Chapter 15: Internetworking
A. True/False Questions
1. An internetwork connects multiple networks using routers. (True)
2. Subnetting eliminates the need for routing in large networks. (False)
3. An IP datagram can be fragmented at the source or any router along the path. (True)
4. The TTL (Time to Live) field in an IP header ensures data integrity. (False)
5. ARP (Address Resolution Protocol) is used to resolve IP addresses into MAC addresses. (True)
B. Multiple Choice Questions
1. Which device is essential for connecting two different networks in an internetwork?
○ a) Switch
○ b) Router ✓
○ c) Hub
○ d) Repeater
2. What does the TTL field in an IP header do?
○ a) Ensures data is error-free
○ b) Limits the lifespan of a packet ✓
○ c) Specifies the protocol used
○ d) Identifies the source of the packet
3. What protocol is used to map a hostname to an IP address?
○ a) DNS ✓
○ b) ARP
○ c) ICMP
○ d) DHCP
4. Which protocol is used for IP address allocation?
○ a) DNS
○ b) DHCP ✓
○ c) ARP
○ d) ICMP
5. What is the primary purpose of a subnet mask?
○ a) Encrypt data packets
○ b) Distinguish between hosts and networks ✓
○ c) Detect collisions in the network
○ d) Increase packet transmission speed
C. Fill in the Blanks
1. The process of dividing a network into smaller networks is called ____. (Subnetting)
2. IP fragmentation occurs when a packet exceeds the network's ____. (MTU)
3. A router operates at the ____ layer of the OSI model. (Network)
4. The unique identifier for a device on an IP network is called an ____. (IP Address)
5. The ____, defined in RFC 791, is the protocol for delivering packets between hosts. (IPv4)
D. Matching
Concept Description
IP Address Unique identifier in a network
Router Forwards packets between networks
ARP Resolves IP to MAC address
Subnet Mask Differentiates hosts and networks
TTL Limits the lifetime of a packet
Chapter 16: Packet Switching and Performance
A. True/False Questions
1. Packet switching is more efficient than circuit switching for data transmission. (True)
2. Queuing delay occurs when packets are dropped due to congestion. (False)
3. Bandwidth is inversely proportional to latency. (False)
4. In a store-and-forward packet-switched network, routers must receive the entire packet before forwarding.
(True)
5. Jitter refers to variations in packet delay. (True)
B. Multiple Choice Questions
1. Which of the following best describes packet switching?
○ a) Establishing a dedicated communication path
○ b) Dividing data into smaller packets for transmission ✓
○ c) Compressing data before sending
○ d) Encrypting data during transmission
2. Which factor most directly affects network latency?
○ a) Packet size
○ b) Transmission speed
○ c) Distance between nodes ✓
○ d) Router processing speed
3. What is the primary cause of congestion in a network?
○ a) Excessive packet loss
○ b) Insufficient buffer size
○ c) High traffic volume ✓
○ d) Low bandwidth utilization
4. What is a benefit of packet switching over circuit switching?
○ a) Guaranteed delivery
○ b) Lower setup time ✓
○ c) Dedicated resources for each session
○ d) Easier error correction
5. Which layer of the OSI model manages end-to-end data delivery?
○ a) Physical
○ b) Data Link
○ c) Transport ✓
○ d) Network
C. Fill in the Blanks
1. In a packet-switched network, data is divided into ____. (Packets)
2. A high ____, such as fiber-optic links, reduces transmission delay. (Bandwidth)
3. ____, such as TCP, ensures packets are delivered in the correct order. (Protocols)
4. Delays caused by packet processing at intermediate devices are called ____. (Processing delays)
5. The total time taken for a packet to travel from sender to receiver is called ____. (Latency)
D. Matching
Concept Description
Packet Switching Data sent in chunks called packets
Jitter Variability in packet delay
Latency Total delay in data transmission
Queuing Delay Time spent in buffers due to congestion
Throughput Amount of data successfully transmitted
Chapter 17: The Internet Protocol (IP)
A. True/False Questions
1. IPv4 uses 128-bit addresses, while IPv6 uses 32-bit addresses. (False)
2. CIDR (Classless Inter-Domain Routing) replaces class-based addressing. (True)
3. IPv4 addresses are divided into four octets. (True)
4. NAT (Network Address Translation) enables private IP addresses to access the Internet. (True)
5. IPv6 eliminates the need for ARP. (True)
B. Multiple Choice Questions
1. Which is a valid IPv4 address?
○ a) 192.168.256.1
○ b) 10.0.0.1 ✓
○ c) 300.300.300.300
○ d) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
2. What is the primary benefit of IPv6 over IPv4?
○ a) Simpler header
○ b) Larger address space ✓
○ c) Higher speed
○ d) Improved encryption
3. What is the function of a subnet mask?
○ a) Resolve IP addresses
○ b) Determine the host portion of an address ✓
○ c) Control packet fragmentation
○ d) Identify a network interface
4. What is a loopback address in IPv4?
○ a) 127.0.0.1 ✓
○ b) 192.168.1.1
○ c) 255.255.255.255
○ d) 0.0.0.0
5. Which protocol supports IP address conflict detection?
○ a) ICMP
○ b) ARP
○ c) DHCP ✓
○ d) DNS
C. Fill in the Blanks
1. IPv6 uses ____-bit addressing, allowing for a larger address space. (128)
2. The reserved IPv4 address for broadcast communication is ____. (255.255.255.255)
3. NAT translates ____ IP addresses into public IP addresses. (Private)
4. The ____, defined in IPv6, simplifies routing by eliminating the need for fragmentation. (Flow Label)
5. The ____, part of the IP header, contains error-detection information. (Checksum)
D. Matching
Concept Description
IPv4 Addressing 32-bit address space
IPv6 Addressing 128-bit address space
NAT Converts private to public IPs
CIDR Efficient IP allocation
Subnet Mask Divides network and host portions
Chapter 18: Routing
A. True/False Questions
1. Static routing requires manual configuration of routing tables. (True)
2. Distance-vector routing protocols broadcast the entire routing table to neighbors. (True)
3. OSPF (Open Shortest Path First) uses the Bellman-Ford algorithm. (False)
4. RIP (Routing Information Protocol) limits the number of hops to prevent loops. (True)
5. Routing loops can be prevented using techniques like split horizon and poison reverse. (True)
B. Multiple Choice Questions
1. Which algorithm does OSPF use for routing?
○ a) Bellman-Ford
○ b) Dijkstra ✓
○ c) Flooding
○ d) Distance Vector
2. What is the primary advantage of dynamic routing over static routing?
○ a) Reduced bandwidth usage
○ b) Automatic adaptation to network changes ✓
○ c) Simpler configuration
○ d) Increased security
3. Which metric does RIP use to calculate the best route?
○ a) Bandwidth
○ b) Latency
○ c) Hop count ✓
○ d) Packet size
4. Which routing protocol is suitable for large enterprise networks?
○ a) RIP
○ b) EIGRP ✓
○ c) Static routing
○ d) NAT
5. What is the administrative distance of directly connected routes in most routing protocols?
○ a) 1 ✓
○ b) 90
○ c) 100
○ d) 110
C. Fill in the Blanks
1. RIP prevents routing loops using a maximum hop count of ____. (15)
2. The ____, used in dynamic routing, determines the best path to a destination. (Metric)
3. BGP (Border Gateway Protocol) is primarily used for routing between ____. (Autonomous Systems)
4. Static routing is best suited for ____, stable networks. (Small)
5. The ____, in a routing protocol, is the first point of contact for routing packets. (Next-hop)
D. Matching
Concept Description
Static Routing Requires manual route configuration
Dynamic Routing Adapts automatically to network changes
OSPF Link-state protocol using Dijkstra's algorithm
RIP Distance-vector protocol using hop count
BGP Protocol for inter-AS routing
Chapter 19: Transport Protocols
A. True/False Questions
1. TCP provides a reliable, connection-oriented service. (True)
2. UDP includes flow control mechanisms. (False)
3. Port numbers are used to identify applications on a device. (True)
4. The three-way handshake is used for establishing TCP connections. (True)
5. UDP is suitable for real-time applications like video streaming. (True)
B. Multiple Choice Questions
1. What is the main purpose of the TCP three-way handshake?
○ a) Encrypt the connection
○ b) Synchronize sequence numbers ✓
○ c) Authenticate the connection
○ d) Close the session
2. Which of the following protocols is connectionless?
○ a) TCP
○ b) UDP ✓
○ c) FTP
○ d) SSH
3. What mechanism does TCP use to ensure reliable delivery?
○ a) Broadcast
○ b) Acknowledgments ✓
○ c) Flow labels
○ d) Congestion avoidance
4. Which field in a TCP header is used to indicate the next expected byte?
○ a) Sequence Number
○ b) Acknowledgment Number ✓
○ c) Checksum
○ d) Window Size
5. What is the default port number for HTTP?
○ a) 20
○ b) 21
○ c) 80 ✓
○ d) 443
C. Fill in the Blanks
1. TCP uses ____, which ensures data is delivered in the correct order. (Sequence numbers)
2. UDP does not guarantee delivery or ____. (Order)
3. The ____, in a TCP header, specifies the size of the receiving window. (Window size)
4. The protocol used for transferring files over TCP is ____. (FTP)
5. The ____, used by TCP, prevents the sender from overwhelming the receiver. (Flow control)
D. Matching
Concept Description
TCP Reliable, connection-oriented protocol
UDP Unreliable, connectionless protocol
Sequence Number Tracks data order in TCP
Acknowledgment Indicates next expected byte in TCP
Number
Port Number Identifies application endpoints
Chapter 20: Application Protocols
A. True/False Questions
1. HTTP is a stateless protocol. (True)
2. FTP transfers data over a single connection. (False)
3. DNS translates domain names into IP addresses. (True)
4. SMTP is used for retrieving emails from a server. (False)
5. IMAP allows email access from multiple devices. (True)
B. Multiple Choice Questions
1. Which port number is commonly used by HTTPS?
○ a) 25
○ b) 110
○ c) 443 ✓
○ d) 53
2. What is the function of DNS?
○ a) Allocate IP addresses dynamically
○ b) Resolve domain names to IP addresses ✓
○ c) Provide encryption for data
○ d) Transmit emails securely
3. Which email protocol allows access to messages without downloading them?
○ a) POP3
○ b) SMTP
○ c) IMAP ✓
○ d) FTP
4. What type of communication does HTTP use?
○ a) Connection-oriented
○ b) Connectionless ✓
○ c) Multicast
○ d) Full-duplex
5. Which protocol is used for sending emails?
○ a) SMTP ✓
○ b) IMAP
○ c) POP3
○ d) DNS
C. Fill in the Blanks
1. The ____, part of the URL, specifies the protocol to be used. (Scheme)
2. FTP uses ports ____ and 21 for data transfer and control, respectively. (20)
3. ____, an email protocol, allows offline access by downloading messages. (POP3)
4. HTTP status code ____ indicates a successful request. (200)
5. The ____, maintained by ICANN, ensures the uniqueness of domain names. (DNS)
D. Matching:
Concept Description
HTTP Stateless web communication protocol
FTP Protocol for file transfer
DNS Resolves domain names to IP addresses
SMTP Sends email between servers
IMAP Allows email access from multiple devices
Chapter 21: Security and Cryptography
Exam-Style Questions
True/False Questions
1. Symmetric encryption uses the same key for both encryption and decryption. (True)
2. Public key cryptography eliminates the need for private keys. (False)
3. A hash function generates a fixed-size output regardless of input size. (True)
4. HTTPS combines HTTP and SSL/TLS for secure communication. (True)
5. A digital signature ensures both integrity and confidentiality. (False)
Multiple Choice Questions (MCQs)
1. Primary advantage of public key cryptography:
○ a) It is faster than symmetric encryption.
○ b) It simplifies key distribution. ✓
○ c) It eliminates the need for encryption.
○ d) It does not require decryption keys.
2. Protocol for secure data transfer over the Internet:
○ a) FTP
○ b) SSH ✓
○ c) SNMP
○ d) HTTP
3. Example of symmetric encryption algorithm:
○ a) RSA
○ b) DES ✓
○ c) DSA
○ d) SHA
4. Purpose of a digital certificate:
○ a) To encrypt data
○ b) To authenticate the identity of an entity ✓
○ c) To compress files
○ d) To verify IP addresses
5. Not a property of a cryptographic hash function:
○ a) Deterministic output
○ b) Reversibility ✓
○ c) Collision resistance
○ d) Fixed output size
Fill-in-the-Gaps
1. SSL/TLS protocols use ____, a combination of symmetric and asymmetric cryptography. (Hybrid)
2. The ____, part of public key cryptography, is kept secret. (Private key)
3. A ____, generated from data, ensures data integrity. (Hash)
4. HTTPS is HTTP combined with ____. (SSL/TLS)
5. RSA is an example of a(n) ____ encryption algorithm. (Asymmetric)
Matching Table:
Concept Description
Symmetric Encryption Same key for encryption and decryption
Public Key Cryptography Uses a key pair: public and private
Hash Function Generates fixed-size output from input
SSL/TLS Protocol for secure communication
Digital Certificate Authenticates the identity of a website/entity
Chapter 22: Network Management
Exam-Style Questions
True/False Questions
1. SNMP (Simple Network Management Protocol) is used for managing network devices. (True)
2. A network management system primarily monitors device power consumption. (False)
3. MIB (Management Information Base) is a database used by SNMP. (True)
4. Fault management involves detecting and resolving network issues. (True)
5. Performance management focuses on user authentication. (False)
Multiple Choice Questions (MCQs)
1. Component used in SNMP for monitoring devices:
○ a) Router
○ b) Agent ✓
○ c) Switch
○ d) Firewall
2. MIB in SNMP stands for:
○ a) Management Information Base ✓
○ b) Monitoring Interface Bandwidth
○ c) Managed Infrastructure Block
○ d) Management Integration Buffer
3. Function of configuration management:
○ a) Managing software updates ✓
○ b) Monitoring network bandwidth
○ c) Encrypting network traffic
○ d) Detecting unauthorized access
4. SNMP version with encryption and authentication:
○ a) SNMPv1
○ b) SNMPv2
○ c) SNMPv3 ✓
○ d) SNMPv4
5. Protocol for centralized logging in networks:
○ a) FTP
○ b) Syslog ✓
○ c) HTTP
○ d) ARP
Fill-in-the-Gaps
1. SNMP works on the ____, which describes managed objects. (MIB)
2. ____, a network management function, tracks the utilization of resources. (Performance management)
3. SNMP uses the ____ protocol for communication. (UDP)
4. Fault management aims to ____, log, and resolve network errors. (Detect)
5. The ____, used in SNMPv3, adds security features like encryption. (User-based Security Model)
Matching Table:
Concept Description
SNMP Protocol for managing network devices
Fault Management Detects and resolves network problems
MIB Database of managed objects
Syslog Centralized logging protocol
Configuration Management Manages network device configurations
Chapter 23: Multimedia Networking
Exam-Style Questions
True/False Questions
1. RTP (Real-Time Protocol) is used for real-time multimedia transmission. (True)
2. Multimedia data requires higher latency tolerance than standard data. (False)
3. Streaming video uses TCP for data delivery. (False)
4. QoS (Quality of Service) ensures consistent performance for multimedia. (True)
5. Jitter buffers are used to handle packet delay variations. (True)
Multiple Choice Questions (MCQs)
1. QoS stands for:
○ a) Quality of Speed
○ b) Quality of Service ✓
○ c) Query of Security
○ d) Quality of Streams
2. Protocol commonly used for streaming multimedia:
○ a) RTP ✓
○ b) SMTP
○ c) FTP
○ d) ICMP
3. RTCP stands for:
○ a) Real-Time Control Protocol ✓
○ b) Reliable Transport Control Protocol
○ c) Real-Time Command Protocol
○ d) Remote Transmission Control Protocol
4. QoS feature that prioritizes multimedia traffic:
○ a) Best-effort delivery
○ b) Traffic shaping ✓
○ c) Encryption
○ d) Data compression
5. Primary concern when transmitting multimedia data:
○ a) Latency ✓
○ b) Packet size
○ c) Header compression
○ d) File size
Fill-in-the-Gaps
1. ____, a multimedia protocol, provides end-to-end delivery of real-time data. (RTP)
2. A ____ is used to smooth out variations in packet arrival times. (Jitter buffer)
3. QoS mechanisms aim to provide ____, low-latency communication. (Reliable)
4. ____, a multimedia application, often uses UDP for faster delivery. (Streaming)
5. RTCP works alongside RTP to provide ____. (Control and feedback)
Matching Table
Concept Description
RTP Protocol for real-time multimedia
RTCP Provides feedback for RTP sessions
QoS Ensures consistent multimedia performance
Jitter Buffer Manages delay variations in multimedia packets
Latency Key metric in multimedia performance
Chapter 24: Wireless and Mobile Networks
Exam-Style Questions
True/False Questions
1. Wi-Fi operates on both 2.4 GHz and 5 GHz frequency bands. (True)
2. Cellular networks use circuit-switching for all voice and data communication. (False)
3. Mobile IP allows devices to maintain connectivity while moving between networks. (True)
4. Bluetooth is primarily designed for high-speed, long-range data transmission. (False)
5. Handoff in cellular networks enables uninterrupted connectivity during movement. (True)
Multiple Choice Questions (MCQs)
1. Protocol for mobility management in IP networks:
○ a) ARP
○ b) DHCP
○ c) Mobile IP ✓
○ d) SNMP
2. Fastest Wi-Fi standard:
○ a) 802.11g
○ b) 802.11n
○ c) 802.11ac ✓
○ d) 802.11a
3. Primary function of a base station:
○ a) Encrypt data
○ b) Provide network coverage ✓
○ c) Manage IP addressing
○ d) Perform routing
4. Short-range wireless communication protocol:
○ a) LTE
○ b) Bluetooth ✓
○ c) TCP
○ d) OSPF
5. Maintaining IP address when moving across networks:
○ a) Mobile IP ✓
○ b) NAT
○ c) DNS
○ d) VPN
Fill-in-the-Gaps
1. Process of switching between cell towers: (Handoff)
2. WPA enhances security by using: (Encryption)
3. Connects mobile devices to core network: (Base station)
4. 802.11ac maximum bandwidth: (1 Gbps)
5. Mobile IP uses ____ to forward packets: (Tunneling)
Matching Table
Concept Description
Mobile IP Ensures seamless mobility across networks
Base Station Provides cellular coverage and connectivity
Wi-Fi Wireless LAN technology
Bluetooth Short-range wireless communication protocol
Handoff Switching between cellular towers seamlessly
Chapter 25: Data Center Networking
Exam-Style Questions
True/False Questions
1. Data center networks often use a hierarchical architecture. (True)
2. The spine-and-leaf topology is designed for scalability and low latency. (True)
3. SDN (Software-Defined Networking) separates the data and control planes. (True)
4. Virtual machines in data centers always share the same physical resources. (False)
5. Ethernet is the only protocol used in data center networks. (False)
Multiple Choice Questions (MCQs)
1. Spine-and-leaf architecture goal:
○ a) Energy efficiency
○ b) Minimized latency and scalability ✓
○ c) Cost reduction
○ d) Security enhancement
2. Technology for multiple virtual networks:
○ a) VLAN ✓
○ b) VPN
○ c) MPLS
○ d) QoS
3. SDN stands for:
○ a) Software-Defined Networking ✓
○ b) Scalable Data Networking
○ c) Service-Driven Network
○ d) Simple Data Network
4. SDN component for decision-making:
○ a) Data plane
○ b) Control plane ✓
○ c) Virtual machine
○ d) Hypervisor
5. Protocol for storage networking:
○ a) iSCSI ✓
○ b) HTTP
○ c) SMTP
○ d) FTP
Fill-in-the-Gaps
1. Spine-and-leaf is a ____ topology: (Non-blocking)
2. SDN separates control plane from ____ plane: (Data)
3. VLANs allow segmentation on same: (Physical infrastructure)
4. Data centers use ____ for interconnects: (Ethernet)
5. Virtualization enables multiple ____ on one machine: (Virtual machines)
Matching Table
Concept Description
Spine-and-Leaf Scalable, low-latency data center topology
SDN Separates data and control planes
VLAN Enables virtual networks on shared infrastructure
Ethernet Common protocol for data center connectivity
Virtual Machine Software-defined instance running on hardware
Chapter 26: The Internet of Things (IoT)
Exam-Style Questions
True/False Questions
1. IoT devices typically communicate using IPv4. (False)
2. MQTT is a lightweight protocol used in IoT applications. (True)
3. IoT networks often require strict power management. (True)
4. Zigbee and LoRaWAN are IoT-specific communication protocols. (True)
5. IoT applications generally prioritize high bandwidth over low latency. (False)
Multiple Choice Questions (MCQs)
1. MQTT stands for:
○ a) Message Queuing Telemetry Transport ✓
○ b) Multimedia Queue Transfer Technology
○ c) Managed Quality Transmission Technique
○ d) Machine Query Translation Technique
2. Low-power IoT network protocol:
○ a) Wi-Fi
○ b) Zigbee ✓
○ c) Ethernet
○ d) Fiber optic
3. Edge computing refers to:
○ a) Storing data in a central location
○ b) Processing data near the data source ✓
○ c) Encrypting IoT devices
○ d) Using cloud servers exclusively
4. Long-range, low-power communication protocol:
○ a) LoRaWAN ✓
○ b) Bluetooth
○ c) HTTP
○ d) UDP
5. IoT application:
○ a) Industrial automation ✓
○ b) Social media management
○ c) Web design
○ d) Data encryption algorithms
Fill-in-the-Gaps
1. Lightweight IoT communication protocol: (Zigbee)
2. Processes data close to devices: (Edge computing)
3. IoT devices use ____ for identifiers: (IPv6)
4. MQTT communication model: (Publish/subscribe)
5. Long-range, low-bandwidth protocol: (LoRaWAN)
Matching Table
Concept Description
IoT Network of interconnected devices
Zigbee Low-power communication protocol
MQTT Lightweight IoT messaging protocol
Edge Computing Processes data close to the data source
LoRaWAN Long-range, low-power communication protocol
” “مسك الختام
🏆 you are Hero if you got here ...so know 🏆
"Knowledge is not just about remembering facts,
but understanding their connections.
Exams test your preparation,
but your character defines your success.
Stay calm, stay focused,
and remember:
You are more powerful than any question paper.
God bless you,
brave knowledge warrior!"
Anonymous Motivator for األوغاد 🌟