1
GANADIPATHY TULSI’S JAIN ENGINEERING COLLEGE Department of Electronics and Communication Engineering in association with
GTEC Cisco Academy “COMPUTER NETWORKS” Workshop – Skill Test Date: ____________________ Name of the Student: _____________________________________________
Reg. No: ________________________
College Name & Code: __________________________________________________________________________________ Email & Mobile Details: ________________________________________________________________________________ Marks scored: _____ out of 25 --------------------------------------------------------------------------------------------------------------------------------------------------01. Which statements correctly identify the role of intermediary devices in the network? (Choose three.) [A] determine pathways for data
[D] originate the flow of data
[B] initiate data communications
[E] manage data flows
[C] retime and retransmit data signals
[F]
final termination point for data flow
02. What are two functions of encapsulation? (Choose two.) [A] tracks delay between end devices
[D] identifies pieces of data as part of the same
[B] enables consistent network paths for
communication
communication
[E] ensures that data pieces can be directed to
[C] allows modification of the original data
the correct receiving end device
before transmission 03. What is a primary function of the trailer information added by the data link layer encapsulation? [A] supports error detection
[D] identifies the devices on the local network
[B] ensures ordered arrival of data
[E] assists intermediary devices with processing
[C] provides delivery to correct destination
and path selection
04. Which two layers of the OSI model have the same functions as the TCP/IP model? (Choose two.) [A] Network
[C] Physical
[B] Transport
[D] Data Link
All the best
[E] Session
2 05. What is a PDU? [A] corruption of a frame during transmission
[C] retransmitted packets due to lost
[B] data reassembled at the destination
communication [D] a layer specific encapsulation
06. Which characteristic correctly refers to end devices in a network? [A] manage data flows
[C] retime and retransmit data signals
[B] originate data flow
[D] determine pathways for data
07. What device is considered an intermediary device? [A] file server
[D] printer
[B] IP phone
[E] switch
[C] laptop 08. Which three statements best describe a Local Area Network (LAN)? (Choose three.) [A] A LAN is usually in a single geographical area. [B] The network is administered by a single organization. [C] The connection between segments in the LAN is usually through a leased connection. [D] The security and access control of the network are controlled by a service provider. [E] A LAN provides network services and access to applications for users within a common organization. [F]
Each end of the network is generally connected to a Telecommunication Service Provider (TSP).
09. What do routers use to select the best path for outgoing data packets? [A] ARP tables.
[B]
Bridging tables.
[C]
Routing tables.
10. What is the primary purpose of Layer 4 port assignment? [A] to identify devices on the local media
[D] to identify the source and destination end
[B] to identify the hops between source and
devices that are communicating
destination
[E] to identify the processes or services that
[C] to identify to the intermediary devices the
are communicating within the end devices
best path through the network 11. Which layer encapsulates the segment into packets? [A] physical
[C] network
[B] data link
[D] transport
All the best
3 12.
Refer to the exhibit. Which three labels correctly identify the network types for the network segments that are shown? (Choose three.) [A] Network A — WAN
[C] Network C — LAN
[E] Network C — WAN
[B] Network B — WAN
[D] Network B — MAN
[F]
Network A – LAN
13. What can be identified by examining the network layer header? [A] the destination device on the local media
[C] the bits that will be transferred over the media
[B] the destination host address
[D] the source application or process creating the data
14. Which application layer protocol is commonly used to support for file transfers between a client and a server? [A] HTML
[B] HTTP
[C] FTP
[D] Telnet
15. During the encapsulation process, what occurs at the data link layer? [A] No address is added.
[C] The physical address is added.
[B] The logical address is added.
[D] The process port number is added.
16. What is the proper order of the layers of the OSI model from the highest layer to the lowest layer? [A] physical, network, application, data link, presentation, session, transport [B] application, physical, session, transport, network, data link, presentation [C] application, presentation, physical, session, data link, transport, network [D] application, presentation, session, transport, network, data link, physical [E] presentation, data link, session, transport, network, physical, application 17. Which application layer protocol is commonly used to support for file transfers between a client and a server? [A] HTML
[B] HTTP
[C] FTP
All the best
[D] Telnet
4 18. Which of the following describes the function of a WAN? [A] Connects peripherals in a single location.
[C] Provides connectivity on a LAN.
[B] Connects multiple networks in a single
[D] Provides connectivity over a large
building.
geographic area.
19. Refer to the exhibit. What type of network is shown? [A] WAN [B] MAN [C] LAN [D] WLAN
20. In an IPv4 environment, what information is used by the router to forward data packets from one interface of a router to another? [A] destination network address
[C] source MAC address
[B] source network address
[D] well known port destination address
21. Which email components are used to forward mail between servers? (Choose two.) [A] MDA
[C]
[B] IMAP
[D]
MTA POP
[E]
SMTP
[F]
MUA
22. What are two features of the User Datagram Protocol (UDP)? (Choose two.) [A] flow control
[D]
connection-oriented
[B] low overhead
[E]
sequence and acknowledgements
[C] connectionless 23. What information is added during encapsulation at OSI Layer 3? [A] source and destination MAC
[C]
source and destination port number
[B] source and destination application protocol
[D] source and destination IP address
24. Which is an important characteristic of UDP? [A] acknowledgement of data delivery
[C] high reliability of data delivery
[B] minimal delays in data delivery
[D] same order data delivery
25. In a connectionless system, which of the following is correct? [A] The destination is contacted before a packet is sent. [B] The destination is not contacted before a packet is sent. [C] The destination sends an acknowledgement to the source that indicates the packet was received. [D] The destination sends an acknowledgement to the source that requests the next packet to be sent.
All the best