Beruflich Dokumente
Kultur Dokumente
2.Why is it difficult for routing loops to occur in networks that use link-state routing?
A.Each router builds a simple view of the network based on hop count.
B.Routers flood the network with LSAs to discover routing loops.
C.Each router builds a complete and synchronized view of the network.
D.Routers use hold-down timers to prevent routing loops.
ANS: C
3.What two statements correctly describe the link state routing process?
A.all routers in the area have link state databases
B.each router in the area floods LSPs to all neighbors
C.LSPs use the reserved multicast address of 224.0.0.10 to reach neighbors
D.routing loops are prevented by running the Diffusing Update Algorithm (DUAL).
E.Reliable Transport Protocol (RTP). is the protocol used by for the delivery and reception of LSPs
ANS: A
4.What action does a link-state router take immediately upon receipt of an LSP from a neighboring
router?
A.floods the LSP to neighbors
B.calculates the SPF algorithm
C.runs the Bellman-Ford algorithm
D.computes the best path to the destination network
ANS: A
5.What two events will cause a link state router to send LSPs to all neighbors?
A.30 second timer expires
B.whenever the network topology changes
C.immediately after the Bellman-Ford algorithm has run
D.immediately after the DUAL FSM has built the topology database
E.upon initial startup of router or routing protocol
ANS: E
6.Refer to the exhibit. What does JAX do with link-state packets from ORL?
A.sends out its updated routing table to both ORL and BOS routers
B.sends out the individual link-state packets out the interface connected to BOS
C.queries BOS to see if it has a better route
D.only adds it to the local routing table and performs no other actions
ANS: B
7.Which database or table must be identical on all link-state routers within an area in order to
construct an accurate SPF tree?
A.routing table
B.adjacency table
C.link-state database
D.neighbor table
E.topology database
ANS: C
8.What feature do modern link-state protocols provide to minimize processing and memory
requirements?
A.splitting routing topologies into smaller areas
B.assigning lower process priorities to route calculations
C.using update timers to restrict routing updates
D.strict split horizon rules to reduce routing table entries
ANS: A
10.What are two advantages of using a link-state routing protocol instead of a distance vector routing
protocol?
A.The topology database eliminates the need for a routing table.
B.Each router independently determines the route to each network.
C.Link-state protocols require less router processor power than distance vector protocols
D.After the inital LSP flooding, they generally require less bandwidth to communicate changes in a
topology.
E.Frequent periodic updates are sent to minimize the number of incorrect routes in the topological
database.
ANS: D
11.Which algorithm is run by link-state routing protocols to calculate the shortest path to destination
networks?
A.DUAL
B.Dijkstra
C.Bellman-Ford
D.Diffie-Hellman
ANS: B
14.Refer to the exhibit. What kind of information would be seen in an LSP sent from router JAX to
router ATL?
A.hop count
B.uptime of the route
C.cost of the link
D.a list of all the routing protocols in use
ANS: C
15.Which two routing protocols use Dijkstra’s shortest path first algorithm?
A.RIPv1
B.RIPv2
C.IS-IS
D.BGP
E.OSP
ANS: C,D
16.Refer to the exhibit. Router B receives a packet with a destination address of 10.16.1.97. What will
router B do?
A.drop the packet
B.forward the packet via the route to 10.16.1.0
C.forward the packet via the route to 10.16.1.64
D.use the default route
ANS:D
17.A network is converged and the routing tables are complete. When a packet needs to be
forwarded, what is the first criterion used to determine the best path in the routing table?
A.the route with the smallest AD
B.the route with the longest address and mask match to the destination
C.the route with the highest bandwidth
D.the route with the best combination of AD and lowest cost
ANS: B
19.The following entry is displayed in the routing table: R 192.168.8.0/24 [120/2] via 192.168.4.1,
00:00:26, Serial0/0/1 What type of route is this?
A.a level 1 parent route
B.a level 1 supernet route
C.a level 1 ultimate network route
D.a level 2 child route
E.a level 2 ultimate child route
ANS: C
21.Refer to the exhibit. How many routes in this output qualify for use as ultimate routes?
A.3
B.4
C.5
D.6
E.7
ANS: E
22.Refer to the exhibit. Which statement correctly describes this network?
A.EIGRP is being used
B.There is at least one parent and one child route
C.192.168.2.0, 192.168.3.0, and 192.168.4.0 networks are child routes
D.Traffic going to 172.16.3.0 will be directed to s 0/0/1
ANS: B
23.Refer to the exhibit. What protocol was used to distribute the routing information for the network
172.16.1.4?
A.RIPv1
B.RIPv2
C.EIGRP
D.OSPF
ANS: B
25.Refer to the exhibit. The graphic contains partial contents of the routing table on router E. Router E
is running version 12.3 of the IOS and is configured for default routing behavior. Router E receives a
packet to forward. Which route in the routing table will be searched first and why?
A.172.16.1.0/25 because it is the first ultimate route
B.0.0.0.0/0 because it is the lowest network number
C.172.16.0.0/25 because it is the first level 1 route
D.172.18.0.0/15 because it has the shortest mask
ANS: C
26.Refer to the exhibit. Router1 is running IOS version 12.2. What will the network administrator need
to do so that packets for unknown child routes of 172.16.0.0/24 will not be dropped?
A.issue the ip default-network command
B.use a classful routing protocol such as RIPv1
C.enable either OSPF or ISIS as the routing protocol
D.issue the ip classless command
E.do nothing, ip classless is on by default
ANS: E
27.Refer to the exhibit. With the ip classless command issued, what will router R2 do with a packet
destined for host 172.16.4.234?
A.drop the packet
B.send packet out Serial 0/0/1
C.send packet to network 0.0.0.0
D.send packet out FastEthernet 0/0
ANS: B
29.Refer to the exhibit. What parent network will automatically be included in the routing table when
the three subnets are configured on Router1?
A.172.16.0.0/16
B.172.16.0.0/24
C.172.16.0.0/30
D.172.16.1.0/16
E.172.16.1.0/24
ANS: A
30.Refer to the exhibit. What subnet mask will Router1 apply to child routes of the 172.16.0.0/24
network?
A.0.0.0.0
B.255.255.0.0
C.255.255.255.0
D.255.255.255.255
ANS: C
10.10.14.118
135.23.112.57
191.200.199.199
204.67.118.54
Clear
Your Answer =
Q2. You are asked to evolve a TCP/IP addressing scheme for your Organization. How many network
numbers (subnet number) must you allow when you design the network for your organization?
Short answer:
3. You have an IP of 156.233.42.56 with a subnet mask of 7 bits. How many hosts and
subnets are possible assuming that subnet 0 is not used?
Short answer:
126 subnets and 510 hosts
4. You find that one of the serial interfaces on your router is not forwarding traffic. You have
given "show ip interfaces" command. In the response, you observed the following entries
against that interface:
There is a problem with the route both at physical and protocol layers
Short answer:
5. A client workstation is connected to a DHCP server through a switch and a router, The
client machine has been able to access the network resources without any problem.
However, after the recent configuration change on the DHCP server, the client workstation
is not able to access any network resources. What is the likely solution.
Short answer:
6. Two sub layers of OSI Data Link layer are which of the following?
Short answer:
Long answer:
The OSI model was designed to facilitate open specification for connecting to systems conforming to OSI
model. These systems are designed to be open for communication with almost any other system. OSI
model breaks down each functional layer so that overall design complexity could be lessened. OSI model
primarily consists of seven layers for the flow of information. This is shown in the figure below.
The Data Link Layer corresponds to layer 2 of OSI reference model. This layer is further divided into two
sub-layers:
The LLC sub-layer handles error control, flow control, framing, and MAC sub-layer addressing.
The MAC sub-layer is the lower of the two sub-layers of the Data Link layer.
MAC sub-layer handles access to shared media, such a Token passing or Ethernet.
7. Two sub layers of OSI Data Link layer are which of the following?
A.
1. Data Link Layer
Repeaters
B. Bridges 2. Network Layer
C. Routers 3. Physical Layer
A --->2, B--->3, C--->1
A--->3,B----->2, C---->1
Long answer:
The most frequently used network devices may be categorized as repeaters, hubs, switches, and
routers. These devices let you connect computers, printers, and other devices to communicate with
each other.The medium that is used for communication is usually cable (optical or copper) and air (Wifi,
bluetooth, etc.).
A repeater is a basic device that simply amplifies the input signals and retransmits. It is used to extend
the range of a network segment.
For example, the range of a 10BaseT network segment is 100meters by default.If the end devices are at
a distance more than 100 meters, you will require a repeater so that the transmitted signals are received
at the destination device without losing any information.
A bridge/switch essentially forwards the frames that come from one port to other ports.A switch is used
to connect two or more network segments. A switch learns the physical addresses of sending devices by
reading the MAC address and mapping it to the port number through which the frame had arrived.
This way, it will quickly learn which MAC address belongs to which switch port, and stores the
information in a table (called MAC table). Then onwards, it will send aframe only to the port that
connects to the destination device (as specified in the frame). MAC addressesare layer-2 addresses.
Because a switch works on MAC addresses, we can classify switches as Layer-2 devices.
A router is used to route packets by connecting two or more networks together.They work at layer-3 of
the OSI model.They route packets based on the IP addresses where as a switch forwards packets based
on the MAC addresses. A router needs to disseminate an incoming packet down to its IP address and
route it to destination based on information available in its routing table.
Switches maintain a MAC table where as routers maintain a routing table. When a switch sends a
packet (usually called a frame when sent by a switch) it iscalled forwarding.A router reads the
destination IP address of the incoming packet, finds out which interface it needs to go to reach desired
destination (which may be several hops away) and routes the packet appropriately.
Short answer:
Long answer:
The terms “Frame”, “Packet”, and “Segment” are used frequently in TCP/IP framework to distinguish
between different layers of TCP/IP (or OSI).
An Ethernet "Frame" is the layer 2 frame that is received by the NIC (Network Interface Card) of your
computer for processing. A Frame typically contains MAC address or any physical address of the next
hop interface.
An IP "Packet" is the information packet that contains the IP header, and includes all upper layer
protocol information. A Packet contains the logical address (also called IP address in TCP/IP) of source
and destination.
And, a TCP segment, encapsulates all higher-level protocols above it so that it is ready for transmission
over the network.
When a packet comes in to the NIC, the Datalink layer takes the "Frame", and removes the mac address
information, and forwards the "Packet" to the IP layer. The destination host, then removes the Packet
header and forwards the information “Segment” it to Transport layer for further processing. The
transport layer forwards the information to upper layers of the TCP stack for identification of the
application.
After TCP is processed, the TCP header is removed completely, and the data is sent to the application.
In general, a Frame is associated with Datalink Layer, a packet is associated with Network Layer, and a
segment is associated with Transport Layer. Note that the information is called with different names to
distinguish one TCP/IP layer from another.
Short answer:
Long answer:
A bridge/switch essentially forwards the frames that come from one port to other ports. However, a
switch learns the physical addresses of sending devices by reading the MAC address and mapping it to
the port number through which the frame had arrived.
This way, it will quickly learn which MAC address belongs to which switch port,and stores the
information in a table (called MAC table). Then onwards, it will send a frame only to the port that
connects to the destination device (as specified in the frame).
A switch is used to connect two or more network segments.MAC addresses are layer-2 addresses.
Because a switch works on MAC addresses, we can classify switches as Layer-2 devices.
a. doubleplexer
b. multiplexer
c. concentrator
d. controller
Show/Hide Answer
Answer = A
3) Which of the following is required to communicate between two computers ?
a. communications software
b. protocol
c. communication hardware
d. all of above including access to transmission medium
Show/Hide Answer
Answer = D
4)Which of the following is an advantage to using fiber optics data transmission ?
a. simplex lines
b. half-duplex lines
c. full duplex lines
d. biflex-lines
Show/Hide Answer
Answer = B
6) The optical fiber trans-Atlantic cable TAT-14 includes a section from Bude, Cornwall to
Tucker ton, New Jersey. Determine the propagation delay if the route length is 6,254 km. ?
a. 31.98 ms
b. 3.198 ms.
c. 31.27 ms
d. 312.7 ms
Show/Hide Answer
Answer = C
7) Manchester encoding is principally designed to ?
a. ensure that the line remains unbalanced.
b. have more than one symbol per bit period.
c. increase the bandwidth of a signal transmitted on the medium
d. ensure that a transition occurs in the center of each bit period.
Show/Hide Answer
Answer = D
8) A router ?
a. VDR
b. RTS
c. CTS
d. DSR
Show/Hide Answer
Answer =A
1) Which of the following is not a type of Computer Network?
a. Coaxial Cable
b. Shielded Twisted Pair (STP)
c. Unshielded Twisted Pair (UTP)
d. Only B and C
Show/Hide Answer
Answer = D
Explanation:STP and UTP are type of Twisted Pair Cable which are mostly used in all Networks.
a. CAT 1
b. Thinnet
c. CAT 5
d. CAT 5e
Show/Hide Answer
Answer = D
Explanation: CAT 5e is also Know As 1000 Mbps Gigabyte Ethernet and Supports Data Rate
Upto 1000 Mbps.
a. Straight Cable
b. Cross Over Cable
c. Serial Cable
d. All of Above.
Show/Hide Answer
Answer = B
Explanation: Cross Over Color Coding of UTP Cable is Used to connect Similar Devices like HUB
to HUB, PC to PC, Switch To Switch.
6) HUB is a _________ Device and Switch is a ________ Device.
a. Unicast, Multicast
b. Malticast, Unicast
c. Broadcast, Unicast
d. None of Above
Show/Hide Answer
Answer = C
Explanation: Hub is a Broadcasting Device and Switch is a Unicasting Device because Switch
have Memory Element to Store MAC Address.
7) Switch is a Device of _________ Layer of OSI Model.
a. Network Layer
b. Data Link Layer
c. Application Layer
d. Session Layer
Show/Hide Answer
Answer = B
Explanation: Switches Operate On Th Second Layer of OSI Model That is Data Link Layer.
a. HUB
b. Switch
c. Only A
d. Both A and B
Show/Hide Answer
Answer = D
Explanation: HUB and Switch are used in Star Type Networks.
a. OSI Model
b. TCP Model
c. DOD Model
d. Network Model
Show/Hide Answer
Answer = C
Explanation: TCP/IP Model is also known as DOD model.
8) A protocol is a set of rules governing a time sequence of events that must take place ?
a. between peers
b. between an interface
c. between modems
d. across an interface
Show/Hide Answer
Answer = A
10) Communiction circuits that transmit data in both directions but not at the same time are
operating in
a. a simplex mode
b. a half duplex mode
c. a full duplex mode
d. an asynchronous mode
Show/Hide Answer
Answer = B
Following are the Multiple choice questions on Computer Networks based on the UGC - NET
Syllabus
a. Footprint
b. Circular polarization
c. Beam width
d. Identity
e. None of Above
Show/Hide Answer
Answer = A
Explanation:No explanation for this question.
2) Coaxial cable has conductors with ?
a. Equal resistance
b. The same diameter
c. Both A and B
d. A common axis
e. None of these
Show/Hide Answer
Answer = D
Explanation: Coaxial cables has two type of conductors one is inner and other is outer that has
common axis.
a. Inner conductor
b. Outer conductor
c. Diameter of cable
d. Insulating material
Show/Hide Answer
Answer = B
Explanation:The outer conductor is covered in protective plastic sheath. This shielding of
coaxial cable give it a good combination of high bandwidth and excellent noise immunity.
a. Bit stuffing
b. Hamming codes
c. Cyclic Redundancy codes
d. Equalization
e. None of above
Show/Hide Answer
Answer = A
Explanation:Bit stuffing also known as positive justification is the insertion of non-information
bits into data.
5) MAN refers to ?
a. Mega Area Network
b. Metropolitan Area Network
c. Mini Area Network
d. Medium Area Network
Show/Hide Answer
Answer = B
Explanation: A metropolitan area network covers a city. The best example is the cable
television network available in cities.
6) Which of the following layer is not in OSI model ?
a. physical layer
b. internet layer
c. network layer
d. transport layer
Show/Hide Answer
Answer =B
Explanation: The OSI model has total 7 layers out of which internet layer is not a part of OSI
model.
7) Nyquist Theorem to calculate data rate is ?
a. 2H log2 V bits/sec
b. H log2 V bits/sec
c. Hlog2 (1+S/N)
d. 2H log2 (1+s/n)
Show/Hide Answer
Answer = A
Explanation:No explanation
a. Geosynchronous satellite
b. Wavelength
c. Low orbit satellite
d. ISDN
Show/Hide Answer
Answer = C
Explanation:Moving down in altitude, we come to LEO satellites. Due to their rapid motion,
large numbers of them are needed for a complete system.
a. Transparent
b. Non transparent
c. Both A and B
d. None of these
Show/Hide Answer
Answer = C
Explanation:Fragmentation is used to break up the packets into fragments. It is of two types :
Transparent and Non transparent.
Following are the Multiple choice questions on Computer Networks based on the UGC - NET
Syllabus
1) Collection of interconnected networks sometimes called ?
a. Internet
b. Wireless network
c. Mobile Network
d. None of these
Show/Hide Answer
Answer = A
Explanation: Internet is not a single network but network of networks.
a. Radio broadcasting
b. Wireless network
c. Geosynchronous
d. LAN
Show/Hide Answer
Answer = B
Explanation: Personal Digital Assistant also known as palmtop computers is a mobile device
that functions as the personal information manager, mostly access internet through Wi - Fi or
wireless wide area network
a. Circuit switching
b. Packet switching
c. Narrow band
d. None of these
Show/Hide Answer
Answer = B
Explanation:ATM is a cell switching and multiplexing technology that combines the features of
circuit switching with packet switching. Like X.25 and frame relay ATM defines the interaction
between the user equipment and network.
a. Time Division Multiplexing(TDM)
b. Pulse Code Multiplexing(PCM)
c. Wavelength Division Multiplexing(WDM)
d. None of these
Show/Hide Answer
Answer = C
Explanation:The WDM is commonly applied on the optical carrier while FDM is applied on the
radio carrier. Since wavelength and frequency are tied together through a simple directly
inverse relationship, the two terms actually describe the same concept.
6) One security method is encryption. But encryption does nothing to keep digital pests and
hackers out. To accomplish this goal, we need ?
a. Router
b. Bridges
c. Hubs
d. Firewalls
Show/Hide Answer
Answer = D
Explanation: Main objective of firewall is to control the incoming and outgoing network traffic
by analyzing the data packets and determining whether it should be allowed through or not,
based on a predetermined rule set.
7) HTTP refers to ?
10) Sending a file from your personal computer's primary memory or disk to another
computer is called ?
a. uploading
b. hang on
c. logging on
d. downloading
e. None of these
Show/Hide Answer
Answer = A
Explanation: Uploading refers to sending data from local system to remote system such as
server or client.
Following are the Multiple choice questions on Computer Networks based on the UGC - NET
Syllabus , TET exams , and all other competitive exams.
1) Which of the following is a congestion control algorithm?
a. Mosaic
b. Netscape
c. Internet Explorer
d. All of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
3) Demodulation is the process of ?
a. bus network
b. ring network
c. star network
d. T- switched network
e. None of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
7) In OSI network architecture, the dialogue control and token management are
responsibilities of ?
a. session layer
b. network layer
c. transport layer
d. data link layer
e. none of above
Show/Hide Answer
Answer = A
Explanation: No Explanation
8) What is the main function of transport layer ?
a. port
b. physical
c. IP
d. None
Show/Hide Answer
Answer = A
Explanation: No Explanation
Following are the multiple choice question on Computer Network related concepts that are
useful for the competitive exams like UGC-NET Exam, TET Exams etc.
1) A network that requires human intervention of route signals is called a ?
a. Bus network
b. Ring netwkork
c. Star network
d. T-switched network
e. None of above
Show/Hide Answer
Answer = D
Explanation: No Explanation
2) Which layer functions as liaison between user support layers and network support layers ?
a. network layer
b. physical layer
c. transport layer
d. session layer
Show/Hide Answer
Answer = C
Explanation: Transport Layer functions as liaison between user support layers (Application,
Presentation and Session) and network support layers (Network, Data Link and Physical)
3) If digital data rate of 9600 bps is encoded using 8-level phase shift keying method, the
modulation rate is?
a. 1200 bands
b. 3200 bands
c. 4800 bands
d. 9600 bands
e. None of above
Show/Hide Answer
Answer = C
Explanation: Add Explanation in comments!!!
5) If the bit string 0111101111101111110 is subjected to bit stuffing for the flag string
01111110, the output string is ?
a. 011110111110011111010
b. 01111011111011111100
c. 01111011111011111010
d. 0111101111101111110
Show/Hide Answer
Answer = A
Explanation: No Explanation
a. IP
b. ARP
c. TCP
d. UDP
Show/Hide Answer
Answer = C
Explanation: Transmission Control Protocol sets up a virtual circuit before transmitting any
data. This creates a reliable session and is known as a connection-oriented session.
3) Which protocol works at the Internet layer and provides a connection service between
hosts?
a. IP
b. ARP
c. TCP
d. UDP
Show/Hide Answer
Answer = A
Explanation: Internet Protocol is used to address hosts and route packets through the
internetwork. The question does not refer to a connection-oriented service, which is different
from a plain connection service.
4) If a host broadcasts a frame that includes a source and destination hardware address, and
its purpose is to assign IP addresses to itself, which protocol at the Network layer does the
host use?
a. RARP
b. ARPA
c. ICMP
d. TCP
e. IPX
Show/Hide Answer
Answer = A
Explanation: Reverse ARP is used to find an IP address from a known hardware address.
5) If a router interface is congested, which protocol in the IP suite is used to tell neighbor
routers?
a. RARP
b. ARP
c. ICMP
d. IP
e. TCP
Show/Hide Answer
Answer = C
Explanation: Internet Control Message Protocol (ICMP) is used to send redirects back to an
originating router.
6) What is the valid host range the IP address 172.16.10.22 255.255.255.240 is a part of?
a. 1-126
b. 1-127
c. 128-190
d. 128-191
e. 129-192
f. 192-220
Show/Hide Answer
Answer = D
Explanation: A Class B network is defined in the first octet with the numbers 128–191.
8) What range of addresses can be used in the first octet of a Class C address?
a. 1-127
b. 129-192
c. 203-234
d. 192-223
Show/Hide Answer
Answer = D
Explanation: A Class C network is defined in the first octet with the numbers 192-223.
9) How many bytes is an Ethernet address?
a. 3
b. 4
c. 5
d. 6
e. 7
f. 8
g. 16
Show/Hide Answer
Answer = D
Explanation: An Ethernet (MAC) address is 6 bytes long (48 bits).
10) What protocol is used to find the hardware address of a local device?
a. RARP
b. ARP
c. IP
d. ICMP
e. BootP
Show/Hide Answer
Answer = B
Explanation: Address Resolution Protocol (ARP) is used to find the hardware address from a
known IP address.