LEARN WITH MAESTRO LEARN WITH MAESTRO LEARN WITH MAESTRO LEARN WITH MAESTRO LEARN WITH
MAESTRO LEARN WITH MAESTRO LEARN WITH MAESTRO LEARN WITH MAESTRO LEARN WITH MAESTRO
LEARN WITH MAESTRO LEARN WITH MAESTRO LEARN WITH MAESTRO LEARN WITH MAESTRO LEARN WITH
1. Suppose you have the following IP address 192.16.5.133 / 29. What are the number of bits needed to
identify the network, and the number of bits needed to identify the host.
(1) 29 bits and 3 bits (3) 30 bits and 2 bits (5) 29 bits and 4 bits
(2) 28 bits and 3 bits (4) 28 bits and 4 bits
2. In a communication network, when a message arrives at its destination, in order to deliver it to the
correct application program running at the application layer, which of the following address must be
Scan to Join
consulted? Com
(1) MAC Address (3) Port Address (5) Application Address
(2) IP Address (4) DNS Address
3. Which of the following packet field is updated, during normal IP packet forwarding in a router?
(1) Time To Live (TTL) value (3) Destination IP Address (5) Destination Address
(2) Source IP Address (4) Source MAC Address
4. Which of the following statements about fiber optic is correct?
A – The attenuation is extremely low
B – The bandwidth provided is high
C – Fiber optic is immune to electromagnetic interference
(1) A only (3) C only (5) All A, B and C
(2) B only (4) A and B only
5. Which of the following statements about a TCP connection is correct?
A – Reliable data transfer
B – Connection oriented
C – Guaranteed delivery
(3) A only (3) C only (5) All A, B and C
(4) B only (4) A and B only
6. The command that can be used to check the network configuration of a computer is
(1) Ping (2) Ipconfig (3) Hop (4) Netstat (5) Traceroute
7. Suppose you have to create a network that has 5 subnets, each with at least 16 hosts. Which is the
following subnet mask would be most suitable to create it?
(1) 255.255.255.192 (3) 255.255.255.224 (5) 255.255.255.240
(2) 255.255.255.256 (4) 255.255.255.248
8. The network layer of OSI model does not
(1) Performs routing functions
(2) Reports delivery errors
(3) Formats and encrypts data to be sent across a network
(4) Performs fragmentation
(5) Handles packet sequencing
9. “GPRS” stands for
(1) General Packet Recall Service (4) Generation Packet Radio Service
(2) General Protocol Recall Service (5) General Packet Radio Service
(3) General Protocol Radio Service
UNPLUGGED REVISION 25’ – NETWORKING 1
10. Given below are some of the advantages of using fiber optic cable over copper wires in data
communication.
A – Electromagnetic waves do not interfere
B – High speed of transmission
C – Resistance to mechanical shocks
D – Ability to wire with sharp bents
E – Higher distance of data transmission
(1) A and B only (3) A, B, C and E only (5) All of the above
(2) B, C and D only (4) A, B, C and D only
11. Which of the following command is issued to identify that which line, computer or router not functioning
as expected in a computer network
(1) Tracert (2) IPConfig (3) Hostname (4) Ping (5) Netstat
12. A – In Full-duplex data communication always transmission takes place to both direction.
B – A student responds to teacher after a question is asked by the teacher in a class. This is an example
of half duplex communication
C – Television broadcasting is an example of half duplex communication
Which of the above statement/s is/are true about communication
(1) A only (2) B only (3) C only (4) B and C only (5) A and B only
13. Which of the following is used to send data packets directly to its receiving device in a LAN
(1) Hub (2) Bridge (3) Modem (4) Switch (5) Repeater
14. Meaning of software piracy is ………………………………
(1) Stealing of software at home
(2) Stealing of software from manufacturing company
(3) Copying software
(4) Coping from purchased software
(5) Making of illegal copies of software on which the user has no copy right
15. Which of the followings is the correct statement regarding IP addresses and subnet masks
(1) 192.156.6.3 is an example of class “B” IP address
(2) 6 (six) host computers can be connected to a network with a subnet mask of 255.255.255.148
(3) IPV4 addresses contain 8 bits
(4) 220.32.1.5 is an example of class “C” IP address
(5) 255.255.0.0 is an example of class “C” IP address
16. Which is not an advantage of computer networking?
(1) Centralized management (4) Sharing physical resources
(2) Possibly of entering outsiders (5) The speed of data file transferring
(3) Security of data
17. One person has created a website resembling the website of ABC banks and sent the URL to Saman via
email, when Saman used the URL, it downloaded all the confidential information from Saman’s
computer, which type of threat is this?
(1) Virus (2) Phishing (3) Man in Middle attack (4) Trojan Horse (5) Malware
18. Select the Subnet Mask of the network which contains 169.23.54.2/23 network address
(1) 255.255.255.0 (3) 255.255.255.224 (5) 255.255.255.254
(2) 255.255.254.0 (4) 255.255.240.0
19. A protocol which is not used In application layer is,
(1) FTP (2) ICMP (3) HTTP (4) SMTP (5) POP3
UNPLUGGED REVISION 25’ – NETWORKING 2
20. Select another IP address which belongs to the network 192.168.1.100/28
(1) 192.168.1.55 (3) 192.168.1.134 (5) 192.168.1.212
(2) 192.168.1.80 (4) 192.168.1.97
21. Which is not a feature of fiber optic cables?
(1) Communicating data as analog signals
(2) Data transfer rate is higher than all other media
(3) Data distortion does not occur from electromagnetic fields
(4) Higher bandwidth value
(5) Can transfer data in longer distances
22. Select the devices cannot be used to connect two computer networks
(1) Layer switch (2) Modem (3) Router (4) Bridge (5) Repeater
23. Study following expressions given about session layer
A – Connects the devices used in data communication
B – Identify suitable routes for data transmission
C – Identifies and formats data files D – Conduct data transmission and closing as required
Select the answer that contains only true expressions
(1) Only A and B (3) Only C and D (5) Only A, B and D
(2) Only B and C (4) Only A and D
24. What is the correct method of transmission of a digital signal from the picture?
(1) Frequency Shift Keying
(2) Amplitude Shift Keying
(3) Phase Modulation
(4) Frequency Modulation
(5) Phase Shift Keying
25. Consider the following statements about data transmission media.
A – Radio waves and infrared are used in building wireless computer network
B – Magnetic waves do not interfere with the transmission of data using optical fiber optics
C – Microwaves are used for satellite transmissions
Which of the above statement/s is/are correct?
(1) A only (3) A and B only (5) A, B and C only
(2) B and C only (4) A and C only
• Please refer to the description below to answer questions 26 to 27 The Internet address 153.215.10.5/21
was purchased to provide internet connectivity to computers in a university computer network
26. What is the total number of host bits can be assigned to the computer network using the above Internet
address?
(1) 11 (2) 1 (3) 105 (4) 9 (5) 8
27. What is the total number of IP address received for the above IP address?
(1) 256 (2) 21 (3) 11 (4) 2048 (5) 1024
28. Which of the following statements is correct about the user data gram protocol (UDP) and Transmission
Control Protocol (TCP) used in computer networking?
A – These protocols are two protocols running in the data link layer
B – TCP and UDP are two transport layer protocols
C – TCP uses UDP as the transport protocol
(1) A only (3) A and C only (5) A , B and C
(2) B only (4) B and C only
UNPLUGGED REVISION 25’ – NETWORKING 3
29. ………………………………… is the process of obtaining sensitive data such as usernames , passwords , credit
card data , etc…as a trusted party
Which of the following is best to fill in the blank of the above sentence?
(1) Hijacker (2) Spam (3) Spyware (4) Phishing (5) Bots
30. In computer networking, data transmitted from the source to the receiver. What are the correct reasons
for error?
A – Presence of synchronization problems
B – Distortion
C – The shape of the signal changes
(1) A only (3) C only (5) A , B and C only
(2) B only (4) A and B only
31. Consider the following statements about servers used in computer networking
A – Proxy server is used to limit web access in client computers
B – DNS server dynamically allocates IP addresses to network devices
C – DHCP server converts web addresses to IP addresses
D – Published web sites are stored in web server
Which of the above statement/s is/are correct?
(1) A and B only (3) A and D only (5) A , B and D only
(2) A and C only (4) A,B and C only
32. “When a wave moves through an electronic media, the frequency of that wave decreases gradually due
to the decrease of energy of it”. Which of the following illustrates the above statement?
(1) Distortion (3) Noise (5) Frequency shift key
(2) Frequency modulation (4) Attenuation
33. Internet Control Message Protocol (ICMP) is a protocol of the …………………………….
(1) Application (2) Data link (3) Network (4) Physical (5) Transport
34. Which of the following function in related to the presentation layer of the OSI network reference model?
(1) Flow Control (3) Data encryption (5) IP Addressing
(2) MAC Addressing (4) Error Control
35. Consider the following incorrect paragraph In the ………(A)……. The same key is used to encrypt and
decrypt the data. This is similar to using the same key to lock and unlock a door lock. In contrast,
……..(B)…….. uses two keys, one key as the ……..(C)……. Or the public key and the other key as the
……..(D)……. or the private key. This method is more practical compared to the first method
(1) (A) Public key encryption (B) Secret key encryption (C) Decryption key (D) Encryption key
(2) (A) Secret key encryption (B) Public key encryption (C) Decryption key (D) Encryption key
(3) (A) Secret key encryption (B) Encryption key (C) Public key encryption (D) Decryption key
(4) (A) Public key encryption (B) Secret key encryption (C) Encryption key (D) Decryption key
(5) (A) Public key encryption (B) Encryption key (C) Secret key encryption (D) Decryption key
36. The network layer of OSI network reference model is related to,
(1) Bits (2) Bytes (3) Megabytes (4) Frames (5) Packets
37. To achieve reliable transport in TCP, ………………………… is used to check the safe and sound arrival of data.
(1) Packet (2) Segment (3) Quality (4) Buffer (5) Acknowledgment
38. In computer security, ………………………. means that computer system assets can be modified only by
authorized parties.
(1) Confidentiality (2) Integrity (3) Availability (4) Authenticity (5) Non-repudiation
UNPLUGGED REVISION 25’ – NETWORKING 4
A party cannot deny the
authenticity of their sent
message
39. Consider the following statements
A – Sharing of the Internet connection among multiple users
B – Caching of web pages obtained from web servers
C – Mapping of private IP addresses into public IP addresses
Which of the above is/are the activity(s) of proxy servers?
(1) A only (3) C only (5) A , B and C only
(2) B only (4) A and C only
40. Which of the following protocol is responsible for downloading of a file in the Internet?
(1) FTP (2) SMTP (3) IP (4) POP (5) HTTP
41. Parity bits are used for which of the following purposes
(1) Encryption of data (3) To transmit faster (5) To detect error
(2) To identify the user (4) For subnetting
42. Optical fibers operate based on optical phenomena known as
(1) Total external reflection (3) Total refraction (5) Total internal reflection
(2) Total external refraction (4) Total reflection
43. A protocol which is not used in application layer is
(1) HTTP (2) DNS (3) FTP (4) UDP (5) SMTP
44. Which of the following device forwards data packets between computer networks?
(1) Secondary memory (3) Physical layer (5) CPU
(2) Server computer (4) Router
45. The Physical layer does not provide…………………
(1) Mechanical specifications of electrical connectors and cables
(2) Electrical specification of transmission line signal level
(3) Specification of IR over optical fiber
(4) Guarantees bandwidth and delay
(5) Procedural interface to the transmission medium
46. Physical or logical arrangement of network is……………..
(1) Topology (2) Control (3) Routing (4) Protocol (5) Networking
47. Which of the following is the incorrect statement about the ALOHA?
(1) ALOHA is a multiple access protocol for transmission of data via a shared network channel.
(2) In pure ALOHA, if a frame is destroyed, the station for a random amount of time.
(3) In Slotted ALOHA, the station can transmit a frame whenever they want.
(4) In Slotted ALOHA, the time of the shared channel is divided into discrete intervals called slots
(5) ALOHA provided the first public demonstration of a wireless packet data using UHF
48. The transmission impairment that refers to a disturbance caused by electric or magnetic field
(1) Cross talk (2) Impulse (3) Thermal Noise (4) Induced Noise (5) Intermodulation
49. Consider the following statements.
A – Unauthorized copying, distribution and use of software
B – Obtain sensitive information such as username, password, and credit card details for malicious
purposes
C – Publishing one’s thoughts, ideas, expressions, and actions without mentioning the original creator
What is the correct order of terms used to introduce above statements?
(1) Phishing, piracy, plagiarism (4) Piracy, phishing, plagiarism
(2) Plagiarism, phishing, piracy (5) Phishing, theft, intellectual property laws
(3) Piracy, phishing, intellectual property laws
UNPLUGGED REVISION 25’ – NETWORKING 5
50. Which of the following statement is correct regarding routing in IP networks?
(1) Routers must forward all receiving IP packets along the same path.
(2) Centralized routing uses dynamic routing.
(3) An IP packet may be discarded by a router.
(4) All routers must use DNS server for IP packet routing.
(5) A switch is used to make routing decisions.
51. ICMP
(1) Is used in the data link layer.
(2) Traceroute command is used by ICMP.
(3) Sends control and error messages throughout the IP network.
(4) Reports and corrects problems.
(5) Stands for internet control manage protocol.
52. Which of the following is incorrect regarding the loopback address
(1) It is intended for use in testing TCP/IP
(2) 127.0.0.0 is a loopback address
(3) A data packet sent to the loopback address can appear on any network.
(4) It is used for inter-process communication on the local computer
(5) It is a reserved address
53. Select the most suitable port number in Q for the protocol given in P.
P Q
I. HTTP A. 143
II. FTP B. 80
III. SMTP C. 21
IV. IMAP D. 25
(1) I - D, II - A, III - B, IV - C (3) I - A, II - D, III - B, IV - C (5) I - C, II - D, III - A, IV - B
(2) I - D, II - A, III - C, IV - B (4) I - B, II - C, III - D, IV - A
54. A company has a subnet mask of 255.255.255.224. Find the number of devices that can be connected to
one subnet
(1) 32 (2) 16 (3) 8 (4) 14 (5) 30
55. A stranger is trying to steal username and password details to get access to an information system. State
the type of threat to the system by the stranger from following threats
(1) Spoofing (2) Repudiation (3) Phishing (4) Port scan (5) Elevation of privilege
impersonation
56. What is the function of the session layer in OSI structure
(1) Transmitting data by converting into data packets
(2) Connect the devices which used to transmit
(3) Control data flow
(4) Convert data into different format and use encryption
(5) Identify errors which occurred while data transmitting
57. If the IP address of a network is 174.10.0.0/19 find the number of sub networks and number of valid
hosts per subnet
(1) 8 subnets, 2046 hosts (3) 7 subnets, 2048 hosts (5) 8 subnets, 8190 hosts
(2) 8 subnets, 8192 hosts (4) 7 subnets, 2046 hosts
58. UDP………………………… is a layer protocol. Which of the following layers is the most suitable to fill the
blank in the above statement
(1) Physical (2) Data link (3) Network (4) Transport (5) Application
UNPLUGGED REVISION 25’ – NETWORKING 6
59. The Physical layer does not provide…………………
(1) Mechanical specifications of electrical connectors and cables
(2) Electrical specification of transmission line signal level
(3) Specification of IR over optical fiber
(4) Guarantees bandwidth and delay
(5) Procedural interface to the transmission medium
60. Which of the following statements is/are not true regarding Virtual Private Networks (VPN)?
(1) A VPN can extend an organization’s private network across a public network (such as the Internet),
creating a secure private network
(2) Point to Point Tunneling Protocol (PPTP) is a preferred method of creating a VPN
(3) IPSec can be used for establishing a VPN
(4) Traffic on a VPN is not accessible from an unauthorized public network
(5) A VPN cannot provide secure remote access to a corporate network
61. Two network devices (A and B) on an IP network have the addresses 172.16.17.30/20 and
172.16.28.15/20.
Which of the following is/are true?
(1) Device A is on subnet 172.16.16.0 (4) Device A is on subnet 172.16.0.0
(2) Device B is on subnet 255.255.240.0 (5) Devices A and B are on different subnets
(3) Devices A and B are on the same subnet
62. What is/are the benefit(s) of using Network Address Translation (NAT)?
(1) NAT protects networks because private networks are not advertised
(2) NAT accelerates the routing process because no modifications are made to packets
(3) Dynamic NAT facilitates connections from the outside of the network
(4) NAT facilitates end to end communication when IPSec is enabled
(5) NAT eliminates the need to re-address all hosts that require external access
63. The following statements describe functions of some layers in the Open Systems Interconnection (OSI) 7
layer networking model.
A - Structuring and managing a multi-node network, including addressing, routing and traffic control.
B - Reliable transmission of data segments between points on the network, including segmentation,
acknowledgment and multiplexing.
C - Translation of data between a networking service and an application, including character encoding,
data compression and encryption/decryption.
These layers in correct order refer to;
(1) Transport, Network, Session (4) Data link, Network, Transport
(2) Data link, Transport, Presentation (5) Network, Transport, Presentation
(3) Network, Transport, Application
64. Which of the following statements is/are CORRECT with respect to Firewalls?
(1) The Firewall is a "gatekeeper" system that protects a company's intranets and other computer
networks from intrusion.
(2) In Firewalls, the transmission of data is done through telecommunications lines in "scrambled" form.
(3) Firewall is the act of ensuring the accuracy, integrity, and safety of all business processes and
resources.
(4) Firewall is an audit system to identify the controls that govern individual information systems and
accesses their effectiveness.
(5) A Firewall is a hierarchical decentralized naming system for computers, services, or other resources
connected to the Internet or a private network.
65. An IP address in a computer network is, 192.168.1.20/18. What is the subnet mask of this network?
(1) 255.255.0.0 (3) 255.255.255.0 (5) 255.255.192.255
(2) 255.255.254.0 (4) 255.255.192.0
UNPLUGGED REVISION 25’ – NETWORKING 7