0% found this document useful (0 votes)
6 views

Sample-Final- CSCI392

The document is a sample final exam for the CSCI392 Computer Networks course, consisting of multiple-choice questions and practical tasks related to network security, DHCP configuration, and routing. It includes questions on encryption, ARP spoofing mitigation, EtherChannel configurations, and port security settings. Additionally, it provides specific commands for managing DHCP and static routes in a network environment.

Uploaded by

92130063
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Sample-Final- CSCI392

The document is a sample final exam for the CSCI392 Computer Networks course, consisting of multiple-choice questions and practical tasks related to network security, DHCP configuration, and routing. It includes questions on encryption, ARP spoofing mitigation, EtherChannel configurations, and port security settings. Additionally, it provides specific commands for managing DHCP and static routes in a network environment.

Uploaded by

92130063
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CSCI392 Sample Final Exam

Department of Computer Science and Information Technology


Name ID
Course CSCI392 – Computer Networks Instructor
Date Time Duration
Pages 6 Calculators Not Allowed Documents Not Allowed

Question I:

Which of the following encrypts the data on a) DDoS


end-devices, which can be decrypted only if b) Ransomware
a payment is made? c) Virus
d) Worm

Which mitigation technique prevents ARP a) DAI


spoofing and ARP poisoning attacks? b) Firewalls
c) Port security
d) VPNs

An EtherChannel link using LACP was a) S1-passive and S2-passive


formed between two switches, S1 and S2. b) S1-on and S2-active
While verifying the configuration, which c) S1-on and S2-passive
mode combination could be utilized on both
d) S1-passive and S2-active
switches?

if more than one DHCP server is available acknowledgment, request, offer, discover
on the local network, in which order will request, discover, offer, acknowledgment
DHCP messages be sent between a host and discover, offer, request, acknowledgment
a DHCP server? request, acknowledgment, discover, offer

Consider the following command: a) exit interface


ip route 192.168.10.0 b) maximum number of hops to
255.255.255.0 10.10.10.2 5 the 192.168.10.0/24 network
What does the 5 at the end of the c) metric
command signify? d) administrative distance

Which command will allow a network a) Router# show running-config I


administrator to check the IP address section_dhcp
that is assigned to a particular MAC b) Router# show ip dhcp server
address? statistics
c) Router# show ip dhcp binding
d) Router# show ip dhcp pool

Page 1|5
CSCI392 Sample Final Exam

The address pool of a DHCP server is a) 57


configured with 192.168.184.0/26. The b) 44
network administrator reserves 18 IP c) 54
addresses for access points. How many d) 36
IP addresses are left in the pool to be e) 46
assigned to other hosts?

Refer to the exhibit. An EtherChannel was a) The interface port-channel


configured between switches S1 and S2, number has to be different on
but the interfaces do not form an each switch.
EtherChannel. What is the problem? b) The switch ports were not
configured with speed and duplex
mode.
c) The switch ports have to be
configured as access ports with
each port having a VLAN
assigned.
d) The EtherChannel was not
configured with the same allowed
range of VLANs on each
interface.

Question II: Port Security

1. Whats the advantage of using Port Security?

Prevent mac address overflow attack and DHCP starvtaion.

Page 2|5
CSCI392 Sample Final Exam

Prevent unauthorized access to access a switchport by limit the number of devices per
port.

2. Enable port security on Fa0/1 of Switch0

Int fa0/1
Switchport mode access
Switchport port-security

3. Set the maximum so that only two devices can connect to fa0/1.

Switchport port-security mac-address maximum 2

4. Secure the ports so that the MAC address of a device is dynamically learned
and added to the running configuration.

Switchport port-security mac-address sticky

5. Set the violation so that the Fast Ethernet ports 0/1 is disabled when a
violation occurs.

Switchport port-security violation shutdown

6. Whats the command used to check the violation counter on Fa0/1

Sh port-security int fa0/1

Question II: DHCP

Page 3|5
CSCI392 Sample Final Exam

1. Give the required configurations that allow Router1 to automatically assign IP to


the hosts of Network 10.

Ip dhcp pool Net10


Network 10.0.0.0 255.0.0.0
Default-router 10.0.0.255
Dns-server 50.0.0.0

2. Is there is a need to configure a relay agent in the question above?


NO

Question 3: Routing

Page 4|5
CSCI392 Sample Final Exam

1. How many networks do you have in the above topology?

2. Configure the static routes entries on Router-0 in order to have full network
convergence. DO NOT minimize the number of route entries.

Ip route 10.0.0.0 255.0.0.0 192.168.1.1


Ip route 20.0.0.0 255.0.0.0 192.168.1.1
Ip route 30.0.0.0 255.0.0.0 192.168.1.5
Ip route 40.0.0.0 255.0.0.0 192.168.1.5

Page 5|5

You might also like