0% found this document useful (0 votes)
190 views

Key To Correction: PART I. Multiple Choice Questions: Encircle Your Chosen Answers

1. This document contains a preliminary examination for an electronics course on data communications. It consists of 14 multiple choice questions testing knowledge of topics like DHCP, Ethernet, TCP/IP, switches, and wireless networking protocols. 2. The questions cover a wide range of networking concepts from different layers of the OSI model, including data link protocols like Ethernet, network protocols like IP addressing, and transport protocols like TCP. 3. The answer explanations provide additional details to help understand the concepts being tested and remember them for the exam. An online reference is also sometimes included to help with learning.

Uploaded by

NJ Degoma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
190 views

Key To Correction: PART I. Multiple Choice Questions: Encircle Your Chosen Answers

1. This document contains a preliminary examination for an electronics course on data communications. It consists of 14 multiple choice questions testing knowledge of topics like DHCP, Ethernet, TCP/IP, switches, and wireless networking protocols. 2. The questions cover a wide range of networking concepts from different layers of the OSI model, including data link protocols like Ethernet, network protocols like IP addressing, and transport protocols like TCP. 3. The answer explanations provide additional details to help understand the concepts being tested and remember them for the exam. An online reference is also sometimes included to help with learning.

Uploaded by

NJ Degoma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

KEY TO CORRECTION

PRELIMINARY EXAMINATION
ELE 17: DATA COMMUNICATIONS

PART I. Multiple Choice Questions: Encircle your a. Every device stops transmitting for a short
chosen answers. time.
b. A jam signal is sent to notify devices of a
1. What information can DHCP provide to clients?
collision.
(Choose three.)
c. A collision signal is sent to notify devices of a
a. Destination Network
collision.
b. IP Address
d. A random back-off algorithm starts.
c. Gateway Address
e. Every device listens then sends packet
d. DNS
immediately.
e. ARP

Explanation: Back-off algorithm is the one


Explanation: Remember that when you
used to resynchronize the retransmission of data
manually configure IP parameters, these are the
of those involved in the collision. Kindly recall
required boxes you need to fill. So these are the
the discussed flowchart.
same parameters DHCP provide to clients.

https://www.geeksforgeeks.org/back-off-
algorithm-csmacd/

4. What is the OUI of the MAC Address


01:AB:4D:F2:89:10?
a. 01
b. F2:89:10
c. 01:AB
d. 01:AB:4D
e. 4D:F2:89

Explanation: 1st three bytes – OUI ; 2nd three


bytes – Vendor assigned ID

5. Which address or combination of addresses does


a Layer 3 switch use to make forwarding
decisions?
2. Which of the following protocols are used by a. IP address only
email? (Choose two.) b. port address only
a. POP3 c. MAC address only
b. SMTP d. MAC and port addresses
c. SNMP e. MAC and IP addresses
d. FTP
e. RDP Explanation: Remember that a switch initially
uses MAC address (Layer 2) to identify
Explanation: connected devices. And when in Layer 3
POP3 – Post Office Protocol version 3. A (Network Layer), it uses IP address to locate
protocol for receiving email by downloading it to connected devices across the network. So a Layer
your computer from a mailbox on the server of an 3 switch uses both physical and logical
Internet service provider. addressing scheme to make forwarding decisions.

SMTP – Simple Mail Transfer Protocol. SMTP is 6. Which protocol is responsible for controlling the
an application layer protocol. The client who size and rate of the HTTP messages exchanged
wants to send the mail opens a TCP connection to between server and client?
the SMTP server and then sends the mail across a. HTTP
the connection. b. ARP
c. TCP
3. What takes place when a collision occurs on an d. DHCP
ethernet network? (Choose three.) e. UDP
KEY TO CORRECTION

Explanation: TCP divides the HTTP messages d. Router(config-if)#


into smaller pieces, called segments, to be sent to e. Router#
the destination client.
Explanation: Encrypted enabled password and
https://www.cs.dartmouth.edu/~campbell/cs60 local login are configured in the Global
/send_this_text.txt Configuration mode – Router(config)#

7. When troubleshooting Ethernet connectivity 11. Which of the following commands you can use to
issues, how can you verify that an IP address is determine the IP address configuration of an
known to a switch? existing port interface? (Choose two.)
a. Check whether the IP address is in routing a. show run
table. b. show ip route
b. Check whether an access-list is blocking the c. ping ip
IP address. d. show ip int br
c. Check whether the IP address is in the MAC e. telnet ip
table.
d. Check whether the IP address is in the ARP Explanation:
table. show run – displays the current running-
e. Check whether the IP address is in the configuration of your cisco device which includes
running-configuration all interfaces’ IP settings.

Explanation: You can verify if an IP address is show ip int br – displays the summarized
known to a switch by checking the ARP table of information of interfaces and their corresponding
the device. In most cisco devices, you can use the IP settings.
command “show arp” to list down all known
devices’ IP and MAC addresses. 12. Which IEEE mechanism is responsible for the
authentication of devices when they attempt to
8. What TCP/IP protocol provides terminal connect to a local network?
emulation to a remote host? a. 802.11
a. HTTP b. 802.3x
b. VPN c. 802.1x
c. Telnet d. 802.2x
d. SNMP e. 802.16
e. FTP
Explanation: The IEEE 802.1X standard defines
Explanation: Telnet is a part of the TCP/IP how to provide authentication for devices trying
protocol suite and is a virtual terminal protocol to connect with other devices on LANs or
that allows you to make connections to remote wireless LANs.
devices, gather information, and run programs.
Telnet uses port 23 to establish connection. https://www.networkworld.com/article/221649
9/wireless-what-is-802-1x.html
9. Which PDU format is used when bits are received
from the network medium by the NIC of a host? 13. Which three elements are field in a basic Ethernet
a. file data frame? (Choose three.)
b. frame a. Preamble
c. packet b. Frame Check Sequence
d. segment c. Time to Live
e. data d. Version
e. Type
Explanation: Network Medium (Layer 1) – bits.
NIC (Layer 2) – frames. Explanation: Kindly recall our past lecture
about fundamental frame format.
10. On which command line mode you can add an
encrypted enable password and a local login? 14. What protocol is assigned to port numbers 20 and
a. Router> 21?
b. Router(config)# a. DNS
c. Router(config-line)# b. Telnet
KEY TO CORRECTION

c. FTP b. Ensure that cables A and B are straight-


d. SMTP through cables.
e. SSH c. Ensure cable A is plugged into a trunk port.
d. Ensure the switch has power.
Explanation: Ports 20 and 21 are assigned for e. Reseat all cables.
FTP. The FTP protocol uses a pair of connections
between the FTP client and FTP server. The Explanation: The scenario just requires physical
connection with the FTP server's port 20 is the layer troubleshooting steps to ensure
second connection created during an FTP session, connectivity of the switch ports.
the first one being to the server's port 21.

17. Which of the following statements describe the


https://learningnetwork.cisco.com/s/question/
network shown in the exhibit? (Choose two.)
0D53i00000Ksx4LCAR/why-does-ftp-have-2-
port-numbers

15. Which of the following standards is used for


wireless technology? (Choose three.)
a. 802.11n
b. 802.11ae
c. 802.11d
d. 802.11ac
e. 802.11b
a. There are four broadcast domains.
b. There are two broadcast domains.
c. There are ten collision domains.
d. There are six collision domains.
e. There are seven collision domains

Explanation:

- For a Router, every port is a BROADCAST


DOMAIN.
https://www.intel.com/content/www/us/en/su - For a Switch, every port is a COLLISION
pport/articles/000005725/network-and-i- DOMAIN.
o/wireless-networking.html - And a hub (Layer 1 device) is a one BIG
COLLISION DOMAIN.

16. Refer to the exhibit below. The two connected 18. What are three characteristics of the TCP
ports on the switch are not turning orange or protocol? (Choose three.)
green. What would be the most effective steps to a. It uses a single SYN-ACK message to
troubleshoot this physical layer problem? establish a connection.
(Choose three.) b. The connection is established before data is
transmitted.
c. It ensures that all data is transmitted and
received by the remote device.
Gi 0/1 d. It supports significantly higher transmission
speeds than UDP.
Gi 0/1
e. It requires applications to determine when
data packets must be retransmitted.

Fa 0/1 Explanation: TCP is a connection-oriented


protocol. It uses 3-way handshake to ensure that
before continuous and simultaneous transmission
happens, connections between communicating
devices are well established.

a. Ensure that the Ethernet encapsulations match 19. Which two statements about Ethernet standards
on the interconnected router and switch ports. are true? (Choose two)
KEY TO CORRECTION

a. Ethernet is defined by ITU-T standard 802.3 a. #interface FastEthernet 0/1


b. Ethernet is defined by IEEE standard 802.2 #ip address 192.168.8.252 255.255.255.0
#no shutdown
c. Ethernet is defined by IEEE standard 802.3
d. When an Ethernet network uses CSMA/CD, it b. #interface vlan 1
terminates transmission as soon as collision #ip address 192.168.8.252 255.255.255.0
occurs. #shutdown
e. When an Ethernet network uses CSMA/CA, it
terminates transmission as soon as collision c. #interface GigabitEthernet 0/1
occurs. #ip address 192.168.8.252 255.255.255.0
#no shutdown
Explanation: As previously discussed in class,
d. #ip default-network 192.168.8.254
Ethernet technology is defined by IEEE standard #interface vlan 1
802.3 and uses CSMA/CD to detect collision on #ip address 192.168.8.252 255.255.255.0
connected networks. #no shutdown

20. Refer to the exhibit. A technician has installed e. #interface vlan 1


Switch B and needs to configure it for remote #ip address 192.168.8.252 255.255.255.0
#no shutdown
access from the management workstation
connected Switch A. Which set of commands is
required to accomplish this task? Explanation: We usually configure the IP
parameter for remote management of a switch
via its VLAN interface.

Part II. Drag and Drop


Question 1: Match the items on the left with appropriate OSI layer on the right.

Ports NETWORK LAYER


Bits Packets
Packets IP Address
UDP Routing
IP Address
MAC Address TRANSPORT LAYER
Routing Ports
Switching UDP
Segments Segments

Question 2: Match the items on the left with appropriate protocol on the right.

Sends transmission in sequence. TCP


Connectionless Sends transmission in sequence.
Routing 3way handshake
3way handshake Connection-oriented
Segmentation
Real-time transmission UDP
KEY TO CORRECTION
Best effort protocol Connectionless
Connection-oriented Real-time transmission
Port detection Best effort protocol

Question 3: A user is unable to connect to the Internet. Based on the layered approach to troubleshooting and beginning
with the lowest layer. Follow the guide and arrange the steps.

Verify IP Configuration Step 1 Verify Ethernet Cable Connection


Verify URL Step 2 Verify NIC operation
Verify NIC operation Step 3 Verify IP Configuration
Verify Ethernet Cable Connection Step 4 Verify URL

Part III. Identification

Protocol/application which uses port number 156 SQL Service


Disables DNS services on a cisco device no ip domain-lookup
Local database of address mappings that improves name-
cache
resolution performance
Service that maps hostnames to IP addresses DNS
Component of a URL that indicates the location or
domain
organization type.
IEEE Standard used for Logical Link Control IEEE 802.2
Port number for SNMP protocol 161
Refers to a standard established by an existing law de jure
Resolves IP address to MAC Address ARP
Directory used for best path forwarding decision. Routing Table
Port number for POP3 protocol 110

Part IV. Illustrative: Refer to the following exhibits and provide the needed information.

Exhibit 1

Supposed computer A wanted to send an email through SMTP protocol to computer B, complete the data frame format if
the packet is already travelling from R2 to R4.

PC-A PC-B
KEY TO CORRECTION
Router Interface IP Address Subnet Mask MAC Address
Gi0/1 116.93.0.1 255.255.255.252
R1 00:89:AA:F2:36:0A
Gi0/2 172.16.31.1 255.255.255.0
Gi0/1 116.93.0.2 255.255.255.252
R2 Gi0/2 116.93.1.1 255.255.255.252 00:89:BB:F2:36:0A
Tunnel0 12.12.12.1 255.255.255.0
Gi0/1 116.93.1.2 255.255.255.252
R3 Gi0/2 172.16.32.1 255.255.255.0 00:89:CC:F2:36:0A
Gi0/3 116.93.2.1 255.255.255.252
Gi0/1 116.93.3.1 255.255.255.252
Gi0/2 116.93.2.2 255.255.255.252
R4 00:89:DD:F2:36:0A
Gi0/3 172.16.33.1 255.255.255.0
Tunnel0 12.12.12.2 255.255.255.0
R5 Gi0/1 116.93.3.2 255.255.255.252 00:89:EE:F2:36:0A

Basic Ethernet Frame Encapsulation:

Source Destination Source IP Destination IP Source MAC Destination MAC


Port Port Address Address Address Address
FCS 25 25 172.16.31.32 172.16.33.54 00:89:BB:F2:36:0A 00:89:DD:F2:36:0A

EMAIL MESSAGE

Exhibit 2

Router Name Godzilla


IOS version 12.2
Device Uptime 1 hour 41 minutes
Router Model C3560
Flash Memory Capacity 512KB
Ethernet MAC Address 00:11:BB:0B:36:00
KEY TO CORRECTION
Exhibit 3

10.0.1.0/24 113.45.62.0/30
INTERNET

Router#show run speed auto


Building configuration... !
interface GigabitEthernet0/1
Current configuration : 958 bytes description Port_to_Internet
! ip address 113.45.62.1 255.255.255.252
version 15.1 duplex full
no service timestamps log datetime msec speed auto
no service timestamps debug datetime msec !
service password-encryption interface Vlan1
! no ip address
hostname Router shutdown
! !
! ip classless
enable secret 5 $1$mERr$9cTjUIEqNGurQiFU.ZeCi1 !
! ip flow-export version 9
! !
ip cef line con 0
no ipv6 cef password 7 0822455D0A16
! logging synchronous
! exec-timeout 10 30
license udi pid CISCO2911/K9 sn FTX1524403T- !
! line aux 0
! !
spanning-tree mode pvst line vty 0 4
! password 7 0822455D0A16
! logging synchronous
interface GigabitEthernet0/0 exec-timeout 5 30
description Port_to_Switch !
duplex full !
end

1. On which interface should the gateway of the


interface GigabitEthernet0/0
computers be configured?
2. Complete line syntax in configuring the IP
address to the interface.
#ip address 10.0.1.1 255.255.255.0
IP Address: 10.0.1.1
Subnet Mask: 255.255.255.0
3. Line console password 0822455D0A16
4. What is the missing command why the line
login
console and vty passwords do not take effect?
5. What is the missing command used to prevent
the router from checking every command into no ip domain-lookup
its DNS or directory?
KEY TO CORRECTION

Part V. Draw the flowchart for the CSMA/CD operation and explain in one paragraph. (20pts)

In the early version of Ethernet Technology, devices use half duplex mode of transmission – meaning that devices
cannot send or receive information at the same time. Because when two or more devices send and receive information at
the same time, it will cause collision. To further ensure that devices will not collide with their transmissions, Ethernet
technology uses CSMA/CD or Carrier Sense Multiple Access/Collision Detection. CSMA/CD works by ensuring every
connected devices must listen first with the network medium. A device will “sense” if there’s an ongoing traffic on the
medium – if there is, device will continue to listen and if there’s none, device will continue to transmit. There will be a
point that when two or more connected devices sensed that there is no ongoing traffic, they will transmit at the same time
and collision will occur. Once collision is detected, it will automatically terminate the connections, will send jam signal to
notify all devices about the collision happened and will wait for a specific interval of time before retransmitting the pending
information. At this moment, the back-off algorithm will run to make sure every devices will be given a specific interval of
time to retransmit their information. If there’s no collision happened upon transmission or retransmission, the process will
be completed.

NOTE: Apologies, as I was not able to retrieve my reference website for this topic. I also gave partial points for the
diagram and explanation.

Terminates connections,
LISTEN sends jam signal and
wait.

YES

Is there an Is there a
ongoing TRANSMIT collision?
YES traffic? NO

NO

TRANSMISSION
COMPLETE
KEY TO CORRECTION

You might also like