0% found this document useful (0 votes)
47 views23 pages

Human learing in 2 هراء عالي النقاء

Uploaded by

Hassan Shaheen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views23 pages

Human learing in 2 هراء عالي النقاء

Uploaded by

Hassan Shaheen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Chapter 15: Internetworking

A. True/False Questions

1. An internetwork connects multiple networks using routers. (True)


2. Subnetting eliminates the need for routing in large networks. (False)
3. An IP datagram can be fragmented at the source or any router along the path. (True)
4. The TTL (Time to Live) field in an IP header ensures data integrity. (False)
5. ARP (Address Resolution Protocol) is used to resolve IP addresses into MAC addresses. (True)

B. Multiple Choice Questions

1. Which device is essential for connecting two different networks in an internetwork?


○ a) Switch
○ b) Router ✓
○ c) Hub
○ d) Repeater
2. What does the TTL field in an IP header do?
○ a) Ensures data is error-free
○ b) Limits the lifespan of a packet ✓
○ c) Specifies the protocol used
○ d) Identifies the source of the packet
3. What protocol is used to map a hostname to an IP address?
○ a) DNS ✓
○ b) ARP
○ c) ICMP
○ d) DHCP
4. Which protocol is used for IP address allocation?
○ a) DNS
○ b) DHCP ✓
○ c) ARP
○ d) ICMP
5. What is the primary purpose of a subnet mask?
○ a) Encrypt data packets
○ b) Distinguish between hosts and networks ✓
○ c) Detect collisions in the network
○ d) Increase packet transmission speed

C. Fill in the Blanks

1. The process of dividing a network into smaller networks is called ____. (Subnetting)
2. IP fragmentation occurs when a packet exceeds the network's ____. (MTU)
3. A router operates at the ____ layer of the OSI model. (Network)
4. The unique identifier for a device on an IP network is called an ____. (IP Address)
5. The ____, defined in RFC 791, is the protocol for delivering packets between hosts. (IPv4)
D. Matching

Concept Description

IP Address Unique identifier in a network

Router Forwards packets between networks

ARP Resolves IP to MAC address

Subnet Mask Differentiates hosts and networks

TTL Limits the lifetime of a packet

Chapter 16: Packet Switching and Performance


A. True/False Questions

1. Packet switching is more efficient than circuit switching for data transmission. (True)
2. Queuing delay occurs when packets are dropped due to congestion. (False)
3. Bandwidth is inversely proportional to latency. (False)
4. In a store-and-forward packet-switched network, routers must receive the entire packet before forwarding.
(True)
5. Jitter refers to variations in packet delay. (True)

B. Multiple Choice Questions

1. Which of the following best describes packet switching?


○ a) Establishing a dedicated communication path
○ b) Dividing data into smaller packets for transmission ✓
○ c) Compressing data before sending
○ d) Encrypting data during transmission
2. Which factor most directly affects network latency?
○ a) Packet size
○ b) Transmission speed
○ c) Distance between nodes ✓
○ d) Router processing speed
3. What is the primary cause of congestion in a network?
○ a) Excessive packet loss
○ b) Insufficient buffer size
○ c) High traffic volume ✓
○ d) Low bandwidth utilization
4. What is a benefit of packet switching over circuit switching?
○ a) Guaranteed delivery
○ b) Lower setup time ✓
○ c) Dedicated resources for each session
○ d) Easier error correction
5. Which layer of the OSI model manages end-to-end data delivery?
○ a) Physical
○ b) Data Link
○ c) Transport ✓
○ d) Network

C. Fill in the Blanks

1. In a packet-switched network, data is divided into ____. (Packets)


2. A high ____, such as fiber-optic links, reduces transmission delay. (Bandwidth)
3. ____, such as TCP, ensures packets are delivered in the correct order. (Protocols)
4. Delays caused by packet processing at intermediate devices are called ____. (Processing delays)
5. The total time taken for a packet to travel from sender to receiver is called ____. (Latency)

D. Matching

Concept Description

Packet Switching Data sent in chunks called packets

Jitter Variability in packet delay

Latency Total delay in data transmission

Queuing Delay Time spent in buffers due to congestion

Throughput Amount of data successfully transmitted


Chapter 17: The Internet Protocol (IP)
A. True/False Questions

1. IPv4 uses 128-bit addresses, while IPv6 uses 32-bit addresses. (False)
2. CIDR (Classless Inter-Domain Routing) replaces class-based addressing. (True)
3. IPv4 addresses are divided into four octets. (True)
4. NAT (Network Address Translation) enables private IP addresses to access the Internet. (True)
5. IPv6 eliminates the need for ARP. (True)

B. Multiple Choice Questions

1. Which is a valid IPv4 address?


○ a) 192.168.256.1
○ b) 10.0.0.1 ✓
○ c) 300.300.300.300
○ d) 2001:0db8:85a3:0000:0000:8a2e:0370:7334
2. What is the primary benefit of IPv6 over IPv4?
○ a) Simpler header
○ b) Larger address space ✓
○ c) Higher speed
○ d) Improved encryption
3. What is the function of a subnet mask?
○ a) Resolve IP addresses
○ b) Determine the host portion of an address ✓
○ c) Control packet fragmentation
○ d) Identify a network interface
4. What is a loopback address in IPv4?
○ a) 127.0.0.1 ✓
○ b) 192.168.1.1
○ c) 255.255.255.255
○ d) 0.0.0.0
5. Which protocol supports IP address conflict detection?
○ a) ICMP
○ b) ARP
○ c) DHCP ✓
○ d) DNS

C. Fill in the Blanks

1. IPv6 uses ____-bit addressing, allowing for a larger address space. (128)
2. The reserved IPv4 address for broadcast communication is ____. (255.255.255.255)
3. NAT translates ____ IP addresses into public IP addresses. (Private)
4. The ____, defined in IPv6, simplifies routing by eliminating the need for fragmentation. (Flow Label)
5. The ____, part of the IP header, contains error-detection information. (Checksum)

D. Matching
Concept Description

IPv4 Addressing 32-bit address space

IPv6 Addressing 128-bit address space

NAT Converts private to public IPs

CIDR Efficient IP allocation

Subnet Mask Divides network and host portions


Chapter 18: Routing
A. True/False Questions

1. Static routing requires manual configuration of routing tables. (True)


2. Distance-vector routing protocols broadcast the entire routing table to neighbors. (True)
3. OSPF (Open Shortest Path First) uses the Bellman-Ford algorithm. (False)
4. RIP (Routing Information Protocol) limits the number of hops to prevent loops. (True)
5. Routing loops can be prevented using techniques like split horizon and poison reverse. (True)

B. Multiple Choice Questions

1. Which algorithm does OSPF use for routing?


○ a) Bellman-Ford
○ b) Dijkstra ✓
○ c) Flooding
○ d) Distance Vector
2. What is the primary advantage of dynamic routing over static routing?
○ a) Reduced bandwidth usage
○ b) Automatic adaptation to network changes ✓
○ c) Simpler configuration
○ d) Increased security
3. Which metric does RIP use to calculate the best route?
○ a) Bandwidth
○ b) Latency
○ c) Hop count ✓
○ d) Packet size
4. Which routing protocol is suitable for large enterprise networks?
○ a) RIP
○ b) EIGRP ✓
○ c) Static routing
○ d) NAT
5. What is the administrative distance of directly connected routes in most routing protocols?
○ a) 1 ✓
○ b) 90
○ c) 100
○ d) 110

C. Fill in the Blanks

1. RIP prevents routing loops using a maximum hop count of ____. (15)
2. The ____, used in dynamic routing, determines the best path to a destination. (Metric)
3. BGP (Border Gateway Protocol) is primarily used for routing between ____. (Autonomous Systems)
4. Static routing is best suited for ____, stable networks. (Small)
5. The ____, in a routing protocol, is the first point of contact for routing packets. (Next-hop)
D. Matching

Concept Description

Static Routing Requires manual route configuration

Dynamic Routing Adapts automatically to network changes

OSPF Link-state protocol using Dijkstra's algorithm

RIP Distance-vector protocol using hop count

BGP Protocol for inter-AS routing


Chapter 19: Transport Protocols
A. True/False Questions

1. TCP provides a reliable, connection-oriented service. (True)


2. UDP includes flow control mechanisms. (False)
3. Port numbers are used to identify applications on a device. (True)
4. The three-way handshake is used for establishing TCP connections. (True)
5. UDP is suitable for real-time applications like video streaming. (True)

B. Multiple Choice Questions

1. What is the main purpose of the TCP three-way handshake?


○ a) Encrypt the connection
○ b) Synchronize sequence numbers ✓
○ c) Authenticate the connection
○ d) Close the session
2. Which of the following protocols is connectionless?
○ a) TCP
○ b) UDP ✓
○ c) FTP
○ d) SSH
3. What mechanism does TCP use to ensure reliable delivery?
○ a) Broadcast
○ b) Acknowledgments ✓
○ c) Flow labels
○ d) Congestion avoidance
4. Which field in a TCP header is used to indicate the next expected byte?
○ a) Sequence Number
○ b) Acknowledgment Number ✓
○ c) Checksum
○ d) Window Size
5. What is the default port number for HTTP?
○ a) 20
○ b) 21
○ c) 80 ✓
○ d) 443

C. Fill in the Blanks

1. TCP uses ____, which ensures data is delivered in the correct order. (Sequence numbers)
2. UDP does not guarantee delivery or ____. (Order)
3. The ____, in a TCP header, specifies the size of the receiving window. (Window size)
4. The protocol used for transferring files over TCP is ____. (FTP)
5. The ____, used by TCP, prevents the sender from overwhelming the receiver. (Flow control)
D. Matching

Concept Description

TCP Reliable, connection-oriented protocol

UDP Unreliable, connectionless protocol

Sequence Number Tracks data order in TCP

Acknowledgment Indicates next expected byte in TCP


Number

Port Number Identifies application endpoints


Chapter 20: Application Protocols
A. True/False Questions

1. HTTP is a stateless protocol. (True)


2. FTP transfers data over a single connection. (False)
3. DNS translates domain names into IP addresses. (True)
4. SMTP is used for retrieving emails from a server. (False)
5. IMAP allows email access from multiple devices. (True)

B. Multiple Choice Questions

1. Which port number is commonly used by HTTPS?


○ a) 25
○ b) 110
○ c) 443 ✓
○ d) 53
2. What is the function of DNS?
○ a) Allocate IP addresses dynamically
○ b) Resolve domain names to IP addresses ✓
○ c) Provide encryption for data
○ d) Transmit emails securely
3. Which email protocol allows access to messages without downloading them?
○ a) POP3
○ b) SMTP
○ c) IMAP ✓
○ d) FTP
4. What type of communication does HTTP use?
○ a) Connection-oriented
○ b) Connectionless ✓
○ c) Multicast
○ d) Full-duplex
5. Which protocol is used for sending emails?
○ a) SMTP ✓
○ b) IMAP
○ c) POP3
○ d) DNS

C. Fill in the Blanks

1. The ____, part of the URL, specifies the protocol to be used. (Scheme)
2. FTP uses ports ____ and 21 for data transfer and control, respectively. (20)
3. ____, an email protocol, allows offline access by downloading messages. (POP3)
4. HTTP status code ____ indicates a successful request. (200)
5. The ____, maintained by ICANN, ensures the uniqueness of domain names. (DNS)
D. Matching:

Concept Description

HTTP Stateless web communication protocol

FTP Protocol for file transfer

DNS Resolves domain names to IP addresses

SMTP Sends email between servers

IMAP Allows email access from multiple devices


Chapter 21: Security and Cryptography
Exam-Style Questions
True/False Questions

1. Symmetric encryption uses the same key for both encryption and decryption. (True)
2. Public key cryptography eliminates the need for private keys. (False)
3. A hash function generates a fixed-size output regardless of input size. (True)
4. HTTPS combines HTTP and SSL/TLS for secure communication. (True)
5. A digital signature ensures both integrity and confidentiality. (False)

Multiple Choice Questions (MCQs)

1. Primary advantage of public key cryptography:


○ a) It is faster than symmetric encryption.
○ b) It simplifies key distribution. ✓
○ c) It eliminates the need for encryption.
○ d) It does not require decryption keys.
2. Protocol for secure data transfer over the Internet:
○ a) FTP
○ b) SSH ✓
○ c) SNMP
○ d) HTTP
3. Example of symmetric encryption algorithm:
○ a) RSA
○ b) DES ✓
○ c) DSA
○ d) SHA
4. Purpose of a digital certificate:
○ a) To encrypt data
○ b) To authenticate the identity of an entity ✓
○ c) To compress files
○ d) To verify IP addresses
5. Not a property of a cryptographic hash function:
○ a) Deterministic output
○ b) Reversibility ✓
○ c) Collision resistance
○ d) Fixed output size

Fill-in-the-Gaps

1. SSL/TLS protocols use ____, a combination of symmetric and asymmetric cryptography. (Hybrid)
2. The ____, part of public key cryptography, is kept secret. (Private key)
3. A ____, generated from data, ensures data integrity. (Hash)
4. HTTPS is HTTP combined with ____. (SSL/TLS)
5. RSA is an example of a(n) ____ encryption algorithm. (Asymmetric)
Matching Table:

Concept Description

Symmetric Encryption Same key for encryption and decryption

Public Key Cryptography Uses a key pair: public and private

Hash Function Generates fixed-size output from input

SSL/TLS Protocol for secure communication

Digital Certificate Authenticates the identity of a website/entity


Chapter 22: Network Management
Exam-Style Questions
True/False Questions

1. SNMP (Simple Network Management Protocol) is used for managing network devices. (True)
2. A network management system primarily monitors device power consumption. (False)
3. MIB (Management Information Base) is a database used by SNMP. (True)
4. Fault management involves detecting and resolving network issues. (True)
5. Performance management focuses on user authentication. (False)

Multiple Choice Questions (MCQs)

1. Component used in SNMP for monitoring devices:


○ a) Router
○ b) Agent ✓
○ c) Switch
○ d) Firewall
2. MIB in SNMP stands for:
○ a) Management Information Base ✓
○ b) Monitoring Interface Bandwidth
○ c) Managed Infrastructure Block
○ d) Management Integration Buffer
3. Function of configuration management:
○ a) Managing software updates ✓
○ b) Monitoring network bandwidth
○ c) Encrypting network traffic
○ d) Detecting unauthorized access
4. SNMP version with encryption and authentication:
○ a) SNMPv1
○ b) SNMPv2
○ c) SNMPv3 ✓
○ d) SNMPv4
5. Protocol for centralized logging in networks:
○ a) FTP
○ b) Syslog ✓
○ c) HTTP
○ d) ARP

Fill-in-the-Gaps

1. SNMP works on the ____, which describes managed objects. (MIB)


2. ____, a network management function, tracks the utilization of resources. (Performance management)
3. SNMP uses the ____ protocol for communication. (UDP)
4. Fault management aims to ____, log, and resolve network errors. (Detect)
5. The ____, used in SNMPv3, adds security features like encryption. (User-based Security Model)
Matching Table:

Concept Description

SNMP Protocol for managing network devices

Fault Management Detects and resolves network problems

MIB Database of managed objects

Syslog Centralized logging protocol

Configuration Management Manages network device configurations


Chapter 23: Multimedia Networking
Exam-Style Questions
True/False Questions

1. RTP (Real-Time Protocol) is used for real-time multimedia transmission. (True)


2. Multimedia data requires higher latency tolerance than standard data. (False)
3. Streaming video uses TCP for data delivery. (False)
4. QoS (Quality of Service) ensures consistent performance for multimedia. (True)
5. Jitter buffers are used to handle packet delay variations. (True)

Multiple Choice Questions (MCQs)

1. QoS stands for:


○ a) Quality of Speed
○ b) Quality of Service ✓
○ c) Query of Security
○ d) Quality of Streams
2. Protocol commonly used for streaming multimedia:
○ a) RTP ✓
○ b) SMTP
○ c) FTP
○ d) ICMP
3. RTCP stands for:
○ a) Real-Time Control Protocol ✓
○ b) Reliable Transport Control Protocol
○ c) Real-Time Command Protocol
○ d) Remote Transmission Control Protocol
4. QoS feature that prioritizes multimedia traffic:
○ a) Best-effort delivery
○ b) Traffic shaping ✓
○ c) Encryption
○ d) Data compression
5. Primary concern when transmitting multimedia data:
○ a) Latency ✓
○ b) Packet size
○ c) Header compression
○ d) File size

Fill-in-the-Gaps

1. ____, a multimedia protocol, provides end-to-end delivery of real-time data. (RTP)


2. A ____ is used to smooth out variations in packet arrival times. (Jitter buffer)
3. QoS mechanisms aim to provide ____, low-latency communication. (Reliable)
4. ____, a multimedia application, often uses UDP for faster delivery. (Streaming)
5. RTCP works alongside RTP to provide ____. (Control and feedback)
Matching Table

Concept Description

RTP Protocol for real-time multimedia

RTCP Provides feedback for RTP sessions

QoS Ensures consistent multimedia performance

Jitter Buffer Manages delay variations in multimedia packets

Latency Key metric in multimedia performance


Chapter 24: Wireless and Mobile Networks
Exam-Style Questions
True/False Questions

1. Wi-Fi operates on both 2.4 GHz and 5 GHz frequency bands. (True)
2. Cellular networks use circuit-switching for all voice and data communication. (False)
3. Mobile IP allows devices to maintain connectivity while moving between networks. (True)
4. Bluetooth is primarily designed for high-speed, long-range data transmission. (False)
5. Handoff in cellular networks enables uninterrupted connectivity during movement. (True)

Multiple Choice Questions (MCQs)

1. Protocol for mobility management in IP networks:


○ a) ARP
○ b) DHCP
○ c) Mobile IP ✓
○ d) SNMP
2. Fastest Wi-Fi standard:
○ a) 802.11g
○ b) 802.11n
○ c) 802.11ac ✓
○ d) 802.11a
3. Primary function of a base station:
○ a) Encrypt data
○ b) Provide network coverage ✓
○ c) Manage IP addressing
○ d) Perform routing
4. Short-range wireless communication protocol:
○ a) LTE
○ b) Bluetooth ✓
○ c) TCP
○ d) OSPF
5. Maintaining IP address when moving across networks:
○ a) Mobile IP ✓
○ b) NAT
○ c) DNS
○ d) VPN

Fill-in-the-Gaps

1. Process of switching between cell towers: (Handoff)


2. WPA enhances security by using: (Encryption)
3. Connects mobile devices to core network: (Base station)
4. 802.11ac maximum bandwidth: (1 Gbps)
5. Mobile IP uses ____ to forward packets: (Tunneling)
Matching Table

Concept Description

Mobile IP Ensures seamless mobility across networks

Base Station Provides cellular coverage and connectivity

Wi-Fi Wireless LAN technology

Bluetooth Short-range wireless communication protocol

Handoff Switching between cellular towers seamlessly


Chapter 25: Data Center Networking
Exam-Style Questions
True/False Questions

1. Data center networks often use a hierarchical architecture. (True)


2. The spine-and-leaf topology is designed for scalability and low latency. (True)
3. SDN (Software-Defined Networking) separates the data and control planes. (True)
4. Virtual machines in data centers always share the same physical resources. (False)
5. Ethernet is the only protocol used in data center networks. (False)

Multiple Choice Questions (MCQs)

1. Spine-and-leaf architecture goal:


○ a) Energy efficiency
○ b) Minimized latency and scalability ✓
○ c) Cost reduction
○ d) Security enhancement
2. Technology for multiple virtual networks:
○ a) VLAN ✓
○ b) VPN
○ c) MPLS
○ d) QoS
3. SDN stands for:
○ a) Software-Defined Networking ✓
○ b) Scalable Data Networking
○ c) Service-Driven Network
○ d) Simple Data Network
4. SDN component for decision-making:
○ a) Data plane
○ b) Control plane ✓
○ c) Virtual machine
○ d) Hypervisor
5. Protocol for storage networking:
○ a) iSCSI ✓
○ b) HTTP
○ c) SMTP
○ d) FTP

Fill-in-the-Gaps

1. Spine-and-leaf is a ____ topology: (Non-blocking)


2. SDN separates control plane from ____ plane: (Data)
3. VLANs allow segmentation on same: (Physical infrastructure)
4. Data centers use ____ for interconnects: (Ethernet)
5. Virtualization enables multiple ____ on one machine: (Virtual machines)
Matching Table

Concept Description

Spine-and-Leaf Scalable, low-latency data center topology

SDN Separates data and control planes

VLAN Enables virtual networks on shared infrastructure

Ethernet Common protocol for data center connectivity

Virtual Machine Software-defined instance running on hardware


Chapter 26: The Internet of Things (IoT)
Exam-Style Questions
True/False Questions

1. IoT devices typically communicate using IPv4. (False)


2. MQTT is a lightweight protocol used in IoT applications. (True)
3. IoT networks often require strict power management. (True)
4. Zigbee and LoRaWAN are IoT-specific communication protocols. (True)
5. IoT applications generally prioritize high bandwidth over low latency. (False)

Multiple Choice Questions (MCQs)

1. MQTT stands for:


○ a) Message Queuing Telemetry Transport ✓
○ b) Multimedia Queue Transfer Technology
○ c) Managed Quality Transmission Technique
○ d) Machine Query Translation Technique
2. Low-power IoT network protocol:
○ a) Wi-Fi
○ b) Zigbee ✓
○ c) Ethernet
○ d) Fiber optic
3. Edge computing refers to:
○ a) Storing data in a central location
○ b) Processing data near the data source ✓
○ c) Encrypting IoT devices
○ d) Using cloud servers exclusively
4. Long-range, low-power communication protocol:
○ a) LoRaWAN ✓
○ b) Bluetooth
○ c) HTTP
○ d) UDP
5. IoT application:
○ a) Industrial automation ✓
○ b) Social media management
○ c) Web design
○ d) Data encryption algorithms

Fill-in-the-Gaps

1. Lightweight IoT communication protocol: (Zigbee)


2. Processes data close to devices: (Edge computing)
3. IoT devices use ____ for identifiers: (IPv6)
4. MQTT communication model: (Publish/subscribe)
5. Long-range, low-bandwidth protocol: (LoRaWAN)
Matching Table

Concept Description

IoT Network of interconnected devices

Zigbee Low-power communication protocol

MQTT Lightweight IoT messaging protocol

Edge Computing Processes data close to the data source

LoRaWAN Long-range, low-power communication protocol

” ‫“مسك الختام‬

🏆 you are Hero if you got here ...so know 🏆


"Knowledge is not just about remembering facts,

but understanding their connections.

Exams test your preparation,

but your character defines your success.

Stay calm, stay focused,

and remember:

You are more powerful than any question paper.

God bless you,

brave knowledge warrior!"

Anonymous Motivator for ‫األوغاد‬ 🌟

You might also like