B. Asynchronous
C. Serial
D. Parallel
55. A large number of computers in a wide geographical area can be efficiently connected by
using:
A. Coaxial cables
B. Communication satellites
D. All
56. Which one of the following is not the advantage of a computer network?
D. All
57. Which one of the following is the most powerful transmission media than the others?
A. UTP
B. Coaxial
C. STP
D. Fiber optics
58. Which of the following characteristics of a network refers to expanding to support new users
without any performance impact?
A. Security
B. Quality of Service
C. Scalability
D. Fault tolerance
A. Duplex
B. Half Duplex
C. Simplex
D. All except B
61. An essential component of bus topology that protects the signal bounce problem?
A. Backbone
B. Terminator
C. Cable
D. Server
62. For constructing a network infrastructure in small office, what kind of network cable do we
need to use?
63. A type of topology in which one computer can have several alternative communication paths
with all other computers on the network.
A. Star
B. Bus
C. Mesh
D. None
64. Which of the following characteristics of network architecture refers to expanding to support
new users without any performance impact?
A. Security
B. Quality of Service
C. Scalability
D. Fault tolerance
65. Additional to the data signal, the start and stop bit will be added in _____ data transmission.
A. Synchronous
B. Asynchronous
C. Both A&B
D. None
68. The situation when both transmitter devices and receiver devices have to work in timely
manner is referred to as:
A. Synchronous
B. Asynchronous
C. Serial
D. Parallel
69. Which one of the following characteristics of a network refers the capability of expanding to
support new users without any performance impact?
A. Security
B. Quality of Service
C. Scalability
D. Fault tolerance
72. An important component of bus topology which protect the signal bounce problem?
A. Backbone
B. Terminator
C. Cable
D. Server
A. Time-division multiplexing
B. Frequency-division multiplexing
C. Amplitude modulation
D. Phase modulation
76. The ________is a circuit-switched network, while the ______ is a packet-switched network.
A. Telephone, ATM
B. Satellite, Telephone
A. IP B. TCP C. DNS D.
HTTP
78. Most networks employ devices for routing services. Routers work at which of the following OSI
layers?
80. __________ refers the techniques, which allow more than one message to be transferred via
the same communication channel.
81. Which of the following layer establishes, maintains, and synchronizes the interactions between
communicating devices?
84. Which one of the following layer is not included within the TCP/IP architecture directly?
A.Application
B.Presentation
C.Transport
D.Network Access E. Physical
85. Decryption and encryption of data are the responsibility of the _____________ Layer.
A.Data Link
B.Presentation
C.Network
D.Transport
86. One of the following cannot be found on the header lines of HTTP request message.
A.Host
B.User-Agent
C.Content-length
D.Connection
87. One of the following protocol is different from the other protocols
A.File transfer
B.E-mail
C.Remote terminal access
D.Internet telephony
90. The whole communication between client and server to transmit a file may take_______. .
A.2RTT
B.RTT + transmit time
C.2RTT + transmit time
D.RTT
91. Which one of the following uses UDP as the underlying transport layer protocol?
A.File transfer
B.E-mail
C.Remote terminal access
D.Internet telephony
92. The status code in HTTP response message, which indicate request succeeded.
A.331
B.400
C.200
D.404
93. Which one of the following is not true about having centralized DNS?
94. The status code in HTTP response message, which indicate bad request.
95. Which one of the following interconnecting device, which acts as an interface that enables
communication between dissimilar network?
A. Gateway B. Bridge C.Switch D.Router
96. Which one of the following layers is not available on end-hosts (computers)?
a. Application
b. Transport
c. Network
d. Physical
e. None
a. Application layer
b. Transport layer
d. Physical layer
e. None
98. Which one of the following is a service provided by the transport layer?
a. Process addressing
b. Host addressing
c. Physical addressing
d. Network addressing
e. None
d. The two ends are not required to agree for the data exchange
e. None
a. 4 bytes
b. 8 bytes
c. 20 bytes
d. 48 bytes
e. None
a. It is a point-to-point protocol
e. None
a. 21
b. 25
c. 55
d. 143
e. None
103. We know the size of a TCP header is 20 bytes. Why do we need to include header length on every
segment?
a. Path determination
b. Forwarding
e. None
105. How many different host addresses (including broadcast address) are there in the subnet
10.132.10.0/28?
a. 4
b. 16
c. 28
d. 255
e. None
a. IP address scarcity
b. Security
d. Routing algorithm
e. None
a. 16 bits
b. 32 bits
c. 48 bits
d. 128 bits
e. None
108. Which one of the following does not have impact on congestion?
a. Routing algorithm
e. None
109. From the four QoS parameters, email is highly sensitive to:
a. Reliability
b. Delay
c. Jitter
d. Bandwidth
e. None
a. Physical layer
c. Network layer
d. Transport layer
e. None
111. Which one of the following is not a service provided by link layer of the TCP/IP protocol stack?
e. None
112. What do you call the PDU at the link layer of the TCP/IP protocol stack?
a. Datagram
b. Segment
c. Message
d. Frame
e. None
113. Which one of the following is not a multiple access protocol of shared media?
a. Channel partitioning
b. Point-to-point protocol
d. Taking turns
e. None
b. Point-to-point protocol
d. Taking turns
e. None
e. None
b. Coaxial cable
c. Fiber optic
d. Bluetooth
e. None
e. None
119. Which topology requires a dedicated point-to-point connection between only the two neighboring
devices.
A. Star
B. Bus
C. Mesh
D. Ring
120. If one computer becomes a at one time and remains a server at another time, such a network
application architecture is called______.
A. Ring topology
B. Bus topology
C. Client/server
D. Peer-to-peer
121. Transmission impairment that refers to loss of strength of a signal is _____.
A. Attenuation
B. Distortion
C. Noise
D. None
122. ________ defines how a particular pattern to be interpreted, and what action is to be taken based on
that interpretation.
A. Syntax C. Accuracy
B. Semantics D. Reliability
123. Which service of a data-link layer imposes a mechanism to avoid overwhelming the receiver by
sending too much data which can’t be absorbed by the receiver?
A. Flow control C. Access control
B. Error control D. Framing
124. Which of the following networks uses very expensive network equipment/infrastructure and can be
managed by multiple administrations.
A. MAN C. WAN
B. LAN D. None
125. In a synchronous transmission, the transmitter and receiver pace are _______.
A. Zero C. Variable
B. Fixed D. A function of the data rate
126. What is the signal encoding for Fiber optics cable?
A. Electrical impulses C. Pulses of light
B. Electromagnetic waves D. Radio waves
127. Communication between a computer and a keyboard is an example of ______ transmission.
A. Half-duplex C. Simplex
B. Full-duplex D. Automatic
143. In _______, the resources need to be reserved during setup phase; the resources remain dedicated for
the entire duration of data transfer phase until the teardown phase.
A. Packet switching C. Datagram switching
B. Circuit switching D. None of the above
146. For which of the following would you not need to provide a crossover cable?
A. Connecting uplinks between Switches
B. Connecting Computers to Routers
C. Connecting Routers to Switches
D. Connecting Hubs to Switches
147. Which of the following wireless media used for Remote controls for TVs and Indoor wireless LANs.
A. Microwaves B. Radio waves C. Infrared waves D. Wi-fi
148. _______ refers to the structure or format of the data, meaning and the order in which they are presented
in data communication.
A. Syntax C. Semantics
B. Timing D. All of the above
149. What is the signal encoding for each Fiber optics cable?
A. Electrical impulses C. Radio waves
B. Pulses of light D. . Electromagnetic waves
150. Transmission impairment that refers to changes of format/shape of a signal is _____.
A. Attenuation C. Noise
B. Distortion D. None
151. The range of addresses that can be used in the first octet of Class D addresses are ___.
A. 192-223 C. 224-239
B. 240-255 D. 8128-191
152. What is the prefix length notation for the subnet mask 255.255.255.248?
A. /30 C. /28
B. /27 D. /29
153. To which class this IP address 241.0.200.141 belongs?
A. Class B C. Class E
B. Class A D. Class D
154. ______ is a networking technique that enables us to transfer two or more different data signals
simultaneously on the same communication channel.
A. Switching C. Multiplexing
B. Layering Task D. None
155. Which one of the following is true regarding multiplexing techniques?
A. In TDM all the signals operate at the same time with different frequencies
B. In FDM all the signals operate with same frequency at different times
C. Multiplexing is sharing of a medium and its link by several devices
D. All
156. Which one of the following is different from the other?
A. 172.16.35.12
B. 188.17.12.14
C. 130.17.12.24
D. 126.17.12.254
157. _______ refers to the way a network is laid out, either physically or logically
A. Line configuration
B. Topology
C. Transmission mode
D. Modulation mode
162. In a___________ relationship, one device controls traffic and the others must transmit through it
M. A. peer-to-peer
N. B. point-to-point
O. C. primary-secondary
P. D. full duplex
163. An Unauthorized access is network ____ issue
a. Performance
b. Reliability
c. Security
d. Accountability
b. Protocol
c. Standards
d. Semantics
b. Mesh
c. Ring
d. Bus
b. Remains unchanged
c. Decreases
d. Changes inconsistently
167. Error Control is a function of
a. Physical Layer
b. Network Layer
c. Datalink Layer
168. HDLC is
a. High Density Layer Control
c. Both a and b.
b. Small area
c. Both a and b.
b. Connection-oriented mode
c. Both a and b .
b. 6 bytes
c. 4 bytes
d. 3 bytes
175. In which type of switching all packets of a message follow same
channel
c. Message switching
b. Cross point
c. Cross bar
d. RAM
b. Three
c. Six
d. Seven
b. 8
c. 32
b. Class B
c. Class C
d. Class D
b. 32-bits
C. 48-bits
d. 64-bits
197. Which of the following term describes PDU encapsulated at Transport Layer?
a. Frame
b. Packet
c. Data
d. Segment
198. A list of protocols used by a system, one protocol per layer, is called __
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system