Revision Questions Final2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Course Name: CCNA I

Revision Questions

Answer the following Questions:


Question (1):
For each of the following multiple choice questions, select ONLY the ONE correct answer:
1. A doctor at his clinic wants to make an appointment for a patient. In order to do this, the doctor needs
to access the booking system on the internal server at the hospital. What type of network would the
doctor access?
a) An intranet b) The internet
c) An extranet d) A local Area Network

2. An employee at a branch office of the company is selling a car for a customer. In order to do this, the
employee needs to access confidential pricing information on internal servers at the Head Office of
the company. What type of network would the employee access?
a) The internet b) An extranet
c) An intranet d) A local Area Network

3. What is a characteristic of multicast messages?


a) They are sent to all hosts on a b) They are sent to a group of hosts.
network.
c) They must be acknowledged. d) They are sent to a single
destination.

4. Which name is assigned to the transport layer PDU?


a) Bits b) Packet
c) Data d) Segment

5. Which of the communication modes support two-way traffic but only one direction at a time?
e) Full duplex f) Simplex
g) Three - quarter's duplex h) Half-duplex

6. Which field in the IPv4 header is used to limit the life time of a packet
e) TTL f) Sequence Number
g) Differentiated Services h) Acknowledgment Number

7. The network portion in the IPv4 address 172.17.20.1/16 is


e) 172.17.20 f) 172.17
g) 172 h) 172.17.20.1

8. Which of the transport layer protocols is connectionless?


e) TCP f) Ethernet
g) IP h) UDP
1/7
Course Name: CCNA I

9. The Protocol Data Unit Encapsulation (PDU) is completed in which order?


a) Bits, frames, packets, segments, data b) Data, bits, segments, frames, packets
c) Data, segments, packets, frames, bits d) Packets, frames, bits, segments, data

10. Which protocols provide reliable data transfer?


a) TCP b) Both TCP and UDP
c) UDP d) None of them

11. Refer to the exhibit, answer the following questions

A. Identify the default gateway IP address of the PC2


a) 192.168.10.1 b) 192.168.10.10
c) 192.168.11.1 d) 192.168.11.0

B. What class does IP address of PC1 belong to?


a) Class A b) Class C
c) Class B d) Class D

C. The subnet mask of IP address of PC1 is


a) 255.0.0.0 b) 255.255.0.0
c) 255.255.255.192 d) 255.255.255.0

D. The IP address of PC2 is


a) Private address b) APIPA
c) Real address d) Loopback address

E. Are PC1 and PC2 in the same network?


a) Yes
b) No
12. The three-way handshake exhibits below, answer the following questions

2/7
Course Name: CCNA I

31

A. A three-way handshake is used to establish the connection in which protocol


a) IP and TCP b) IP and UDP
c) TCP d) UDP

B. What is the first step 1 in a three-way handshake?


1
e) Send SYN,ACK f) Send FIN
g) Send ACK h) Send SYN

C. What is the second step 2 in a three-way handshake?


i) Send SYN,ACK j) Send FIN
k) Send ACK l) Send SYN

D. What is the third step 3 in a three-way handshake?


m) Send SYN,ACK n) Send FIN
o) Send ACK p) Send SYN

E. To terminate this connection , PC A must send


q) SYN r) SYN,ACK
s) RST t) FIN
13. PDU for Application layer in TCP/IP
a) Segment b) Data
c) Packet d) Frame

14. What is the main function of Transport layer?


e) Provide encryption f) Provide end to end delivery
g) Send data physically h) Data formatting

15. Which statement describes the IP address 10.16.3.65/23


i) The first host address in the subnet is 10.16.2.1
j) The broadcast address is 10.16.3.251
k) The subnet mask is 255.255.255.0
l) The last valid host address in the subnet is 10.16.3.250

3/7
Course Name: CCNA I
16. A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as
shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to
provide connectivity between the hosts?

m) A rollover cable should be used in place of the straight-through cable.


n) A crossover cable should be used in place of the straight-through cable.
o) A default gateway needs to be set on each host.
p) The subnet masks should be set to 255.255.255.192

17. What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses
the 255.255.255.224 subnet mask?
i) 14 j) 6
k) 62 l) 30

18. You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which subnet mask would
you use?
e) 255.255.255.192 f) 255.255.255.224
g) 255.255.255.248 h) 255.255.255.240

19. You have a network that needs 29 subnets. How many bits must you borrow from the host field to
provide the correct subnet mask?
a) 2 b) 3
c) 5 d) 4

20. What is the network ID of a host with an IP address of 172.16.66.0/21?


a) 172.16.36.0 b) 172.16.64.0
c) 172.16.48.0 d) 172.16.0.0

21. What is the first host in a network has a host with an IP address of 172.16.66.0/21?
e) 172.16.36.1 f) 172.16.64.1
g) 172.16.48.1 h) 172.16.0.1

22. What is the last host in a network has a host with an IP address of 172.16.66.0/21?
i) 172.16. 71.254 j) 172.16.64.255
k) 172.16.71.255 l) 172.16.66.254

23. The network address of 172.16.0.0/19 provides how many subnets and hosts?
4/7
Course Name: CCNA I

e) 7 subnets, 30 hosts each f) 8 subnets, 2,046 hosts each


g) 8 subnets, 8,190 hosts each h) 7 subnets, 2,046 hosts each

24. What is the main function of Transport layer?


a) Provide encryption
b) Send data physically
c) Provide end to end delivery
d) Data formatting

25. The sublayer of the data link layer performs data link functions that depend upon the type of medium
a) logical link control sublayer b) network interface control sublayer
c) media access control sublayer d) error control sublayer

26. Which function is performed at the MAC sublayer of the OSI data link layer (choose three)?
a) Implements a trailer to detect transmission errors.
b) It provides data link layer addressing
c) It identifies which network layer protocol is being used for the frame.
d) Communicates between the networking software at the upper layers and the device
hardware at the lower layers.
e) Adds Layer 2 control information to network protocol data.
f) Controls the NIC responsible for sending and receiving data on the physical
medium

27. Which of the following is a data link protocol?


a) IP b) TCP
c) PPP d) all of the mentioned

28. The data link layer is divided into sublayer of


a) LLC and MAC b) MAC and ACKs
c) LAN and MAC d) LLC and WAN

29. Which network topology is suitable to establish the communication between two wireless hosts?
a) Ad hoc b) Ring
c) Infrastructure mode d) Star

30. In IEEE 802.11 the technology used for the collision avoidance is
a) CSMA/CD b) CSMA/CA
c) IBSS d) None of the above

31. Each host on an Ethernet network has a unique ...........address printed on its NIC
5/7
Course Name: CCNA I

a) 128 bit b) 32 bit


c) 48 bit d) None of the above

32. What is contained in the header of a data-link frame?


a) logical address b) physical address
c) error detection d) None of the above

33. During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet
network?
a) An IP address is added b) The logical address is added
c) The physical address is added d) The process port number is added

34. Which frame forwarding method receives the entire frame and performs a CRC check to detect errors
before forwarding the frame?
a) cut-through switching b) fragment-free switching
c) store-and-forward switching d) None of the above

35. Which switching method has the lowest level of latency?


a) cut-through switching b) fragment-free switching
c) store-and-forward switching d) None of the above

36. Which type of UTP cable is used to connect a PC to a switch port?


a) console b) rollover
c) crossover d) straight-through

37. Refer to the exhibit. All the connections are made through FastEthernet links. Which types of UTP cables can
be used to connect the devices?

a) 1 - crossover, 2 - crossover
b) 1 - straight-through, 3 – straight-through
c) 2 - rollover, 3 - straight-through
d) 1 - crossover, 2 - straight-through

6/7
Course Name: CCNA I

Question (2): (5 Marks)


Write ONLY the missing word(s) in the following sentences in the designated space.
a) The …………………….sublayer is responsible for the CSMA/CD access method and frame
addressing
b) The…………………….layer consists of LLC sublayer and the MAC sublayer
c) To detect the collision on half duplex Ethernet LANs, …………………….was invented

Question (3): (5 Marks)

State whether each of the following statements is true (√) or false (×). Put your answer (√ or ×) in in
the designated space.
a) Routers operate at the Application layer of the OSI reference model (…..).
b) The IP address 220.30.10.1 is class B and private address (…..).
c) A LAN connects large geographical area (…..).
d) MAC address is 32 bits expressed in hexadecimal format (…..).
e) The minimum Ethernet frame length is 1518 byte (…..).
f) In MAC sublayer, the access method to detect the collision is CSMA/CD (…..).

7/7

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy