0% found this document useful (0 votes)
198 views11 pages

Cs206 Sampel Paper Ans

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
198 views11 pages

Cs206 Sampel Paper Ans

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Sample Paper

FINALTERM EXAMINATION
Fall 2022
CS206 - Introduction to Network Design & Analysis

Time: 90 min
Marks: 60

Question No: 1 (Marks: 01) - Please choose the correct option

1. PAP stands for __________ in the context of computer networks.

A. Private Authentication Protocol


B. Password Authentication Protocol
C. Personal Authentication Protocol
D. Protocol Authentication Process

2. VPN stands for ___________.

A. Variable private Network


B. Virtual Private Network
C. Virtual Public Network
D. Vertical Personal Network

3. VPN use __________ technique for secure communication.

A. Routing
B. Tunneling
C. Forwarding
D. Compression

4. In computer networks, Intrusion Detection System is used _________.

A. To compress data being transmitted over a network


B. To detect unauthorized access to a network or system
C. To encrypt data being transmitted over a network
D. To manage network traffic

5. To prevent unauthorized access to a network or system is the function of


_______ device.

A. Firewall
B. Bridge
C. Wire shark
D. Switch

6. ___________ is a network packet analyzer tool.

A. Wire shark
B. Packet tracer
C. Qualys
D. NMAP

7. Wire shark is available for ___________.

A. Windows
B. UNIX
C. UNIX and Windows
D. Android

8. Port numbers can be reused without any problem if previous TCP connection is
_____________.

A. Open
B. Running
C. Terminate
D. Active

9. Keep Alives and Keep Alive ACKs are typically used to check for dead ________.

A. TCP peers
B. UPD peers
C. Both TCP and UDP peers
D. FTP peers

10. In Expert Infos window, “Duplicate ACKs’’ are shown under _____ tab.

A. Errors
B. Warnings
C. Notes
D. Chats

11. _____________ provides the network IP address of a machine against its


network name.
DNS
ARP
HTTP
TCP

12. In a network, routing ________ occur when a packet is routed back onto a network
over and over again.

A. Loops
B. Encryption
C. Compression
D. Delays

13. DNS uses ______ port number and HTTP uses _____port number.

A. 80,53,
B. 53,80
C. 20,53,
D. 21,80

14. Which of the following is a broadcast address?

A. 255.255.255.255
B. 25.255.10.2
C. 200.250.25.25
D. 224.25.250.251

15. Which of the following is a multicast address?

A. 220.0. 0.0
B. 192.0. 0.0
C. 22.0. 0.0
D. 224.25. 0.0

16. _____________ Address Resolution allows obtaining MAC address of a local target
or local router.

A. Hardware
B. IP
C. Subent
D. Network

17. In a network, amount of data that can be carried in a frame is limited by


_____________.
A. MTU
B. Address resolution
C. DNS server
D. DHCP

18. ____________ can be reused without any problem if previous TCP connection is
terminated.

A. Port numbers
B. IP address
C. MAC address
D. Web address

19. In Wire Shark, captured traffic is saved in a ________ file.

A. Trace
B. DOC
C. HTML
D. XML

20. In Wire shark, until you create a new profile, you are working in _______ profile.

A. Default
B. New
C. Latest
D. Old

21. In Wire shark, you need to click twice on your new HTTP Delta column header to
_________ the column data

A. Sort
B. Record
C. Delete
D. Change

22. By default, Wire shark sets the time column to _________since beginning of capture.

A. Seconds
B. Minutes
C. Milliseconds
D. Microseconds

23. In wire shark , you need to click the _______ button to remove your display filter.

A. Finish
B. End
C. Clear
D. Remove

24. In wire shark, dns.flags.rcode > 0 is used to identify __________ responses with
code greater than 0.

A. DNS error
B. DNS request
C. DNS responses
D. None of given option

25. In wire shark, we can use _________ filter to determine how many HTTP requests
were sent to a server.

A. http.method.request
B. http.request
C. http.method
D. http.request.method

26. In Wire shark, to filter out traffic based on an application name, simply precede the
application display filter name with an(a) ___________ sign.

A. Exclamation sign (!)


B. Dollar sign($)
C. Percentage sign (%)
D. Asterk sign (*)

27. In Wire shark, ____________ can help you quickly detect network problems as well
as obtain basic information about network communications.

A. Expert Infos
B. Menu bar
C. Status Infos
D. Toolbar

28. In Wire shark,the Expert Infos window is divided into ________tabs.

A. Five
B. six
C. Seven
D. Eight

29. Which of the following command is used to obtain the IP address of your host?

A. Ipconfig
B. Config
C. Getip
D. Showip

30. If the client does not have the MAC address information in cache, the client sends
out _____________.

A. ARP request
B. TCP request
C. DNS request
D. HTTP request

31. Wire shark allows a user to draw _______ different styles of a graph.

A. Three
B. Four
C. Five
D. Six

32. _________ is a connection less transport layer protocol.

A. TCP
B. UDP
C. Telnet
D. FTP

33. Which of the following is a connection oriented protocol?

A. TCP
B. UDP
C. Telnet
D. FTP

A. Do

34. Wire shark allows us to estimate the _________ by looking at the tcp.time_delta
value.

A. Round trip time


B. End time
C. Start time
D. Average time
35. In wire shark, _______ filter is used to count out-of-order packets.

A. tcp.analysis.out_of_order
B. tcp.out_of_order.count
C. tcp.out_of_order
D. tcp.out_of_order.packets

36. Packet Tracer is a _________ tool.

A. Photo editor
B. Network Simulation
C. Text Editor
D. Spread sheet

37. To connect PC with switch _________ cable is used.

A. Crossover
B. Straight-forward
C. Roll over
D. Straight-through

38. In packet tracer, “Physical Device View” does not contain ________.

A. Zoom In
B. Zoom Out
C. Original Size
D. Front view

39. To configure the IP address manually on a router we need to open the ___________.

A. Desktop
B. Command Line Interface
C. Proxy setting
D. DHCP

Question No: 41 (Marks: 03)


Write the steps to create new profile in wire shark?
Ans: To create a new profile in Wireshark, follow these steps:

1. Open Wireshark: Launch the Wireshark application on your computer.

2. Go to Preferences: Click on the “Edit” menu at the top of the Wireshark window,
then select “Preferences.”

3. Navigate to Profiles: In the Preferences window, find and click on the “Profiles”
option on the left-hand side.

4. Add a new profile: Click on the “+” button or the “New” button to create a new
profile.

5. Customize the profile: Give your new profile a name and configure any settings
or options you want for this profile. You can customize display filters, column
settings, colorization rules, and more.

6. Save the profile: Once you’ve configured the new profile to your liking, click
“OK” or “Save” to save the changes and create the new profile.

7. Apply the profile: After creating the new profile, you can select it from the list of
available profiles in the Preferences window. You can also choose to make the
new profile the default profile for Wireshark if desired.

That’s it! You have successfully created a new profile in Wireshark with your custom
settings. You can now use this profile for analyzing network traffic according to your
preferences.

Question No: 42 (Marks: 03)

Write the range of Private IP Addresses?


Ans: Private IP addresses are reserved for use within private networks and are not
routable over the internet. The ranges of private IP addresses defined by RFC 1918 are:

1. 10.0.0.0 to 10.255.255.255 (10.0.0.0/8 prefix, a single class A network)


2. 172.16.0.0 to 172.31.255.255 (172.16.0.0/12 prefix, 16 contiguous class B networks)
3. 192.168.0.0 to 192.168.255.255 (192.168.0.0/16 prefix, 256 contiguous class C
networks)

These ranges of IP addresses are commonly used for internal networks in homes,
businesses, and organizations and are not globally unique, meaning multiple networks
can use the same private IP addresses without conflict.

Question No: 43 (Marks: 03)

How can you add a “source port” as a column in wire shark main interface?
Ans: To add a “Source Port” column in the Wireshark main interface, follow these steps:
1. Open Wireshark: Launch the Wireshark application on your computer.

2. Capture Traffic: Start capturing traffic by clicking on the desired interface from
the list of available interfaces, or load a previously captured file.

3. Analyze Packets: Allow Wireshark to capture packets for analysis.

4. Navigate to Columns: In the packet list pane, right-click on any of the existing
column headers (e.g., “No.”, “Time”, “Source”, “Destination”, etc.).

5. Select Column Preferences: From the context menu that appears, select “Column
Preferences.”

6. Add New Column: In the Column Preferences window, click on the “Add” button.

7. Configure Column: In the “Field Type” dropdown menu, select “Source Port.”
You can optionally specify a title for the column in the “Title” field.

8. Save Changes: Click “OK” to save the changes and close the Column Preferences
window.

9. View Source Port Column: You should now see the “Source Port” column added
to the packet list pane, displaying the source port of each captured packet.

By following these steps, you can easily add a “Source Port” column to the main
interface of Wireshark for analyzing network traffic.
Question No: 44 (Marks: 03)

Suppose a medical company wants to design a computer network. The company has its
head office at Lahore and recently opened a branch in Rawalpindi. The head office
comprising of 3 floors will be connected with Rawalpindi branch. Employees in
Rawalpindi are in need to access the confidential information from the server located in
Lahore. Which type of network will be used for communication between Rawalpindi and
head office computers?

Question No: 45 (Marks: 03)

Wireshark's Expert Infos can help you quickly detect network problems as well as
obtain basic information about network communications. You are required to mention the
names of last three TAB of Expert Infos.
Question No: 46 (Marks: 03)
Mention any two Packet Loss Recovery Methods?

Question No: 47 (Marks: 05)

Suppose a network consisting of four routers in a ring topology, with no PCs or loopback
interfaces.You are required to mention the steps to configure the network IP addresses on
Router -1 interface with CLI in Packet Tracer.

Question No: 48 (Marks: 05)

Suppose a residential ISP that has 1,000 customers, but no more than 300 customers
are ever online at the same time. DHCP is ideally suited to these situations, as there are
many users coming and going, and addresses are needed for only a limited amount of
time. You are required to mention the all steps performed by DHCP For a newly arriving
host.

Question No: 49 (Marks: 05)

Suppose a company has two floors where they want to set up a local area network (LAN)
with 200 devices on each floor that will be connected with each other using switch device.
Furthermore all LANs will be connected with each other using router device. By keeping
in mind this scenario you are required to answer the following questions:
1. Which networking device will be used for creating connection between Lahore and
head office?

2. Which type address will be used for communication among the devices in LAN of
Lahore?

3. Which type of cable will be used to connect PC with router for configuration?

Ans: Based on the scenario provided, here are the answers to the questions:

1. Which networking device will be used for creating connection between


Lahore and head office?

A router device will be used to create a connection between the LAN in Lahore and
the head office. Routers are used to connect different networks together, such as
connecting the local LAN in Lahore to the wider network of the head office.

2. Which type address will be used for communication among the devices in
LAN of Lahore?

Devices within the LAN in Lahore will use private IP addresses for communication.
Private IP addresses are reserved for use within private networks and are not
routable over the internet. The ranges of private IP addresses defined by RFC 1918
are commonly used for internal networks, such as the LAN in Lahore.

3. Which type of cable will be used to connect PC with router for


configuration?

To connect a PC with a router for configuration, an Ethernet cable will be used.


Specifically, a straight-through Ethernet cable is typically used to connect a PC to a
router. This type of cable has the same wiring arrangement on both ends, allowing
for communication between devices of different types, such as a PC and a router.

Question No: 50 (Marks: 05)

In wire shark, which filters will be applied to see the following information

1. Filters all traffic to and from 172.16.1.11


2. To capture all DNS traffic
3. Filter on a TCP Conversation Using the Stream Index Field 7
4. To obtain the round trip time (RTT) using TCP handshake

Ans: Here are the filters to achieve the specified tasks in Wireshark:

1. Filters all traffic to and from 172.16.1.11:


```
Ip.addr == 172.16.1.11
```

2. To capture all DNS traffic:


```
Dns
```

3. Filter on a TCP Conversation Using the Stream Index Field 7:


```
Tcp.stream eq 7
```

4. To obtain the round trip time (RTT) using TCP handshake:


```
Tcp.analysis.ack_rtt
```

You can apply these filters in the filter bar of Wireshark to see the desired information.

You might also like