Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CS6250 COMPUTER NETWORKS – EXAM 1 COMPREHENSIVE PRACTICE EXAM (UPDATED 2026)

Beoordeling
-
Verkocht
-
Pagina's
21
Cijfer
A+
Geüpload op
26-03-2026
Geschreven in
2025/2026

CS6250 COMPUTER NETWORKS – EXAM 1 COMPREHENSIVE PRACTICE EXAM (UPDATED 2026)

Instelling
CS6250 COMPUTER NETWORKS – 1 COMPREHENSIVE
Vak
CS6250 COMPUTER NETWORKS – 1 COMPREHENSIVE

Voorbeeld van de inhoud

CS6250 COMPUTER NETWORKS – EXAM 1
COMPREHENSIVE PRACTICE EXAM (UPDATED
2026)




Section 1: Layered Architecture & The Internet Model (Q1-15)



Q1. What are the primary advantages of using a layered architecture in computer networks?
A. It eliminates all forms of network latency.
B. It allows for scalability, flexibility, and independent development of different layers.
C. It guarantees security for all network communications.
D. It simplifies hardware design by combining all protocols into a single module.

Answer: B
Rationale: Layering allows each layer to provide a specific service, making the system more scalable and
flexible. Changes to one layer do not affect others, promoting independent development and cost-
effective implementations .

Q2. What is the main difference between the 7-layer OSI model and the 5-layer Internet model?
A. The OSI model has a separate Network layer, while the Internet model does not.
B. The Internet model combines the Application, Presentation, and Session layers of the OSI model into
a single Application layer.
C. The OSI model does not have a Physical layer.
D. The Internet model has an additional "Internetwork" layer not present in OSI.

Answer: B
Rationale: The five-layer Internet model consolidates the top three layers of the OSI model (Application,
Presentation, Session) into one Application layer, simplifying the stack .

Q3. In the five-layer Internet model, which layer is responsible for moving frames from one node to
the next on the same network?

,A. Physical Layer
B. Network Layer
C. Transport Layer
D. Data Link Layer

Answer: D
Rationale: The Data Link layer handles the transfer of data frames across a single link (e.g., Ethernet, Wi-
Fi) from one node to the next .

Q4. Which of the following is a potential disadvantage of a strictly layered architecture?
A. Lack of scalability.
B. High cost of implementation due to complex hardware.
C. Overhead caused by abstraction barriers between layers.
D. Inability to support multiple protocols.

Answer: C
Rationale: The abstraction barriers between layers can add overhead in both computation and message
headers (e.g., headers added at each layer), which is a noted disadvantage of layered models .

Q5. Provide examples of protocols at the Application, Transport, and Network layers of the Internet
model.
Answer:
 Application Layer: HTTP, DNS, SMTP, FTP .

 Transport Layer: TCP, UDP .

 Network Layer: IP (IPv4, IPv6), ARP, ICMP .

Q6. What is the primary function of the Presentation layer in the OSI model?
A. Managing different transport streams for a session (e.g., audio and video).
B. Formatting or translating data (e.g., encryption, compression).
C. Providing end-to-end communication and reliability.
D. Routing packets across multiple networks.

Answer: B
Rationale: The Presentation layer acts as a translator, handling data formatting, encryption, and
compression to present data properly to the Application layer .

Q7. What is encapsulation?
Answer: Encapsulation is the process where data is passed down the protocol stack, and each layer
adds its own header (and sometimes trailer) information. This header contains control information for
the corresponding layer on the receiving end .

, Q8. A network socket serves as:
A. The physical hardware that connects a computer to the network.
B. The software interface between the Application layer and the Transport layer.
C. The routing table used by the Network layer.
D. The protocol used for web browsing.

Answer: B
Rationale: A socket is the software endpoint for communication, providing the interface between an
application process and the transport layer protocols (TCP/UDP) .

Q9. True or False: Repeaters and Hubs operate at the Network Layer (Layer 3).
Answer: False
Rationale: Repeaters and hubs operate at the Physical Layer (Layer 1), simply regenerating and
broadcasting signals .

Q10. Which of the following devices operates at the Data Link Layer?
A. Router
B. Repeater
C. Bridge
D. Firewall (stateless)

Answer: C
Rationale: Bridges operate at the Data Link Layer (Layer 2), using MAC addresses to filter and forward
traffic between network segments .

Q11. True or False: The End-to-End (e2e) principle suggests that network core functions should be
complex and intelligent, while the end systems should be simple.
Answer: False
Rationale: The End-to-End principle states the opposite: the network core should be simple and
minimal, while intelligence and complex functions (like error recovery) should be implemented at the
end hosts .

Q12. Which of the following is cited as a violation of the End-to-End principle?
A. The use of HTTP for web browsing.
B. The use of TCP for reliable transmission.
C. The use of Network Address Translation (NAT) boxes.
D. The use of IP addresses for routing.

Answer: C
Rationale: NAT boxes violate the principle because they act as intermediate devices that modify packet
headers and maintain state, breaking the end-to-end transparency of the network .

Geschreven voor

Instelling
CS6250 COMPUTER NETWORKS – 1 COMPREHENSIVE
Vak
CS6250 COMPUTER NETWORKS – 1 COMPREHENSIVE

Documentinformatie

Geüpload op
26 maart 2026
Aantal pagina's
21
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$24.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Nursewilliams29 Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
67
Lid sinds
2 jaar
Aantal volgers
36
Documenten
1760
Laatst verkocht
1 maand geleden

5.0

769 beoordelingen

5
753
4
7
3
7
2
0
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen