File Provider
File Provider
CN2216D
Mr. L Mashimbye
Semester 2 - 2024
Moderator
1.1 Which of the following OSPF components is responsible for computing the cost of each
route? [2]
A. Dijkstra's algorithm
B. Link-State database
C. Routing protocol messages
D. Adjacency database
E. Forwarding database
1.2 A company is expanding its business to other countries. All branch offices must remain
connected to corporate headquarters at all times. Which network technology is required to
support this scenario? [2]
A. LAN
B. MAN
C. WAN
D. WLAN
1.3 What is the recommended technology to use over a public WAN infrastructure when a
branch office is connected to the corporate site? [2]
A. ATM
B. ISDN
C. Municipal Wi-Fi
D. VPN
1.4 Which medium do service providers use to transmit data over WAN connections with
SONET, SDH, and DWDM? [2]
A. Fiber optic
B. Satellite
C. Wi-Fi
D. Copper
1.5 Which statement describes a characteristic of a WAN? [2]
A. A WAN operates within the same geographic scope of a LAN, but has serial links.
B. WAN networks are owned by service providers.
C. All serial links are considered WAN connections.
D. A WAN provides end-user network connectivity to the campus backbone.
2.1 Following the construction of the SPF tree, the optimal pathways to each network are
presented to the IP routing table. The graphic below depicts the paths to each Router,
calculate the cost to each destination. [4]
2.2 When an ACL is applied to an interface, a certain operational procedure is followed. List
and explain the operational procedures taken when traffic enters a router interface that is
configured with an inbound standard IPv4 ACL. [8]
The router extracts the source IPv4 address from the packet header.
The router starts at the top of the ACL and compares the source IPv4 address to each
ACE in a sequential order.
When a match is made, the router carries out the instruction, either permitting or
denying the packet, and the remaining ACEs in the ACL, if any, are not analysed.
If the source IPv4 address does not match any ACEs in the ACL, the packet is discarded
because there is an implicit deny ACE automatically applied to all ACLs.
Question 3. [18]
3.1 Networks are commonly implemented using private IPv4 addresses, as defined in RFC
1918. The range of addresses included in RFC 1918 are included in the following table.
Complete the table below with IPV4 address space. [6]