Sample Paper
FINALTERM EXAMINATION
Fall 2022
CS206 - Introduction to Network Design & Analysis
Time: 90 min
Marks: 60
Question No: 1 (Marks: 01) - Please choose the correct option
1. PAP stands for __________ in the context of computer networks.
A. Private Authentication Protocol
B. Password Authentication Protocol
C. Personal Authentication Protocol
D. Protocol Authentication Process
2. VPN stands for ___________.
A. Variable private Network
B. Virtual Private Network
C. Virtual Public Network
D. Vertical Personal Network
3. VPN use __________ technique for secure communication.
A. Routing
B. Tunneling
C. Forwarding
D. Compression
4. In computer networks, Intrusion Detection System is used _________.
A. To compress data being transmitted over a network
B. To detect unauthorized access to a network or system
C. To encrypt data being transmitted over a network
D. To manage network traffic
5. To prevent unauthorized access to a network or system is the function of
_______ device.
A. Firewall
B. Bridge
C. Wire shark
D. Switch
6. ___________ is a network packet analyzer tool.
A. Wire shark
B. Packet tracer
C. Qualys
D. NMAP
7. Wire shark is available for ___________.
A. Windows
B. UNIX
C. UNIX and Windows
D. Android
8. Port numbers can be reused without any problem if previous TCP connection is
_____________.
A. Open
B. Running
C. Terminate
D. Active
9. Keep Alives and Keep Alive ACKs are typically used to check for dead ________.
A. TCP peers
B. UPD peers
C. Both TCP and UDP peers
D. FTP peers
10. In Expert Infos window, “Duplicate ACKs’’ are shown under _____ tab.
A. Errors
B. Warnings
C. Notes
D. Chats
11. _____________ provides the network IP address of a machine against its
network name.
DNS
ARP
HTTP
TCP
12. In a network, routing ________ occur when a packet is routed back onto a network
over and over again.
A. Loops
B. Encryption
C. Compression
D. Delays
13. DNS uses ______ port number and HTTP uses _____port number.
A. 80,53,
B. 53,80
C. 20,53,
D. 21,80
14. Which of the following is a broadcast address?
A. 255.255.255.255
B. 25.255.10.2
C. 200.250.25.25
D. 224.25.250.251
15. Which of the following is a multicast address?
A. 220.0. 0.0
B. 192.0. 0.0
C. 22.0. 0.0
D. 224.25. 0.0
16. _____________ Address Resolution allows obtaining MAC address of a local target
or local router.
A. Hardware
B. IP
C. Subent
D. Network
17. In a network, amount of data that can be carried in a frame is limited by
_____________.
A. MTU
B. Address resolution
C. DNS server
D. DHCP
18. ____________ can be reused without any problem if previous TCP connection is
terminated.
A. Port numbers
B. IP address
C. MAC address
D. Web address
19. In Wire Shark, captured traffic is saved in a ________ file.
A. Trace
B. DOC
C. HTML
D. XML
20. In Wire shark, until you create a new profile, you are working in _______ profile.
A. Default
B. New
C. Latest
D. Old
21. In Wire shark, you need to click twice on your new HTTP Delta column header to
_________ the column data
A. Sort
B. Record
C. Delete
D. Change
22. By default, Wire shark sets the time column to _________since beginning of capture.
A. Seconds
B. Minutes
C. Milliseconds
D. Microseconds
23. In wire shark , you need to click the _______ button to remove your display filter.
A. Finish
B. End
C. Clear
D. Remove
24. In wire shark, dns.flags.rcode > 0 is used to identify __________ responses with
code greater than 0.
A. DNS error
B. DNS request
C. DNS responses
D. None of given option
25. In wire shark, we can use _________ filter to determine how many HTTP requests
were sent to a server.
A. http.method.request
B. http.request
C. http.method
D. http.request.method
26. In Wire shark, to filter out traffic based on an application name, simply precede the
application display filter name with an(a) ___________ sign.
A. Exclamation sign (!)
B. Dollar sign($)
C. Percentage sign (%)
D. Asterk sign (*)
27. In Wire shark, ____________ can help you quickly detect network problems as well
as obtain basic information about network communications.
A. Expert Infos
B. Menu bar
C. Status Infos
D. Toolbar
28. In Wire shark,the Expert Infos window is divided into ________tabs.
A. Five
B. six
C. Seven
D. Eight
29. Which of the following command is used to obtain the IP address of your host?
A. Ipconfig
B. Config
C. Getip
D. Showip
30. If the client does not have the MAC address information in cache, the client sends
out _____________.
A. ARP request
B. TCP request
C. DNS request
D. HTTP request
31. Wire shark allows a user to draw _______ different styles of a graph.
A. Three
B. Four
C. Five
D. Six
32. _________ is a connection less transport layer protocol.
A. TCP
B. UDP
C. Telnet
D. FTP
33. Which of the following is a connection oriented protocol?
A. TCP
B. UDP
C. Telnet
D. FTP
A. Do
34. Wire shark allows us to estimate the _________ by looking at the tcp.time_delta
value.
A. Round trip time
B. End time
C. Start time
D. Average time
35. In wire shark, _______ filter is used to count out-of-order packets.
A. tcp.analysis.out_of_order
B. tcp.out_of_order.count
C. tcp.out_of_order
D. tcp.out_of_order.packets
36. Packet Tracer is a _________ tool.
A. Photo editor
B. Network Simulation
C. Text Editor
D. Spread sheet
37. To connect PC with switch _________ cable is used.
A. Crossover
B. Straight-forward
C. Roll over
D. Straight-through
38. In packet tracer, “Physical Device View” does not contain ________.
A. Zoom In
B. Zoom Out
C. Original Size
D. Front view
39. To configure the IP address manually on a router we need to open the ___________.
A. Desktop
B. Command Line Interface
C. Proxy setting
D. DHCP
Question No: 41 (Marks: 03)
Write the steps to create new profile in wire shark?
Ans: To create a new profile in Wireshark, follow these steps:
1. Open Wireshark: Launch the Wireshark application on your computer.
2. Go to Preferences: Click on the “Edit” menu at the top of the Wireshark window,
then select “Preferences.”
3. Navigate to Profiles: In the Preferences window, find and click on the “Profiles”
option on the left-hand side.
4. Add a new profile: Click on the “+” button or the “New” button to create a new
profile.
5. Customize the profile: Give your new profile a name and configure any settings
or options you want for this profile. You can customize display filters, column
settings, colorization rules, and more.
6. Save the profile: Once you’ve configured the new profile to your liking, click
“OK” or “Save” to save the changes and create the new profile.
7. Apply the profile: After creating the new profile, you can select it from the list of
available profiles in the Preferences window. You can also choose to make the
new profile the default profile for Wireshark if desired.
That’s it! You have successfully created a new profile in Wireshark with your custom
settings. You can now use this profile for analyzing network traffic according to your
preferences.
Question No: 42 (Marks: 03)
Write the range of Private IP Addresses?
Ans: Private IP addresses are reserved for use within private networks and are not
routable over the internet. The ranges of private IP addresses defined by RFC 1918 are:
1. 10.0.0.0 to 10.255.255.255 (10.0.0.0/8 prefix, a single class A network)
2. 172.16.0.0 to 172.31.255.255 (172.16.0.0/12 prefix, 16 contiguous class B networks)
3. 192.168.0.0 to 192.168.255.255 (192.168.0.0/16 prefix, 256 contiguous class C
networks)
These ranges of IP addresses are commonly used for internal networks in homes,
businesses, and organizations and are not globally unique, meaning multiple networks
can use the same private IP addresses without conflict.
Question No: 43 (Marks: 03)
How can you add a “source port” as a column in wire shark main interface?
Ans: To add a “Source Port” column in the Wireshark main interface, follow these steps:
1. Open Wireshark: Launch the Wireshark application on your computer.
2. Capture Traffic: Start capturing traffic by clicking on the desired interface from
the list of available interfaces, or load a previously captured file.
3. Analyze Packets: Allow Wireshark to capture packets for analysis.
4. Navigate to Columns: In the packet list pane, right-click on any of the existing
column headers (e.g., “No.”, “Time”, “Source”, “Destination”, etc.).
5. Select Column Preferences: From the context menu that appears, select “Column
Preferences.”
6. Add New Column: In the Column Preferences window, click on the “Add” button.
7. Configure Column: In the “Field Type” dropdown menu, select “Source Port.”
You can optionally specify a title for the column in the “Title” field.
8. Save Changes: Click “OK” to save the changes and close the Column Preferences
window.
9. View Source Port Column: You should now see the “Source Port” column added
to the packet list pane, displaying the source port of each captured packet.
By following these steps, you can easily add a “Source Port” column to the main
interface of Wireshark for analyzing network traffic.
Question No: 44 (Marks: 03)
Suppose a medical company wants to design a computer network. The company has its
head office at Lahore and recently opened a branch in Rawalpindi. The head office
comprising of 3 floors will be connected with Rawalpindi branch. Employees in
Rawalpindi are in need to access the confidential information from the server located in
Lahore. Which type of network will be used for communication between Rawalpindi and
head office computers?
Question No: 45 (Marks: 03)
Wireshark's Expert Infos can help you quickly detect network problems as well as
obtain basic information about network communications. You are required to mention the
names of last three TAB of Expert Infos.
Question No: 46 (Marks: 03)
Mention any two Packet Loss Recovery Methods?
Question No: 47 (Marks: 05)
Suppose a network consisting of four routers in a ring topology, with no PCs or loopback
interfaces.You are required to mention the steps to configure the network IP addresses on
Router -1 interface with CLI in Packet Tracer.
Question No: 48 (Marks: 05)
Suppose a residential ISP that has 1,000 customers, but no more than 300 customers
are ever online at the same time. DHCP is ideally suited to these situations, as there are
many users coming and going, and addresses are needed for only a limited amount of
time. You are required to mention the all steps performed by DHCP For a newly arriving
host.
Question No: 49 (Marks: 05)
Suppose a company has two floors where they want to set up a local area network (LAN)
with 200 devices on each floor that will be connected with each other using switch device.
Furthermore all LANs will be connected with each other using router device. By keeping
in mind this scenario you are required to answer the following questions:
1. Which networking device will be used for creating connection between Lahore and
head office?
2. Which type address will be used for communication among the devices in LAN of
Lahore?
3. Which type of cable will be used to connect PC with router for configuration?
Ans: Based on the scenario provided, here are the answers to the questions:
1. Which networking device will be used for creating connection between
Lahore and head office?
A router device will be used to create a connection between the LAN in Lahore and
the head office. Routers are used to connect different networks together, such as
connecting the local LAN in Lahore to the wider network of the head office.
2. Which type address will be used for communication among the devices in
LAN of Lahore?
Devices within the LAN in Lahore will use private IP addresses for communication.
Private IP addresses are reserved for use within private networks and are not
routable over the internet. The ranges of private IP addresses defined by RFC 1918
are commonly used for internal networks, such as the LAN in Lahore.
3. Which type of cable will be used to connect PC with router for
configuration?
To connect a PC with a router for configuration, an Ethernet cable will be used.
Specifically, a straight-through Ethernet cable is typically used to connect a PC to a
router. This type of cable has the same wiring arrangement on both ends, allowing
for communication between devices of different types, such as a PC and a router.
Question No: 50 (Marks: 05)
In wire shark, which filters will be applied to see the following information
1. Filters all traffic to and from 172.16.1.11
2. To capture all DNS traffic
3. Filter on a TCP Conversation Using the Stream Index Field 7
4. To obtain the round trip time (RTT) using TCP handshake
Ans: Here are the filters to achieve the specified tasks in Wireshark:
1. Filters all traffic to and from 172.16.1.11:
```
Ip.addr == 172.16.1.11
```
2. To capture all DNS traffic:
```
Dns
```
3. Filter on a TCP Conversation Using the Stream Index Field 7:
```
Tcp.stream eq 7
```
4. To obtain the round trip time (RTT) using TCP handshake:
```
Tcp.analysis.ack_rtt
```
You can apply these filters in the filter bar of Wireshark to see the desired information.