Professional Documents
Culture Documents
Answer:: Question Text
Answer:: Question Text
6
Answer:
Question 2
Question text
What is the subnet mask of 193.61.255.213/24
255.255.255.0
Answer:
Question 3
Question text
Change the following IP address from binary notation to dotted-decimal notation:
01101111 01000001 11111000 10000100
111.65.248.132
Answer:
Question 4
Question text
Change the following IP address from dotted-decimal notation to binary notation:
203.244.128.176
11001011.11110100.10000000.10110000
Answer:
Question 5
Question text
Which of the following commands on Windows is used to test reachability of a
remote host and show (the part of) the list of intermediary hops?
Select one:
a. nmap
b. nslookup
c. ping
d. tracert
Question 6
Question text
The physical map of a computer network is known as...
Select one:
a. Protocol
b. Backbone
c. Topology
d. Segment
Question 7
Question text
The correct order of layers in OSI model is…
Select one:
a. Physical layer, Data Link layer, Network layer, Presentation layer, Application layer,
Session Layer, Transport layer
b. Physical layer, Data Link layer, Network layer, Transport layer, Session layer,
Question 8
Question text
Which of the following device is mainly designed to work at Data link layer?
Select one:
a. Switch
b. Hub
c. Bridge
d. Router
Question 9
Question text
Which of the following tools displays network connections (both incoming and
outgoing), routing tables, and a number of network interface statistics.
Select one:
a. tracert
b. netstat
c. nmap
d. ping
Question 10
Question text
A central computer surrounded by one or more satellite computers is called a...
Select one:
a. star network
b. bus network
c. point-to-point network
d. ring network
Question 11
Question text
Which of the following commands on Linux is used to test reachability of a remote
host and show (the part of) the list of intermediary hops?
Select one:
a. ping
b. tracert
c. nmap
d. traceroute
Question 12
Question text
Which of the following systems provides circuit switching service?
Select one:
a. postal system
b. telephone system
Question 13
Question text
Which of the following devices is more secure in term of network sniffing?
Select one:
a. Hub
b. Switch
Question 14
Question text
Which of the following commands is used to test reachability of a remote host?
Select one:
a. ping
b. nslookup
c. nmap
d. tracert
Question 15
Question text
What is the automated service that matches resource names with the required IP
address?
Select one:
a. HTTP
b. Telnet
c. SSH
d. DNS
Question 16
Question text
What is the first byte range of a class A network address?
Select one:
a. 191 --> 224
b. 192 --> 223
c. 0 --> 127
d. 1 --> 127
Information
Information text
Notes:
- Your .pkt file need to be submitted in the submission box.
- Your file name should correspond to your name; your ID (Ex: if your name is Nguyen
Van An and your ID is 1801040254, your file name will be
NguyenVanAn1801040254.pkt).
- Late submission is not allowed.