Network Final Exam PDF

Summary

This document contains a network final exam. It includes true/false and multiple choice questions regarding topics such as MAC addressing, IP addressing, routing, encryption, and network protocols. It is suitable for undergraduate-level computer science students.

Full Transcript

## True or False 1. MAC addresses have a flat addressing structure. - **A** True - **B** False 2. Both the switch and router can identify the MAC & IP addresses of the received packets. - **A** True - **B** False 3. The backbone of the physical layer connections of the internet depe...

## True or False 1. MAC addresses have a flat addressing structure. - **A** True - **B** False 2. Both the switch and router can identify the MAC & IP addresses of the received packets. - **A** True - **B** False 3. The backbone of the physical layer connections of the internet depends on copper cable extended between major routers across the world. - **A** True - **B** False 4. One of the main advantages of symmetric key encryption is that one pre-shared key is used to encrypt and decrypt the messages which ensure the confidentiality of the used keys and make sharing the keys an easy task. - **A** True - **B** False 5. To authenticate a web server certificate issued by the Certificate Authorities (CAs), the internet browser keeps a copy of the CAs private keys. - **A** True - **B** False 6. In a hybrid encryption process, the first stage is carried out using asymmetric encryption, then the second stage is carried out using symmetric encryption - **A** True - **B** False 7. The MAC address (hardware address) is unique per interface - **A** True - **B** False 8. It is possible to have two interfaces of the same router in the same subnet? - **A** True - **B** False 9. The Routing table keeps individual records (routes) for each IP in the network - **A** True - **B** False 10. By default, the router does not forward the broadcast packets. - **A** True - **B** False 11. Static NAT (one-to-one mapping) helps preserve the real IP addresses - **A** True - **B** False 12. When a client accesses a webserver (using HTTP protocol), the source port of the request packet must be 80. - **A** True - **B** False ## Choose the correct answer for each question of the following: 13. The TTL field in the IP header identifies - **A** The maximum number of L3 hops the packet can pass through before dropped - **B** Set to one if L3 loop occurs in the path - **C** TTL = Time Too Large = The maximum time before the packet is dropped - **D** Non of the previous 14. Which of the following is a valid private IP address - **A** 192.168.1.1 - **B** 10.10.1.1 - **C** 172.31.1.5 - **D** All of the above 15. In class B networks (classful subnetting), the number of hosts (usable) per network equals - **A** 65,536 - **B** 65,534 - **C** 256 - **D** Non of the previous 16. The default subnet mask of class A is - **A** 255.0.0.0 - **B** 255.255.255.0 - **C** 256.0.0.0 - **D** Non of the previous 17. A company connecting two of its branches using ADSL connection through the internet where each branch has a Download rate of 10 Mbps and upload r of rate of Mbps. If a branch needs to download a file from the other branch, in the best scenario, the file will be downloaded with a rate equals - **A** 10 Mbps - **B** 1 Mbps - **C** 5 Mbps - **D** Non of the previous 18. The protocol responsible of associating a MAC address with a specific IP address is - **A** RARP protocol - **B** ARP protocol - **C** NetBIOS protocol - **D** All of the previous 19. Which of the following protocols utilizes destination port number to distinguish the type of transmitted traffic it requests. - **A** TCP - **B** UDP - **C** Both A and B - **D** Non of the previous answers 20. Which of the following commands are used to identify the different Layer 3 hops between the source and destination? - **A** ping - **B** Trace route (tracert) - **C** Nslookup - **D** Ipconfig 21. If class A network is sub-netted with a /10 subnet mask, the number of resulted subnets equal - **A** 2^10 - **B** 2^2 - **C** 2^10 - **D** Non of the previous 22. is used to assign IP address to hosts automatically - **A** DNS server - **B** DHCP server - **C** ARP Server - **D** Non of the previous 23. If class C network is sub-netted with a /28 subnet mask, the number of usable IP (can be assigned to hosts) equals - **A** 16 - **B** 8 - **C** 32 - **D** Non of the previous 24. For the IP address 192.168.1.70/28, what is the subnet ID? - **A** 192.168.1.65 - **B** 192.168.1.127 - **C** 192.168.1.64 - **D** Non of the previous 25. If you have a point-to-point connection (connecting only two routers), the optimal subnet mask (to preserver the number of used IPs) to use with these connection interfaces is: - **A** 255.255.255.252 - **B** 255.255.255.0 - **C** 255.255.255.254 - **D** Non of the previous 26. Which of the following IP addresses is in same subnet as 192.168.1.33/28 ? - **A** 192.168.1.46 - **B** 192.168.1.48 - **C** 192.168.1.31 - **D** Non of the previous 27. What is the broadcast IP address of the subnet 192.168.1.0/29 - **A** 192.168.1.29 - **B** 192.168.1.7 - **C** 192.168.1.0 - **D** Non of the previous 28. _____ is the time it takes to transmit all of the packet's bits into the link. - **A** Propagation delay - **B** Transmission delay - **C** Queuing delay - **D** Processing delay 29. If a host wants to send a packet to another host which is not in its network, then it forwards it first to the ______. - **A** DNS server - **B** Network Switch - **C** Default gateway - **D** Non of the previous 30. What does it mean to say that the hashing function is collision free? - **A** It is impossible for two hash output messages to collide while transmitting - **B** It is impossible for two hash inputs to have same output using this hashing function - **C** The hash function is collision free that it produces a different hash for the same input every time - **D** Non of the previous 31. Which protocol is suitable for applications that require error-free and complete data transmission? - **A** UDP - **B** TCP - **C** Both UDP and TCP can be used - **D** Non of the previous 32. Which type of delay is caused by the time it takes for a packet to travel through the physical medium, such as a cable or fiber optic line? - **A** Transmission delay - **B** Propagation delay - **C** Queuing delay - **D** The sum of the delays in A, B and C 33. Which of one of the AAA security model elements allows the administrator to control the access privileges (صلاحيات) the users have over resources? - **A** Authorization - **B** Authentication - **C** Accounting - **D** Accessibility 34. The RAID systems allow to achieve which of the elements of CIA triad in security? - **A** Confidentiality - **B** Integrity - **C** Availability - **D** Accessibility 35. The main difference between DoS and DDoS is - **A** DoS attack is carried out by one device, while DDoS is carried out by number of devices - **B** DoS attack is carried out once while DDoS is a double attack that is repeated twice - **C** In DoS all attacker are in the same geographical are while DDoS is distributed among different location - **D** Non of the previous 36. The concept of Zero Trust in security, means - **A** The access to the resources are banned by default, and allow access to specific user and service one by one - **B** The access to the resources is allowed by default, and deny rules is ACCURETLY added to control the access to these resources - **C** There is Zero tolerance regarding accessing these resources - **D** Non of the previous 37. What is the primary goal of data non-repudiation? - **A** To prevent unauthorized access to the data - **B** To guarantee data confidentiality - **C** To ensure data availability - **D** Non of the previous 38. What is the main advantage of role-based access control in security? - **A** It is easy to implement especially for large organization - **B** It provides fine-grained (precise) access control over resource, according to the employee position - **C** It allows users to access any resource based on their location - **D** Non of the previous 39. What field in TCP/IP has the same function as hash? - **A** Checksum - **B** TTL - **C** Collision indicator - **D** Non of the previous 40. Usually, when encryption then hashing is applied to a message. What is the order of the processes at the receiving side. - **A** Decrypt the message then calculate the hash - **B** Calculate the hash, if correct, decrypt the message, if not discard it. - **C** Calculate the hash of the encrypted message, then, in all cases, decrypt the message. - **D** Non of the previous 41. Which of the following may be included in the digital certificate issued by a Certificate Authority (CA) for a website - **A** The Website Private Key - **B** The Website Public Key - **C** The CA Public Key - **D** The CA Private Key 42. Which of the following is an advantage of using Dynamic Routing protocol over using static routing - **A** Scalability - **B** Precise control over the paths the packet take - **C** A and B - **D** Non of the previous 43. In asymmetric encryption, if the data is encrypted using the private key at the sender and decrypted using its public key at the receiver, which of the security feature is achieved? - **A** Confidentiality and Origin - **B** Origin authentication - **C** Confidentiality - **D** Non of the previous 44. What is the primary role of a Certificate Authority (CA) in a Public Key Infrastructure (PKI) system? - **A** Issuing, managing, and revoking digital certificates - **B** Generate the private key for the user - **C** Encrypting data transmissions - **D** Non of the previous 45. If the following configuration (static routes) has been applied to a router, what is the next hop if the destination address is 192.168.1.126 - **A** 12.0.0.1 - **B** 13.0.0.1 - **C** 14.0.0.1 - **D** The router will drop the packet 46. Which statement best describes a site-to-site VPN? - **A** It is a protocol used for secure file transfers between different devices - **B** It is a secure connection established between a single user and a remote server. - **C** It is a network configuration that allows multiple users to access a single site securely. - **D** It is a secure connection established between two or more local networks using VPN gateways 47. How does hybrid encryption combine symmetric and asymmetric encryption? - **A** By using multiple encryption algorithms simultaneously - **B** By encrypting the data twice for added security - **C** By encrypting the symmetric key with the recipient’s public key - **D** By encrypting the asymmetric key with the recipient’s private key 48. What is the main difference between remote access VPN and site-to-site VPN? - **A** Remote access VPN is used by individuals to securely connect to a private network, while site-to-site VPN is used to connect entire local networks securely - **B** Remote access VPN is used for secure file transfers, while site-to-site VPN is used for remote server management. - **C** Remote access VPN is a wireless connection option, while site-to-site VPN is a wired connection option. - **D** Remote access VPN is used for connecting different devices within a local network, while site-to-site VPN is used to connect devices across different geographic locations 49. What is the definition of a Man-in-the-Middle attack? - **A** An attack where an unauthorized third party intercepts and alters communication between two parties without their knowledge. - **B** An attack where a hacker gains control of a web server and redirects traffic to a malicious website. - **C** An attack where malware is installed on a victim’s computer to capture sensitive information. - **D** An attack where an attacker floods a network with traffic to disrupt its normal operation. 50. What is the main advantage of asymmetric encryption over symmetric encryption? - **A** It eliminates the need to exchange secret keys - **B** It supports large data size - **C** It is faster in the encryption and decryption - **D** Non of the previous 51. Which type of routing provide more security and control over network traffic? - **A** Dynamic routing - **B** Static routing - **C** A and B - **D** Non of the previous 52. In Figure A what is the path the packet will take from PC1 to PC2 - **A** PC1→RI → R3 → R2 → PC2 - **B** PC1→RI → R2 → PC2 - **C** PC1→ R1 → R3( then R3 drops the packet) - **D** PC1→ R1 → R2(then R2 drops the packet) 53. In Figure A, if(PC1 sent a PING message to PC2, what is the source MAC address of the frame as transmitted from PC1? - **A** PC1 FO MAC address - **B** Router R1 GO MAC address - **C** Router R3 G1 MAC address - **D** Router R1 will drop the packet 54. In Figure A, what is the message PC1 will receive when it sent a PIN G message to PC2 IP - **A** Request time out - **B** Reply from 2.1.1.2 (success) - **C** Reply from Router 1: Destination host unreachable - **D** Reply from Router 3: Destination host unreachable 55. In Figure A, In order to optimize the routing process at the different routers, what commands set is the optimal one to be applied? - **A** R3(config)#ip route 1.0.0.0 255.0.0.0 13.1.1.1 - **B** R1(config)#ip route 2.0.0.0 255.0.0.0 12.1.1.2 - **C** R1(config)#ip route 2.0.0.0 255.0.0.0 12.1.1.2 - **D** Non of the above commands will enhance the routing process 56. In Figure B, assuming the VLAN configuration as shown, how many VLANs are there in this network? - **A** 2 - **B** 3 - **C** 4 - **D** 5 57. In Figure B, assuming the VLAN configuration as shown, In order to connect the VLANs in both switches properly, what type of interface must Gig0 be configured in both switches? - **A** Access - **B** Trunk - **C** A or B - **D** Non of the previous 58. In Figure B, assuming the VLAN configuration as shown Which VLAN packets will be tagged when pass between the two switches? - **A** VLAN 1 packets only - **B** VLAN 2 and VLAN3 packets - **C** All VLANs' packets - **D** Non of the previous 59. In Figure B, assuming the VLAN configuration as shown if a new device is connected to in F0/5 in Switch A, which device (PC, laptop or server) it will be able to communicate with? - **A** PC1 and PC2 only - **B** PC1 only - **C** All devices - **D** Non of the previous 60. In Figure B, assuming the VLAN configuration as shown, when laptop 1 ( connected to port F0/2 2 in Switch A) sends a packet to laptop 2 ( connected top port F0/2 in Switch B) what is the TAG ID of frame as transmitted from laptop 1. - **A** Tag ID = VLAN 2 - **B** No Tag is added - **C** Tag ID = SWITCH port - **D** Non of the previous answers

Use Quizgecko on...
Browser
Browser