CSCI392 Sample Final Exam
Department of Computer Science and Information Technology
Name ID
Course CSCI392 – Computer Networks Instructor
Date Time Duration
Pages 6 Calculators Not Allowed Documents Not Allowed
Question I:
Which of the following encrypts the data on a) DDoS
end-devices, which can be decrypted only if b) Ransomware
a payment is made? c) Virus
d) Worm
Which mitigation technique prevents ARP a) DAI
spoofing and ARP poisoning attacks? b) Firewalls
c) Port security
d) VPNs
An EtherChannel link using LACP was a) S1-passive and S2-passive
formed between two switches, S1 and S2. b) S1-on and S2-active
While verifying the configuration, which c) S1-on and S2-passive
mode combination could be utilized on both
d) S1-passive and S2-active
switches?
if more than one DHCP server is available acknowledgment, request, offer, discover
on the local network, in which order will request, discover, offer, acknowledgment
DHCP messages be sent between a host and discover, offer, request, acknowledgment
a DHCP server? request, acknowledgment, discover, offer
Consider the following command: a) exit interface
ip route 192.168.10.0 b) maximum number of hops to
255.255.255.0 10.10.10.2 5 the 192.168.10.0/24 network
What does the 5 at the end of the c) metric
command signify? d) administrative distance
Which command will allow a network a) Router# show running-config I
administrator to check the IP address section_dhcp
that is assigned to a particular MAC b) Router# show ip dhcp server
address? statistics
c) Router# show ip dhcp binding
d) Router# show ip dhcp pool
Page 1|5
CSCI392 Sample Final Exam
The address pool of a DHCP server is a) 57
configured with 192.168.184.0/26. The b) 44
network administrator reserves 18 IP c) 54
addresses for access points. How many d) 36
IP addresses are left in the pool to be e) 46
assigned to other hosts?
Refer to the exhibit. An EtherChannel was a) The interface port-channel
configured between switches S1 and S2, number has to be different on
but the interfaces do not form an each switch.
EtherChannel. What is the problem? b) The switch ports were not
configured with speed and duplex
mode.
c) The switch ports have to be
configured as access ports with
each port having a VLAN
assigned.
d) The EtherChannel was not
configured with the same allowed
range of VLANs on each
interface.
Question II: Port Security
1. Whats the advantage of using Port Security?
Prevent mac address overflow attack and DHCP starvtaion.
Page 2|5
CSCI392 Sample Final Exam
Prevent unauthorized access to access a switchport by limit the number of devices per
port.
2. Enable port security on Fa0/1 of Switch0
Int fa0/1
Switchport mode access
Switchport port-security
3. Set the maximum so that only two devices can connect to fa0/1.
Switchport port-security mac-address maximum 2
4. Secure the ports so that the MAC address of a device is dynamically learned
and added to the running configuration.
Switchport port-security mac-address sticky
5. Set the violation so that the Fast Ethernet ports 0/1 is disabled when a
violation occurs.
Switchport port-security violation shutdown
6. Whats the command used to check the violation counter on Fa0/1
Sh port-security int fa0/1
Question II: DHCP
Page 3|5
CSCI392 Sample Final Exam
1. Give the required configurations that allow Router1 to automatically assign IP to
the hosts of Network 10.
Ip dhcp pool Net10
Network 10.0.0.0 255.0.0.0
Default-router 10.0.0.255
Dns-server 50.0.0.0
2. Is there is a need to configure a relay agent in the question above?
NO
Question 3: Routing
Page 4|5
CSCI392 Sample Final Exam
1. How many networks do you have in the above topology?
2. Configure the static routes entries on Router-0 in order to have full network
convergence. DO NOT minimize the number of route entries.
Ip route 10.0.0.0 255.0.0.0 192.168.1.1
Ip route 20.0.0.0 255.0.0.0 192.168.1.1
Ip route 30.0.0.0 255.0.0.0 192.168.1.5
Ip route 40.0.0.0 255.0.0.0 192.168.1.5
Page 5|5