SAMPLE EXAMINATION CIS3003
You are required to answer eight (8) questions.
This examination is worth a total of one hundred (100) marks.
Please record multiple choice questions in the multiple choice answer sheet provided.
Please record your answers in the examination answer booklet provided.
Part A
Question (20 Marks)
Instructions
Answer each of the multiple choice questions by copying the choice into the examination booklet. Only the answer option is required.
Example Question:
CMIP:
a) is the TCP/IP network management standard
b) refers to Common Management Interface Protocol
c) is older than SNMP
d) is more widely used than SNMP
e) is the Internet network management standard
You would write the answer in the examination booklet. In this case it is b).
2.1) The building block design approach is sometimes called:
a) wide and shallow
b) narrow and deep
c) wide and deep
d) narrow and shallow
e) narrow and flat (1 mark)
2.2) A network switch failure is an example of a(n) ________ threat.
a) Internal
b) disruptive
c) causal
d) intrusion
e) disaster (1 mark)
2.3) The key principle in preventing disruption, destruction and disaster is ___________.
a) redundancy
b) control spreadsheet
c) IDS
d) anti-virus software
e) prevention controls
(1 mark)
2.4) When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:
a) dedicated circuit
b) dialed circuit
c) ISDN circuit
d) VPN circuit
e) T-1 carrier circuit (1 mark)
2.5) ISDN Basic Rate Interface:
a) is typically offered only to commercial customers
b) provides a communications circuit with two 64 Kbps B channels, plus one D channel
c) is defined exactly the same way in Europe
d) has an upper capacity of 1.544 Mbps
e) is comprised of analog circuits only (1 mark)
2.6) In a ring design WAN,
a) messages can take a long time to travel from the sender to the receiver
b) a message arrives at all computers on the network simultaneously
c) messages always arrive faster than in other types of layouts
d) messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver
e) messages always take one second to travel between sender and receiver (1 mark)
2.7) A _______ is a connectionless method of sending data packets on a packet switched service.
a) bursty packet
b) virtual circuit
c) datagram
d) histogram
e) permanent virtual circuit (1 mark)
2.8) Gateways:
a) process all messages, even if the messages are not explicitly addressed to them
b) can translate one network protocol into another
c) are less complex than bridges
d) are most often used as the interface between two or more networks that have similar data link and network layer protocols
e) cannot perform a routing function (1 mark)
2.9) Which of the following is not true about Layer-3 switches?
a) They switch messages based on their IP address.
b) They can be used in place of routers.
c) They function faster than routers.
d) They have more simultaneously active ports than routers.
e) They can only switch messages based on their data link layer addresses.
(1 mark)
2.10) A __________ type of BN has a star topology with one device, such as a switch, at its center.
a) Bridged backbone
b) Virtual LAN
c) Hubbed backbone
d) Switched backbone
e) Routed backbone (1 mark)
2.11) A(n) _____connects all networks within a company, regardless of whether it crosses state, national, or international boundaries.
a) LAN
b) MAN
c) enterprise network
d) campus network
e) core network (1 mark)
2.12) A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware.
a) Bridged backbone
b) Virtual LAN
c) Hubbed backbone
d) Collapsed
Related Documents: Networks: Routing and Marks Essay
Distance-vector Routing Purpose of Routing Protocol Routing protocols can be described as a set of guidelines that are used by routers to resolve the best path to which it should forward packets destined for a remote network. The routing algorithms determine the specific route that is the best choice for the packet to be forwarded to. Every router holds a carnal knowledge of any networks that are attached to them directly and understand which interfaces connect them…
[Routing Management & Remote Access] [17/01/2014] University of Greenwich Alhaji Kamara ALHAJI KAMARA Introductions The main purpose for this report is to determine the procedure taken to design a network communication system with given requirements needs and apply it on simulated software called Packet Tracer 6.0.1. It was necessary to produce a network design and allocate at 2000 ip addresses for R1 (London), 800 Ip addresses for R2 (Manchester), and 500 ip addresses for R3 (Birmingham)…
Q&A 1 | Given a network design of two or more routers, install necessary memory, interface modules, cables and IOS and test layer 1&2 connectivity. | 2 | Given a network topology of two or more routers and an IPv4 addressing scheme, implement static routing and confirm layer 3 connectivity. | 3 | Given a network topology and three or more routers and an IPv4 addressing scheme, implement RIPv1 routing protocol and confirm layer 3 connectivity. | 4 | Given a network topology of three or…
Distance Vector Routing Protocols Most routing protocols fall into one of two classes: distance vector or link state. The basics of distance vector routing protocols are examined here; the next section covers link state routing protocols. Most distance vector algorithms are based on the work done of R. E. Bellman, L. R. Ford, and D. R. Fulkerson, and for this reason occasionally are referred to as Bellman-Ford or Ford-Fulkerson algorithms. A notable exception is EIGRP, which is based on an algorithm…
Solution to Protect Business DBF BUS 570 Prof. Secure Border Gateway Protocol: Implementing A Scalable Solution to Protect Business Abstract The Border Gateway Protocol (BGP), which is employed to allocate routing data between autonomous systems (ASes), is integral to the Internet's routing framework. It has created vulnerabilities for business such as malicious attacks due to limited secure measures of validating the authenticity and creditability of BGP traffic. This proposal outlines a secure…
The Open Systems Interconnection Reference model (usually called the OSI model for short) helped change the face of network computing. Before the OSI model, most commercial networks used by businesses were built using nonstandardized technologies developed by one vendor (remember that the Internet was in use at the time but was not widespread and certainly was not commercial). During the late 1970s, the International Organization for Standardization (IOS) created the Open System Interconnection Subcommittee…
workstation uses commands to request data from a program in the server. Common functions at this layer are opening, closing, reading and writing files, transferring files and e-mail messages, executing remote jobs and obtaining directory information about network resources. Presentation Layer 6 When data are transmitted between different types of computer systems, the presentation layer negotiates and manages the way data are represented and encoded. For example, it provides a common denominator between…
information retrieval. We present Aardvark, a social search engine. With Aardvark, users ask a question, either by instant message, email, web input, text message, or voice. Aardvark then routes the question to the person in the user’s extended social network most likely to be able to answer that question. As compared to a traditional web search engine, where the challenge lies in finding the right document to satisfy a user’s information need, the challenge in a social search engine like Aardvark…
router must possess a working network adapter. This is connected to a broadband modem that has one or more built in adapters which enables sharing of a high-speed Internet connection. Wireless routers allow dozens of computers to connect over Wi-Fi links. If multiple users attempt to use the network at around the same time, it will slow the performance of the network that is enclosed with the storm. This component can be option, It is need in a wireless connection network; however, I wireless modem…