0

Networks

Description: Assures good knowledge in networking.
Number of Questions: 15
Created by:
Tags: Computer science networking exam entrance test Computer Network
Attempted 0/15 Correct 0 Score 0

Which protocol does PPP use to identify the network layer protocol?

  1. X.25

  2. ISDN

  3. HDLC

  4. LCP

  5. NCP


Correct Option: E
Explanation:

Network Control Protocols include the Internet Protocol Control Protocol for the Internet Protocol, the Internetwork Packet Exchange Control Protocol for the Internet Packet Exchange protocol, and the AppleTalk Control Protocol for AppleTalk.

Which command can be used to upgrade an IOS on a Cisco router?

  1. copy tftp run

  2. copy tftp flash

  3. copy tftp runing-config

  4. copy runing-config tftp

  5. copy startup-config running-config


Correct Option: B
Explanation:

Upgrade the router IOS from a TFTP server.

Where can you find hub specification in the OSI model?

  1. Session layer

  2. Data Link layer

  3. Application layer

  4. Physical layer

  5. Presentation layer


Correct Option: D
Explanation:

The physical layer consists of the basic networking hardware transmission technologies of a network. It is a fundamental layer underlying the logical data structures of the higher level functions in a network.

Which layer of the OSI model can be the equivalent to the host-to-host layer in the TCP/IP stack?

  1. Application

  2. Transport

  3. Internet

  4. Network

  5. Presentation


Correct Option: B
Explanation:

In computer networking, the transport layer or layer 4 provides end-to-end communication services for applications within a layered architecture of network components and protocols.

Which transport layer protocol is used for a telnet connection?

  1. IP

  2. TCP

  3. DCCP

  4. UDP

  5. ARP


Correct Option: B
Explanation:

The Transmission Control Protocol (TCP) is one of the two original core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP.

Which of the following allows a router to give response to an ARP request that is intended for a remote host?

  1. Network Time Protocol (NTP)

  2. Reverse ARP (RARP)

  3. Proxy ARP

  4. Inverse ARP (IARP)

  5. DHCP


Correct Option: C
Explanation:

Proxy ARP (Address Resolution Protocol) is a technique by which a device on a given network answers the ARP queries for a network address that is not on that network.

The hardware address of a local device can be found using which protocol?

  1. RARP

  2. IP

  3. TCP

  4. ICMP

  5. ARP


Correct Option: E
Explanation:

Address Resolution Protocol (ARP) is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks.

The OSI model`s third layer is equivalent to which layer in DOD model?

  1. Application

  2. Host-to-Host

  3. Transport

  4. Network

  5. Internet


Correct Option: E
Explanation:

The internet layer or IP layer is a group of internetworking methods, protocols, and specifications in the Internet protocol suite that are used to transport datagrams (packets) from the originating host across network boundaries, if necessary, to the destination host specified by a network address (IP address) which is defined for this purpose by the Internet Protocol (IP).

For a single IP address to facilitate multiple users to get connected with the global Internet, which network address translation flavor will help?

  1. Secure NAT

  2. Static

  3. Dynamic

  4. PAT

  5. DNAT


Correct Option: D
Explanation:

Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address.

Which protocol does DHCP use at the transport layer?

  1. IP

  2. TCP

  3. UDP

  4. ARP

  5. ICMP


Correct Option: C
Explanation:

The User Datagram Protocol (UDP) is one of the core members of the Internet protocol suite With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without prior communications to set up special transmission channels or data paths.

Which of the following protocols uses both TCP and UDP?

  1. FTP

  2. Telnet

  3. SMTP

  4. DNS

  5. RTP


Correct Option: D
Explanation:

The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities.

Using which protocol can a message with unknown destination network be sent back to it`s host of origin?

  1. TCP

  2. ARP

  3. ICMP

  4. BOOTP

  5. DHCP


Correct Option: C
Explanation:

The Internet Control Message Protocol (ICMP) is one of the core protocols of the Internet Protocol Suite. It is used by the operating systems of networked computers to send error messages indicating.

Which router command should be used to view the contents of all access lists completely?

  1. show access-lists

  2. show ip interface

  3. show log

  4. show flash

  5. show interface


Correct Option: A
Explanation:

Display access lists, this includes the number of displayed matches.

Internet layer encapsulates which segment into an IP packet by adding a header that includes the destination IP address?

  1. TCP

  2. ARP

  3. ICMP

  4. BOOTP

  5. DHCP


Correct Option: A
Explanation:

The Transmission Control Protocol (TCP) is one of the two original core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP.

The National Airspace Data Interchange Network has used which protocol to interconnect remote airfields with air route traffic control centres?

  1. NCP

  2. LCP

  3. ISDN

  4. HDLC

  5. X.25


Correct Option: E
Explanation:

The X.25 protocol, adopted as a standard by the Consultative Committee for International Telegraph and Telephone (CCITT), is a commonly-used network protocol. The X.25 protocol allows computers on different public networks to communicate through an intermediary computer at the network layer level.

- Hide questions