Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views3 pages

Data Com - Network Dev

The document contains a series of multiple-choice questions related to networking concepts, including protocols, OSI and TCP/IP models, subnetting, and data transmission methods. Key topics include the use of Telnet for remote access, the function of TCP and UDP ports, and the characteristics of IPv6 addresses. It also addresses network topologies and flow control mechanisms.

Uploaded by

gemechisgadisa77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views3 pages

Data Com - Network Dev

The document contains a series of multiple-choice questions related to networking concepts, including protocols, OSI and TCP/IP models, subnetting, and data transmission methods. Key topics include the use of Telnet for remote access, the function of TCP and UDP ports, and the characteristics of IPv6 addresses. It also addresses network topologies and flow control mechanisms.

Uploaded by

gemechisgadisa77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Which of the following protocol used to provide remote access to servers and networking devices
through plaintext?
A. Telnet C. ICMP
B. SMTP D. SSH
2. Which PDU is processed when a host computer is de-encapsulating a message at the network layer of
the TCP/IP model?
A. Packet C. Bits
B. Segment D. Frame
3. What is the complete range of TCP and UDP well-known ports?
A. 0 to 255 C. 256 to 1023
B. 0 to 1023 D. 1024 to 49151

4. Which of the following network device repeats incoming data frames only to the computers to which a
frame is addressed by using MAC address?

A. Active hub C. Switch


B. Router D. Firewall

5. Which of the following application uses UDP as a transport layer protocol?


A. File Transfer Protocol (FTP) D. Simple Network Management Protocol
B. Hyper Text Transfer Protocol (HTTP) (SNMP)
C. Simple Mail Transfer Protocol (SMTP)

6. Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity
between two network devices?
A. ACK and FIN C. URG and SEQ
B. FIN and Checksum D. ACK AND SYNC

7. Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP
model?
A. Application, Presentation and C. Application, Session and Datalink
Transport D. Application, Presentation and Session
B. Session, Transport and Network

8. Which of the following is NOT a primary responsibility of Transport layer Protocols?

1
A. Identifying the proper application
B. Subnetting
C. Tracking individual communication
D. Segmenting
9. Which of the following statement is true about IPv6 addresses?
A. Leading zeros are not required.
B. Two colons (::) are used to represent successive hexadecimal fields of zeros.
C. Two colons (::) are used to separate fields.
D. A single interface will have multiple IPv6 addresses of different types.
10. A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The
company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively.
Which two networks would achieve that?
A. 192.168.1.16/28 and 192.168.1.64/27
B. 192.168.1.64/27 and 192.168.1.128/27
C. 192.168.1.64/27 and 192.168.1.96/28
D. 192.168.1.96/28 and 192.168.1.192/28
11. Which of the following transmission media is the most commonly used for LAN communication?

A. Coaxial Cable C. Twisted Pair Cable


B. Optical Fiber D. Satellite

12.
13. Which statement describes the half-duplex mode of data transmission?
A. Data that is transmitted over the network flows in both directions at the same time.
B. Data that is transmitted over the network flows in one direction to many different destinations
simultaneously.
C. Data that is transmitted over the network flows in one direction at a time.
D. Data that is transmitted over the network can only flow in one direction.

14. A Network engineer has been asked to develop a physical topology for a network that provides a high
level of redundancy. Which physical topology requires that every node is attached to every other node
on the network?

2
A. Mesh C. Hierarchical
B. Extended Star D. Bus
15. What method can be used by two computers to ensure that packets are not dropped
because too much data is being sent too quickly?
A. Encapsulation C. Access method
B. Flow control D. Response timeout

You might also like