0% found this document useful (0 votes)
51 views11 pages

DCN 01

Uploaded by

shobhrajmeena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views11 pages

DCN 01

Uploaded by

shobhrajmeena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

A NonProlcdency Linked Integrated DCN.

COurBe#01 RIC Western Realon YABB)

SECTION
A
Encircis the most appropriete answer. 50x150]

What is Unicode?
Represents symbol or characters used in any language
Only few languages are supported
C. Suppots only few characters
d. Characters from A to Z

Which part of a MAC addressis called.the organízatidy unique identifier (OUi)?


The first 24 bits, or 3 bytes
6. The first 12 bits, or 3 bytes
c. The first 24 bits, or 6 bytes
d. The first 32 bits, or 3 bytes

You have a class Anetwork addro0.0.0 h40 subnets,betareyoucequired to add 60


new subnets very soon. You wouldvike to stilatot for the largest pöaSblEMumber of host IDs
per subnet. Which subnet mask should you assi i
a. 255.240.0.0
b. 255.248.0.0
C. 255.252.0.0
(d. )255.254.0.0
The Internet Control Messag rotocol
a. alla ways to sene or trol nges to other gateways or hosts
b. des vurmunication Ethe Interms rotocol Software on one machine and
Internet Protocol Softieion another
Cioports error conditions to t riginal source, the source must relate errors to individual
Application programs and takeion to correct the problern
d of the above

Thelayer h e OSi model tha ovides services to end-user software is:


Appleaion
b. Sessio
C. Netwok
d. Physical

On the OSi model Network layer, what data transport functions are performed for the sending
rode
a Data are fomatted into datagrams andNetwork layer headers are added
b. Data are formatted into packets.and Layer 2 headers are added
C. Data are forrmatted intoframes and Layar 3 headers are added
d. Data are broken into packets and Network layer headers are added

Avii Avistion Training Colege,Alahabrd Page 3 u 18


A n Prsfzensy Linkeditegrated DCN Course#01 RIC Westem Resion VASS)
The Tin 10BaseT represents?
Tensie
(6 Twisted Pair
C. Telecommunication
d. Telephony
Which of the fofiowing statements is not a characteristic of Full-Duplex Ethemet?
a. Allows the simultaneous transmission and reception of different data packets
Requires two pairs of cables and a switched connection between the nodes
is considered a point-to-point connection and is nearty collision free
.)None of the above.
Which of the folowing statements is not a characteristitof LAN segmentation with a switch?
a. Switches ekminate the impact of colisions through microsegmentation
(6 Creates a large colision-free domain from smaler colision domains
C. Low latency and high frame-forwargigg rates at aach interface port
. Works with existing 802.3-compe NICs and cabing
To view the contents of NVRAMw and
a. show un-config
b. show mem
C)showstartup-config
. show lash
. o Port
those listod, which vA ssidgrent metod is bypicaly used?
b. 1PX addross
c. IP address
3. MAGaddreba
NThe maximum number of tops wsirg Pe Routing intomation Protocol is
a. 12 hops
15 hops
C 32 hops
There is no m
Which memorytype hokts tne OSmage fior he router?
a.ROM
Flash
RAM
d. NVRAM
What would the subnel mask be we added 10 subretbits tothe defautsubnetmaskfor a
Class A IP address?
a. 255.192.0.0
255.255.224.0
255.255.192.0
d. 255.240.0.0
Avaton Trainng Cobege, Alahabad Page 4 of 18
AN Non Profkciency.inked Inteoreted DCN Courset01 RIC Western Region (VABB)

What is the first host address on the second valid subnet on the Class B network
with a subnet mask of 255.255.248.07 191.16.00
191.16.8.1
191.16.16.1
C. 191.16.12.1
191.24.16.1
Which of
the following statements is/are true
regarding to addresses?
Stubmer id a. The network portion of an IP address can be setIP all binary ones or all binary zeros.
Seabnt dned
Camb i e . b) The subnet portion of an IP address can be set to alf binary ones or all binary zeros
The host address portion of an IP address canotbe set to all binary ones
zeros. t becomad
or al
binary
Broad tasand NetERetspecive
d. The network 127.x.x.x can be used as
e. None of the above.
a.network address.

The roll over cable is used to


a. Connect DTE to DCE
b. Connect EITHER DTE to DoR D SOpCE
C. To configure router via console port
d. Connect two PCs

.What will be the muticasyiAC address if the muticast IP is 224.0.0.6


a 01:00:5d:01:00:06 .

6) 01:00:5e:01:00:06
C. f:f:ffff:ff:ff
B01005@:00:00.06
SA simpe cabling method, known as the topology, allows about 30 computers on a
maximum cable length of about 600 feet.
a. Star
Ring
Bus
d. Tree

What sets thenumber of IP address bits used to make a match in an access list?
a. Range
b. Subnet mask
IP Class
wildcard mask
4.Whichof hefollowing is not an advantage of static routing?
8. The router doesn'thave to perfom calculations on the route.
The router doesn't have to send out updates about the path
CStatic routes are scalable
. Paths between the two routes are always known.

Civi Aviation fraining Coleg, Allahabad Paga 5 o 1


.Choose True statement for UDP
(a UDP does not provide coggstion control mechanism
6. UDP is statelesS
UDP provides flow control-and quality of service.
AH of the above
35.Whigh of the folowing modes provides a limited examination of the router and remote access?
(a.) User EXEC Mode
b. Giobal Configuration Mode
c. SETUP Mode
d. Privileged Exec Mode
AWhich of the following shows the proper designation fora fast ethernetinterface'0" and
subinterface"1" at slot "0"
a. fa1/0.0
fa 0/0.1
C. fa 0/1.0
d. None of the above

5.What command is used to enter a dafault route of 179.2.0?


a. Router IP defaultzpetwork 192.179.2.0
Route default 192
(c) IP default-networR2
. IP default 192.179.2.0255.258230.

EWhat metrigisused by a routentg deteine ie Bostroute to


routes fuiioitprerouting proaals
he a network when it learns of

a. Administrative Distance
b. Managerial Expanse
C. Executive Distance
d. Administrative Expenaei

7 You typédebug ip rip on your röuter console and see that 172.16.10.0 is beinga
you wittametric of 16, Whálidbes this mean?
a. The rooténs1 hops ay
The route has a to16 microseconds.
The route is inaceessible.
Theroute is queued at 16 messages a second

28.What is split horizon?


a. t splitsthe traffic when you have a large bus (hortzan) physical network.
Infomation about a route should not be sent back in the direction from which the original
update came.
C. t holds the regular updates from broadcasting to a downedlink
d. t prevenis regular update messsages from reinstating a route that has gone down

Civil Aviation Training College, Allahabad Page 6 of 18


RIC Western Region (VABB)
29Whigh of the following prompts is the prompt for interface conflguration mode?
a) Router(config-if}¥
b. Router(config-if)>
c. Router(config)
d. Routerfinterface#

S0.Which layer of the OSI model provides eror-free and reliable


Session packet delivery?
(b) Transport
C. Data Link
. Physical
3A network administrator wants to control whichi-user hosts can access the network based on
their MAC address. What will
prevent worksiatons with unauthorized MAC addresses from
connecting to the network through a swit
a. Access List
6) Port Security
C. Antlvirus
d. Firewall

.How will Spanning Tree,afføct the oporation of the network devices shown in the
graphic?

10Mbp
FO1

MAC:00d05e68.MSi MAC: 00d0.6068.f180

(a) Spanning Tree will blockdient ports that suffer from


D. Spañning Tree will leamicent MAC addresses excessive errors.
C. Spanning Ireewill
and assign them to switch ports.
allowthese switches to load balance across the redundant links to
increase netwöreithroüghput
d. Spanning Tree will leam which of the redundant links should be blocked.
33.What are four ways that a VLAN be implemented?
Port address, User 1D, MAC address, Network address
Port address, User ID, MAC address, Segment address
C. Socket Address, User D, MAC address; Segment address
d. Socket Address, User
ID, MAC address, Network address

Civil Aviation Training College,


Allahabad Page 7 of 18
.

used for?
4.Which type of connection should etraight-through cable be
a. switch to switch
b. switch to hub
(C.) switch lo router
d. router to PC

.Which of the following routing protpëols-support VLSM capabilities?


a RIP, EIGRP, IGRP
RIPv2, EIGRP, OSPF
ElGRP, IGRP, OSPF
d. RIPv2, IGRP, OSPF
K. Which of the following are private-lPddresses that cartbe assigned to a host?
a. 12.17.1.45
b. 172.15.255.248
192.168.1.5
d. 239.0.0.1
N.What is the broadcast ID of the sevith subna ereated using 172.16.0.0/28?
a. 172.16.111.0
b. 172.16.0.0
172.16.0.96
172.16.0.111

3Two connected routers areonfiguiee RIP routing. What will be the result when a router
receives a routing update thatcontains itiher cost path to a network already in its routin9
table:
Ttfe upua nfomation ded to thesting routing table.
THe update will be ignoreaniizno further action
C. The update will replace
theaisting routing table entry
d. The existing entry will be
dele from the routing table and all the connected routers will
agian start updating thel tablereach convergence.
39.What doesa switch do when aeme isfeceived on an
interface and the destination hardware
address is nknown or not in th tertable9
a, Forwar the switch totiegirst avallable link
b. Drops thesrage
C) Floods the nëwoth the frame looking for the device
A Sends back a message to the originatng station asking for a name resolution

46.Which of the following Is true regarding VLANs?


ab. You must haveat least two VLANs defined ineveryCiscoswitchednetwork.
All VLANs are configured at the fastest switch and, by defaut, propagate this information
to all other switches.
Youshould not have more than 10 switches in the same VTP domain.
VTP is used to send VLANInfomation to switches in a configured VTP domain.

Civil Aviation Training Coleg6, Allahabed Page 8 of 18


M.Assume that source S and
destination D are connected through two intermediate routers
labeled R. Determine how many times
each packet has to visit the network layer and the data
link layer during a transmission from S to D.

a. Network layer-4 times and Data link


layer-4 times
Network layer-4 times and Data link
layer-3 timés
CNetwork layer-4 times and Datalig ayer-6 timés
d. Network layer 2 times and
Date tayer-6 times
You system administrator and you want to deny access to a
are a
of computers with
addresses 1.30.16.0 to 1.30.31.0. Which wildcard mask would yougroup
use?
a 0.0.15.255
b. 0.0.255.255
C. 0.0.31.255
d. 0.0.127.255

Access lists are numbered. Which of the following ranges could be used for an IP access list?
. 600 699
(6 100 199
C. 800-899
d. None of the above

What is the default administrative disiapce for a RIP route?


130
120
C. 110
. 100
n link state roúting after.tbe tonstruction of link state packets new routes are
a. Bellman Ford agohtm computed using
b. DES algorithm
CDijkstra's algorithm
d. Leaky bucket algorithm

Civil Aviation Training College, Allahabad


Refer figure. Why would the network edministrator configure RA in this manner

to give students access to the Intemet


t o prevent students from accessing the command prompt of RA
C. to prevent administrators from accessing the console of RA
.to give edministrators access to the lnternet
Workstation A has been assigned an IP address of 192.0.10.24/28. Workstation B has been
assigned an IP address of 192.0.10.100/28. The two workstations are connected with aa
straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things
can be done to aliow communications between the hosts?

Replace the straight-through cable with a crossover cable.


2. Change the subnet mask of the hosts to /25.
3. Change the subnet mask of the hosts to /26.
4. Change the address of Workstation A to 192.0.10.15.
Change the address of Workstation B to 192.0.10.111.
1&2
1.2 &3
C. 3,4 &5
d. 2,4 8&5

do muiticast routing., each router.computes a


a. Binary tree
AVL tree
distribution treBe
Allof the above
WhichWhich of thedollowing P rese for owners of autonomous systems
233.0.0.08
230.0.0.0/8
233.0.0.0/16
Al ofthe above
Whal willbethe Gateway address of PC1, PC2 and PC3(assuming Class 8 defauit ask)lorthe
given ligure
PC1-172.16.40.6. PC2&PC3-172.16.50.10
b. PC1-1/2. 16.50.10, PC2& PC3 172.16.40.6
PC1PC2 &PC3 172.16.50 10
(d None of the above
Descriptive guestion (20 Marks]

Q1.1f you are given Network address =192.168.10.0/27. 4 Marks]


Fill up the following table.
btock si z G 6 214 32 numben ulbnut 8

The Subnet address


2-168 M2-168 42-168 142-163 16812-192-1m2-16
lo. o10.3210.64 1o6 10110.Go10-g20.2

92-168 92-168 A 2168 192-168| r92 6d M2-Ic 19218


The first valid host
10-33 '65.10.9310129oaSt1o1s1o-22

The last valid host 12-16 s112-182-168 2-168 92-48 192-163 2-16
10.3D o.621oq4 t0126 o 48to. 10-N2 1o.294
The Broadcast Address 192 73M2-168 92-1692-168 12-16 N2-8 112-Id
104 0-64S4s 10-2 -1{0-B11022
1041o-6S 10235

Subnet Mask |225.255258.224


No. Of Hosts-per Subnet numben host p e subna
2 = 30

Q.2 What is Wire Shark and wirent's any of two purposes.


3 Marks}
0.3 Write the CISCO IOS Commands for the following
.
[2 Marks
a) To copy start up config file to DRAM
b)
b To set enable secret as "CATC

Q4. Write Advantages and Disadvantages of Implementing NAT.


12 Marks}
Q5. Write short notes on access-list.
[2 Marks]

Civil Aviation Training Calln


a6. Complete the ARP Tablo of PC arid MAC Table of Switch in the given block for
the following network [4 Marks]

MAC TAE OF SWITCH APP TABLE OF DC2

SA 9 7cD.EIY bo-70D.Cu1 Fo/L| ARP pu SA oof.8 sI3


DA FEAE F E F E F E
DA FFE FPEAPrE o0eo F2-8466 Fo
64BC. SD31 Fof3
doB6 E4 CCPY fof4 FO

PC-9T
PC-FT PZ
PCO Fop 10.0.0.3
10.0.0.1 255.0.0.0
255.0.0.0 0001.6C.031
0009.CIDENS 950-2
SW
*
10.0.0.4
255.0.0.0
000B.BE34.CCD4
10.0.0.2
255.0.0.0
0OE0.8F21.846C FO
FO
PC-PT
PC3
ARP TABLE OF PC3
PC-PT
PCI AP TLE OF PC1
CC D4
ARP packet SA-DoD8 E
ARPackt o0EO 821 e46c
SA
DA-FAF EA EF FF FF
Imodio
Imado
DAA F f FeEFPFE

07. Match theolgwing: 3 Marks}

3ASWITCH ARegenerator
2B ROUTER 4 22Adress Strlpplng
C BRIDGE 3ASIC
D REPEATER 4Hetrogeneous LAN Translation
GATEWAY 5 48 bit MAC
wwwn

F Network Interface Card (NIC)6 Amplifier


e |7Layer4
8RJ11RJ11
19Layer 7
ar. Reaion YABEI
Question6
ANSWER SHEET
SECTION-A
Q.No. Ans Q.No. Ans Q.No. Ans
Q.No. Ans
P
PCO
B i0.0.0 1
A
30
31. 44
32. 45. w.0.0.2
33 6. 255.0.0.0
0008.8E D
34. 7
48. PC-#T
49 PCI
50 D
A 39
SECTION-B
Q.1 Network Address:192.168.10.0/27. Q.7 Match the following
mis6.10 168,10.428 92.166.10.140 192.168.10,192 192168.10.224
$2.166.165 EA6E10.128 92.45410.153 192.160.10.193 192.168.10.225
2.1E.K312.16e.E
W2.A.4s,10 E.158.10.222 2.168.10.254
92-166.10.158
24618126
19%.140.10.255
Broedcas
2.v, 7.106.0.19 193.198,30.233
Addreas
Subnet
255.255.255.224
Mask Page2 of12
Paga 1 of 2 Civ Aviation Trainay Caiaga. Alanabad
Civil Aviation Training Colege, iahabad

You might also like