Midsem Questions and Answers - Adv. Networking
Midsem Questions and Answers - Adv. Networking
21/07/2024
Acknowledgement:
Credit to God Almighty for strength and life. Credit to Joseph Kharma Aaron for his
explanations on some of the questions whose understanding I was not clear with. Finally
thanks to Mabel Buabeng for prove reading with me to edit out the mistakes.
SET A QUESTIONS
1. Computers, Laptops and Servers are which type of Network devices?
A. Connecting devices
B. Switching devices
C. End devices
D. None of the above
End devices are devices that connect to a network to send or receive data, but they do not forward data
to other devices on the network. Examples of end devices include:
- Computers
- Laptops
- Servers
- Printers
- Smartphones
End devices are the ultimate destinations for data transmissions, and they use the network to
communicate with other end devices or access network resources.
A. Connecting devices: This term is not commonly used in networking. However, it could refer to devices
that connect other devices to a network, such as switches or routers. But computers, laptops, and
servers are not typically considered connecting devices.
B. Switching devices: Switches are network devices that forward data packets between devices on the
same network. They are not end devices, but rather a type of networking hardware that connects
multiple devices together.
2. Which of the cable should be used when you are fresh user to Cisco Packet Tracer?
A. Automatic cables
B. Manual cables
C. Copper cables
D. Megabit cables
In Cisco Packet Tracer, Automatic cables are the default cable type that can be used to connect devices.
They are a type of virtual cable that can automatically detect the correct connector type and speed for
the devices being connected.
When you are a fresh user to Cisco Packet Tracer, it is recommended to use Automatic cables because:
- They can automatically detect the correct connector type (e.g., RJ-45, Serial, etc.)
- They can automatically detect the correct speed for the devices being connected (e.g., 10Mbps,
100Mbps, etc.)
B. Manual cables: These cables require manual configuration of the connector type and speed, which
can be more complex and time-consuming.
C. Copper cables: This is a type of physical cable material, not a type of virtual cable in Cisco Packet
Tracer.
Compiled by Modesty Kwabena Azaloo, GCR L400 ICTE…UEW…. 21/07/2024
D. Megabit cables: This is a term that refers to the speed of a network connection (e.g., 10 Megabits per
second), not a type of virtual cable in Cisco Packet Tracer.
Note: In Cisco Packet Tracer, you can also use other types of cables, such as Straight-Through, Crossover,
and Rolled cables, but Automatic cables are the most convenient and easiest to use,
especially for beginners.
A cross-over cable is a type of Ethernet cable that is used to connect two similar devices directly
to each other, such as two computers, or a computer to a switch or hub without an
intermediate device like a router. In a cross-over cable, the transmit (TX) and receive (RX) lines
are crossed over between the two ends of the cable, hence the name "cross-over". This allows
the devices to communicate properly without needing a switch or hub to swap the transmit and
receive signals.
C. Three
D. Four
2. Dynamic Host Configuration Protocol (DHCP): Automatically assigning an IP address from a pool of
available addresses.
A hub is a simple network device that connects multiple devices together, but it is not as intelligent as a
switch. Hubs are less common today, as switches have become the standard for connecting devices in a
network.
7. How many ways can connection be tested in cisco packet tracer? 2 ways…. That is through ping
and simulation
In Cisco Packet Tracer, connections between devices can be tested in two primary ways:
1. Ping Test: This tests connectivity between devices by sending ICMP echo requests and receiving
ICMP echo replies. It verifies if the devices can communicate over the network.
2. Simulation Mode: This mode allows you to simulate data transfer between devices to test their
connectivity and the functionality of the network.
These are the two main methods available in Cisco Packet Tracer to test connections between devices.
Encryption and decryption are functions of the Presentation layer (Layer 6) of the OSI model.
The Presentation layer ensures that data is presented in a format that can be understood by the
receiving device.
A. Network (Layer 3): Responsible for routing, addressing, and congestion control.
C. Datalink (Layer 2): Responsible for error-free transfer of data frames between two devices on
the same network.
D. Transport (Layer 4): Responsible for reliable data transfer between devices, including error
detection and correction, segmentation, and reassembly.
Note: The OSI model is a 7-layered framework for designing and implementing computer
networks. While the OSI model is not directly used in modern networks, its layers and functions
are still relevant and widely referenced.
Fiber optic cables use light pulses to transmit data, which allows for very high data transfer
rates. They have much greater bandwidth and can transmit data over longer distances
compared to other types of cables like coaxial cables, telephone lines, or untwisted wires.
Therefore, fiber optic cables are widely used in modern telecommunications and networking for
their speed and reliability.
Compiled by Modesty Kwabena Azaloo, GCR L400 ICTE…UEW…. 21/07/2024
11. What is the difference between NODE and HOST in a network setup? 5mks
Node refers to any device connected in a network that can send and receive information whiles
a Host is any device on a network that has been assigned an IP Address and can be accessed or
communicated with.
12. List three (3) protocols located in the Application layer of the OSI model. 3mks
The Application layer of the OSI (Open Systems Interconnection) model is the topmost layer and
includes protocols that directly interact with end-user applications. Here are three protocols located in
the Application layer:
o HTTP is the foundation of data communication for the World Wide Web. It defines how
messages are formatted and transmitted, and how web servers and browsers should
respond to various commands.
o SMTP is used for sending and receiving email. It defines the standards for mail
transmission across networks and is responsible for transferring email messages
between servers.
o FTP is used for transferring files between a client and a server on a computer network. It
provides a simple and reliable way to exchange files over TCP/IP networks such as the
Internet.
These protocols are essential for various applications that require communication over networks, such
as web browsing, email services, and file transfers. Each protocol defines specific rules and formats for
communication at the Application layer of the OSI model.
SET B QUESTIONS
1. Node is a type of device capable of sending and receiving data.
2. The Data Link layer packages the higher layer data into frames.
Frames are units of data at the Data Link layer of the OSI model. They encapsulate the packets
or datagrams received from the Network layer and add a header and sometimes a trailer to
form a complete frame. Frames include information such as source and destination MAC
addresses (in Ethernet networks), error-checking data, and control information necessary for
Compiled by Modesty Kwabena Azaloo, GCR L400 ICTE…UEW…. 21/07/2024
the transmission of data over the physical medium. Each type of Data Link layer protocol (such
as Ethernet or Wi-Fi) defines its own frame structure and rules for data transmission.
3. When using ……………………………………. Address, packets are delivered to all nodes in a network.
A. Unicast
B. Multicast
C. Broadcast
D. Internet protocol
The correct answer is C. Broadcast.
When using a Broadcast address, packets are delivered to all nodes in a network. Broadcast
addressing is a method of sending data to all devices on a network, rather than a specific device.
This is typically used for network-wide announcements or updates.
A. Unicast: Unicast addressing is used to send data to a specific device on a network. Packets are
delivered to a single node.
D. Internet protocol: Internet Protocol (IP) is a protocol used for addressing and routing packets,
but it's not a type of address that determines packet delivery.
- Unicast: one-to-one
- Multicast: one-to-many
- Broadcast: one-to-all
4. Which of the following protocols is used for sending emails?
A. SMTP
B. FTP
C. HTTP
D. TCP
The protocol used for sending emails is A. SMTP (Simple Mail Transfer Protocol).
SMTP is specifically designed for sending and receiving email messages between
servers. It defines the standards for mail transmission across networks and ensures that
emails are reliably delivered from the sender's email client or server to the recipient's
email server. Therefore, SMTP is the correct answer among the options provided.
Compiled by Modesty Kwabena Azaloo, GCR L400 ICTE…UEW…. 21/07/2024
5. A device that network traffic can use to leave one network and go to a different network is?
A. Gateway
B. Switch
C. Hub
D. Bridge
The correct answer is A. Gateway.
A gateway is a device that connects two or more networks together and allows network traffic
to flow between them. It is a "gate" between networks, hence the name. Gateways are typically
used to connect a local area network (LAN) to a wide area network (WAN), such as the Internet.
B. Switch: A switch is a device that connects multiple devices within a single network. It is used
to forward data packets between devices on the same network, but it does not connect to other
networks.
C. Hub: A hub is a simple network device that connects multiple devices together, but it does
not have the intelligence to route traffic between networks.
D. Bridge: A bridge is a device that connects two networks together, but it operates at the data
link layer (Layer 2) of the OSI model, whereas a gateway operates at the network layer (Layer 3).
A bridge is used to connect two networks that use the same protocol, whereas a gateway can
connect networks that use different protocols.
- Routers (which are often used as gateways between a LAN and the Internet)
- Firewalls (which can act as gateways between a LAN and the Internet)
- Proxy servers (which can act as gateways between a LAN and the Internet)
In summary, a gateway is a device that allows network traffic to leave one network and enter
another network, whereas a switch, hub, and bridge are devices that operate within
a single network.
IPv4 (Internet Protocol version 4): This is the original version of the Internet Protocol
and is still widely used today. IPv4 addresses are 32-bit numerical addresses written in
decimal format (e.g., 192.168.0.1). However, the pool of available IPv4 addresses is
running out due to the rapid growth of the internet-connected devices.
IPv6 (Internet Protocol version 6): IPv6 was developed to address the limitations of
IPv4, primarily the exhaustion of available addresses. IPv6 addresses are 128-bit
numerical addresses written in hexadecimal format (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334). IPv6 provides a vastly larger address space
and includes built-in features such as improved security and efficiency.
Therefore, the correct answer is B. Two versions of IP addresses: IPv4 and IPv6.
In networking, data is typically broken down into smaller units called packets at the
Network layer (Layer 3) of the OSI model or the Internet layer of the TCP/IP model.
These packets include not only the data being transmitted but also headers that contain
routing and addressing information necessary for the data to reach its destination. Packets
are then forwarded through the network based on the destination address until they reach
the intended recipient.
• Transport Layer (Layer 4): Provides reliable data transfer services between end systems,
including error recovery and flow control. It does not directly handle encryption or decryption
either.
Therefore, the correct answer to your question is B. Presentation Layer.
In traditional Ethernet networks, when connecting devices of the same type (such as PC
to PC or switch to switch), a crossover cable is required because it swaps the transmit and
receive lines between the two ends of the cable. This allows each device to transmit on
the correct line of the other device, enabling direct communication.
Remote Desktop Protocol (RDP) is a protocol used to access a remote computer over a network
connection. It allows a user to connect to a remote computer and access its desktop,
applications, and resources as if they were physically present at the remote computer.
- Telnet: a protocol used for remote access to a computer, but it is not as secure as RDP and is
typically used for command-line access.
- SSH (Secure Shell): a protocol used for secure remote access to a computer, but it is typically
used for command-line access and is not as widely used for remote desktop access as RDP.
- VNC (Virtual Network Computing): a protocol used for remote desktop access, but it is not as
widely used as RDP.
- HTTP (Hypertext Transfer Protocol): a protocol used for transferring data over the internet, but
it is not typically used for remote desktop access.
Compiled by Modesty Kwabena Azaloo, GCR L400 ICTE…UEW…. 21/07/2024
RDP is widely used for remote desktop access in Windows environments, and is also used in
some Linux and macOS environments. It provides a secure and reliable way to access remote
computers, and is often used for remote work, technical support, and administrative tasks.
11. Write the private IP address for Class A, B and C. 6mks
Class A Private IP Address …….. 10.0.0.0 – 10.255.255.255
Class B Private IP Address …….. 172.16.0.0 – 172.31.255.255
Class C Private IP Address …….. 192.168.0.0 – 192.168.255.255
12. What is the difference between Bandwidth and Throughput? 4mks
Bandwidth refers to the maximum data transfer rate of a network or internet connection whiles
throughput refers to the amount of data that successfully passes through a network or network
device over a certain period of time.
Bandwidth and Throughput are related terms in networking, but they refer to different aspects
of data transmission:
1. Bandwidth:
o Bandwidth refers to the maximum data transfer rate of a network or internet
connection. It is typically expressed in bits per second (bps) or multiples thereof (kbps,
Mbps, Gbps).
o In simpler terms, bandwidth represents the capacity of the communication channel to
transmit data.
o For example, if you have a network connection with a bandwidth of 100 Mbps, it means
that theoretically, data can be transmitted at a maximum rate of 100 million bits per
second.
2. Throughput:
o Throughput, on the other hand, refers to the actual amount of data that successfully
passes through a network or network device over a certain period of time.
o It is the measure of how much data is actually transferred over the network in a given
timeframe, considering factors such as network congestion, packet loss, and protocol
overhead.
o Throughput is usually measured in the same units as bandwidth (bps, kbps, Mbps, etc.),
but it represents the effective data transfer rate rather than the maximum theoretical
rate.
o Real-world throughput is often lower than the theoretical bandwidth due to various
factors that affect data transmission efficiency.
Key Differences:
• Bandwidth is the maximum capacity or speed of data transfer that a network or communication
channel can handle.
• Throughput is the actual amount of data transferred successfully over a network or
communication channel in a specific period.
In summary, bandwidth refers to the potential speed of a connection, while throughput reflects
the actual speed experienced during data transmission under real-world conditions.
Compiled by Modesty Kwabena Azaloo, GCR L400 ICTE…UEW…. 21/07/2024
SET C QUESTIONS
1. Full form of NAT is ……………………………………………………………………………………………………………………….
The full form of NAT is Network Address Translation.
Network Address Translation (NAT) is a process used in networking to remap one IP address
space into another by modifying network address information in the IP header of packets while
they are in transit across a traffic routing device. NAT enables multiple devices on a local
network to share a single public IP address for communication with the Internet, thus
conserving public IP addresses.
There are several types of NAT:
• Static NAT: Maps a single private IP address to a single public IP address.
• Dynamic NAT: Maps a private IP address to a public IP address from a pool of public addresses.
• PAT (Port Address Translation): Maps multiple private IP addresses to a single public IP address
using different ports.
NAT plays a crucial role in IPv4 networks, where the number of available public IP addresses is
limited, and it helps manage the distribution of IP addresses effectively.
2. Which of the following colours below indicate that there is a stable connection?
A. Red
B. White
C. Green
D. Blue
In many user interfaces and network devices, green is commonly used to signify that a
connection is active, stable, or in a good state. This can apply to various contexts such as
network status indicators, LED lights on networking equipment, or icons in software
applications. Green typically represents a positive status, indicating that devices are
connected and functioning properly.
3. Which of the following protocols is used to transfer files between two computers?
A. FTP
B. TCP
C. IP
D. UDP
FTP is specifically designed for transferring files between computers over a network.
TCP (Transmission Control Protocol), IP (Internet Protocol), and UDP (User Datagram
Compiled by Modesty Kwabena Azaloo, GCR L400 ICTE…UEW…. 21/07/2024
Protocol) are other types of protocols used in networking, but they serve different
purposes and are not specifically designed for file transfer like FTP is.
Straight through cables are used for connecting unlike/dissimilar devices, such as a
computer to a switch.
7. The loss in signal power as light travels down the fiber is called?
A. Propagation
B. Attenuation
C. Scattering
D. Absorption
Attenuation is the loss in signal power as light travels down the fiber.
• 192.168.321.10: The number 321 is outside the valid range (0-255) for an octet.
• 1.888.234.3256: The numbers 888 and 3256 are outside the valid range (0-255) for an octet.
• 984.12.787.76: The numbers 984 and 787 are outside the valid range (0-255) for an octet.
9. I am a layer, software or device trusted and untrusted network. My function is to deny or permit
traffic access travelling into and out of the network. Who am I?
A. Encryption
B. Router
C. Firewall
D. Server
UDP operates at the transport layer, while IP (Internet Protocol) operates at the network
layer, and HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) operate
at the application layer.
Network congestion can lead to slower performance, increased latency, and packet loss.
12. The Data Link layer has two (2) sublayers. Name them. 4mks