تواصل معنا

كورس جافا سوينج
كورس أختبار البرمجيات
الان ومجانا لمدة شهر اللهم ارفع عنا البلاء والوباء
كورس لغة الدارت والفلتر
عن المدونة
Mohon Aktifkan Javascript!Enable JavaScript

الجمعة، 12 يوليو 2019

Computer Networks Questions & Answers – Analyzing Subnet Masks MCQ أسئله شبكات بالأجابات الجزء التاسع و الاربعون


Computer Networks Questions & Answers – Analyzing Subnet Masks


1. Which of the following is the broadcast address for a Class B network ID using the default subnetmask?
a) 172.16.10.255
b) 255.255.255.255
c) 172.16.255.255
d) 172.255.255.255
Answer: c
Explanation: This address is used for broadcast the class B network purpose

2. You have an IP address of 172.16.13.5 with a 255.255.255.128 subnet mask. What is your class of address, subnet address, and broadcast address?
a) Class A, Subnet 172.16.13.0, Broadcast address 172.16.13.127
b) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.127
c) Class B, Subnet 172.16.13.0, Broadcast address 172.16.13.255
d) Class B, Subnet 172.16.0.0, Broadcast address 172.16.255.255
Answer: b
Explanation: Class B is the address of IP code 172.16.13.5

3. If you wanted to have 12 subnets with a Class C network ID, which subnet mask would you use?
a) 255.255.255.252
b) 255.255.255.255
c) 255.255.255.240
d) 255.255.255.248
Answer: c
Explanation: If you have eight networks and each requires 10 hosts, you would use the Class C mask of 255.255.255.240. 
Why? Because 240 in binary is 11110000, which means you have four subnet bits and four host bits. Using our math, we’d get the following:
24-2=14 subnets
24-2=14 hosts.

4. The combination of _________ and __________ is often termed the local address of the local portion of the IP address.
a) Network number and host number
b) Network number and subnet number
c) Subnet number and host number
d) Host number
Answer: c
Explanation: Sub networking is implemented for remote sensing in transparent way from that a host contains the sub network which called local operation.

5. _________ implies that all subnets obtained from the same subnet mask.
a) Static subnetting
b) Dynamic subnetting
c) Variable length subnetting
d) Both Dynamic subnetting and Variable length subnetting
Answer: a
Explanation: Static sub network.

6. State whether true or false.
i) A connection oriented protocol can only use unicast addresses.
ii) The any cast service is included in IPV6.
a) True, True
b) True, False
c) False, True
d) False, False
Answer: a
Explanation: A connection oriented protocol can only use unicast addresses.
The any cast service is included in IPV6.

7. __________ is a high performance fiber optic token ring LAN running at 100 Mbps over distances upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
Answer: a
Explanation: FIBER DISTRIBUTED DATA INTERFACE

8. Which of the following are Gigabit Ethernets?
a) 1000 BASE-SX
b) 1000 BASE-LX
c) 1000 BASE-CX
d) all of the above
Answer: d
Explanation: In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard. It came into use beginning in 1999, gradually supplanting Fast Ethernet in wired local networks, as a result of being considerably faster.

9. _________ is a collective term for a number of Ethernet Standards that carry traffic at the nominal rate of 1000 Mbit/s against the original Ethernet speed of 10 Mbit/s.
a) Ethernet
b) Fast Ethernet
c) Gigabit Ethernet
d) All of the mentioned
Answer: b
Explanation: Fast Ethernet

10. _________ is another kind of fiber optic network with an active star for switching.
a) S/NET
b) SW/NET
c) NET/SW
d) FS/NET
Answer: a
Explanation: A 50-MBd active star fiber optical Local area network (LAN) and its optical combiner and mixing rod splitter are presented. The limited power budget and relatively large tapping losses of light wave technology, which limit the use of fiber optics in tapped bus LAN topologies, are examined and proven tolerable in optical star topologies.
 

تابع أسئلة الشبكات

ليست هناك تعليقات:

إرسال تعليق