FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
-
Upload
cenyum-cokmo -
Category
Education
-
view
374 -
download
1
Transcript of FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
EXAMINATION AND EVALUATION DIVISION
DEPARTMENT OF POLYTECHNIC EDUCATION
(MINISTRY OF HIGHER EDUCATION)
INFORMATION & COMMUNICATION TECHNOLOGY (ICT)
DEPARTMENT
FINAL EXAMINATION
JUNE 2012 SESSION
FP303: COMPUTER NETWORK
DATE: 19 NOV 2012 (MONDAY)
DURATION: 2 HOURS (2.30 PM - 4.30 PM)
This paper consists of FIFTEEN (15) pages including the front page.
Section A: Objective (40 questions – answer ALL)
Section B: Structure (2 questions – answer ALL).
CONFIDENTIAL
DO NOT OPEN THIS QUESTION PAPER UNTIL INSTRUCTED BY THE
CHIEF INVIGILATOR
(The CLO stated is for reference only)
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 2 of 15
SECTION A
OBJECTIVE (50 marks)
Instructions: This section consists of FORTY (40) objective questions. Answer ALL the
questions in the answer booklet.
1. Which of the following terms describes a network of computers and other devices that
are confined to a relatively small space, such as a building or even an office?
[CLO 1]
A. Personal Area Network
B. Local Area Network
C. Metropolitan Area Network
D. Wide Area Network
2. Which agency created standards for network interfaces and public networks (X series)
and for telephone communications (V series)?
[CLO 1]
A. EIA
B. ISO
C. ANSI
D. ITU-T
3. Which topology is relevant with the statement above? [CLO 1]
A. Bus topology
B. Star topology
C. Ring topology
D. Point-to-Point topology
The expansion of this network structure is easy as long as there is a free port on the
hub, only a cable is needed to connect other computers
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 3 of 15
Each station can both transmit and receive, but not at the same time. When one
device is sending, the other can only receive and vice versa.
4. Based on the statement above, what type of transmission mode is it referring to?
[CLO 1]
A. Simplex
B. Half-duplex
C. Full-duplex
D. Automatic
5. _______________is a set of techniques that enable more than one device to combine
and send their signals simultaneously through a single data link at the same time.
[CLO 1]
A. Multiplexing
B. Point-to-Point transmission
C. Broadcast transmission
D. Bandwidth
Figure 1: Network Diagram 1
6. Refer to the Figure 1, what type of device is used to connect two networks?
[CLO 1]
A. Hub
B. Switch
C. Router
D. Access point
7. ___________is a process where multiple analog or digital message signals are
combined into one signal over a shared medium.
[CLO 1]
A. Modulating
B. Multiplexing
C. Broadcasting
D. Full-Duplex transmission
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 4 of 15
8. Which of the following is a benefit of VLANs?
[CLO 1]
A. They increase the size of collision domains.
B. They allow logical grouping of users by function.
C. They increase the size of broadcast domains while decreasing the number
of collision domains.
D. They simplify switch administration.
9. Determine an advantage of the use of layers in the OSI reference model. [CLO 1]
A. It increases complexity.
B. It breaks network communications into larger parts.
C. It prevents changes in one layer from affecting other layers.
D. It requires the use of single-vendor equipment for hardware and
software communications.
10. Which of the following is the correct order of the layers of the OSI reference model,
starting at the lowest to the higher layer of the model? [CLO 1]
A. data Link, Physical, Transport, Network, Presentation, Session, application
B. data link, network, physical, session, transport, presentation, application
C. physical, data link, network, transport, presentation, session, application
D. physical, data link, network, transport, session, presentation, application
11. Which OSI layer is responsible for formatting data based on a standard syntax and
character set conversion?
[CLO 1]
A. Transport
B. Network
C. Presentation
D. Session
12. Determine the main function of the transport layer. [CLO 1]
A. Node-to-node delivery
B. End-to-end message delivery
C. Synchronization
D. Updating and maintenance of routing tables
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 5 of 15
13. Identify application layer protocol used to support file transfers between a client and a
server. [CLO 2]
A. HTML
B. HTTP
C. FTP
D. Telnet
14. Based on the statement above, which of the following network address belong to this
host? [CLO 2]
A. 176.33.0.0
B. 176.33.33.0
C. 176.33.68.0
D. 176.33.65.30
15. Which default subnet mask provides the most host bits? [CLO 2]
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
16. Which of the following addresses is an example of a broadcast address on the network
123.10.0.0 with a subnet mask of 255.255.0.0? [CLO 2]
A. 123.255.255.255
B. 123.10.255.255
C. 123.13.0.0
D. 123.1.1.1
IP address: 176.33.68.16
Subnet mask: 255.255.0.0
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 6 of 15
17. Which statement describes a straight-through cable? [CLO 1]
i. It maps a wire to the same pins on both ends of the cable
ii. Two devices directly connected and using different pins to transmit and receive
iii. Two devices directly connected and using same pins to transmit and receive
iv. T568A on one end of the cable and T568B on the other end of the same cable
A. i and ii
B. i and iii
C. ii and iii
D. ii and iv
18. Based on the statement above, identify the type of connection cable. [CLO 1]
A. Cross-over
B. Cross-line
C. Straight-through
D. Roll Over
19. Based on the statement given above, which of the following type of media meet the
requirements? [CLO 1]
A. STP
B. UTP
C. Single-Mode Fiber
D. Multimode Fiber
Router port to router port
Switch port to switch port
Switch port to hub port
Hub port to hub port
A network administrator is required to use media in the network that can run
up to 100 meters in cable length without using repeaters. The chosen media
must be inexpensive and easily installed. The installation will be in a pre-
existing building with limited cabling space.
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 7 of 15
It is often used to connect a TV set to the signal source, be it a cable TV outlet,
satellite TV, or conventional antenna.
20. Which of the following types of channels moves data relatively slow?
[CLO 1]
A. Wideband channel
B. Voiceband channel
C. Narrowband channel
D. Broadband channel
21. Identify the function of Ping and Tracert commands. [CLO 1]
A. Tracert shows each hop, while ping show a destination reply only
B. Ping shows whether the transmission is unsuccessful; tracert does not
C. Both ping and tracert can show results in a graphical display
D. Tracert uses IP addresses; ping does not
22. Which of the following describes each router through which a packet travels when
moving between source and destination networks?
[CLO 1]
A. NOC
B. ISP
C. Segment
D. Hop
23. Which elements are required to successfully connect to the Internet? [CLO 1]
A. File sharing enabled
B. A network connection
C. Server services enabled
D. An address obtained directly from the RIR
24. Based on the statement above, which type of media would be the BEST to meet these
requirements? [CLO 1]
A. STP
B. UTP
C. Coaxial
D. Fiber
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 8 of 15
25. Identify the purpose of nslookup. [CLO 1]
A. Display network connection
B. Display route taken to destination
C. Displays IP configuration information
D. Directly queries the name server for information on a destination
domain
26. The inner core of an optical fiber is ________________in composition. [CLO 1]
A. glass or plastic
B. copper
C. bimetallic
D. liquid
27. Determine the major factor that makes coaxial cable less susceptible to noise than
twisted pair cable. [CLO 1]
A. Inner conductor
B. Diameter of cable
C. Outer conductor
D. Insulating material
28. Determine the factor of IEEE 802.11 wireless technology which is able to transmit
further distances than Bluetooth technology.
[CLO 2]
A. Has higher power output
B. Uses better encryption methods
C. Transmits at much lower frequencies
D. Transmits at much higher frequencies
29. Which of the following describes the importance of security in wireless networks?
[CLO 2]
A. Wireless networks are typically slower than wired networks.
B. Televisions and other devices can interfere with wireless signals.
C. Environment factors such as thunderstorm can affect wireless networks.
D. Wireless networks broadcast data over a medium that allows easy
access.
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 9 of 15
30. Classify the access-point feature which allows a network administrator to define what
type of data can enter the wireless network. [CLO 3]
A. Traffic filtering
B. Hacking block
C. Authentication
D. Encryption
31. Match the function of WEP and EAP in wireless network.
[CLO 2]
A. Encrypt and authenticate users on
B. Filter traffic and select the operating frequency for
C. Identify the wireless network and compress data on
D. Create the smallest wireless network and limit the number of users on
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 10 of 15
Figure 2: Linksys Interface
32. Refer to Figure 2. In the Wireless menu of a Linksys integrated router, which of the
following configuration options allow the presence of the access point to be known to
nearby clients? [CLO 2]
A. Network Mode
B. Network Name (SSID)
C. Standard Channel
D. SSID Broadcast
33. Which method of attack is used to try to guess passwords or to decipher an encryption
code? [CLO 2]
A. Phishing
B. Brute force
C. Data manipulation
D. Distributed denial of service
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 11 of 15
34. Identify the method of phishing attack. [CLO 2]
A. by e-mail
B. by telephone
C. by VOIP
D. through a person they know in common
35. The statement above refers to _________________________________ [CLO 3]
A. adware
B. pop-ups
C. spyware
D. pop-unders
36. Based on the statement above, determine the most likeable cause of the problem.
[CLO 3]
A. The hub is unplugged
B. The web server is down
C. The user’s workstation is not connected to the network
D. The server is not routing protocols to your workstation
Type of program installs and gathers personal information, including password
and account information from a computer without the permission or knowledge of
the user program install and gathers personal.
You’ve been called in to troubleshoot a network in corporate intranet web server.
The users are complaining that they can’t access corporate intranet web server.
The users receive “Host Not found” error while accessing web server address.
Several minutes later, another user reported the same problem. At the same time,
users still send e-mail and transfer files to another server.
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 12 of 15
37. Which of the following troubleshooting techniques are suitable for both home
networks and large corporate networks? [CLO 3]
i. Having a backup ISR
ii. Running a network monitoring application
iii. Documenting the troubleshooting processes
iv. Keeping record of system upgrades and software versions
A. i and ii
B. ii and iii
C. iii and iv
D. i and iv
38. Identify the main factor that prevents the hosts to connect to network. [CLO 3]
A. Operator error
B. Cabling problems
C. Equipment failure
D. Addressing problems
39. Based on the situation given above, determine the correct action to troubleshoot this
problem. [CLO 3]
A. Attach a different keyboard
B. Add the PC to your network to see if it can communicate with other PCs
C. Attach the PC to the Internet to check its operating system website for
patches
D. Boot the PC and run anti-virus and anti-spyware application from an
external drive.
40. Determine the next action that should be taken once a problem is resolved. [CLO 3]
A. Consult an FAQ
B. Escalate the problem
C. Update the documentation
D. Run remote access software
A network administrator is troubleshooting a computer that is operating
strangely. It boots slowly, programs will not load, and the keyboard responds
very slowly.
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 13 of 15
SECTION B
SUBJECTIVE (50 marks)
Instruction: This section consists of TWO (2) subjective questions. Answer ALL the
questions in the answer booklet.
QUESTION 1
Figure 3: Topology Y
a) i. Refer to figure 3, name the type of network topology. [CLO 1]
(1 marks)
ii) Describe TWO (2) advantages and TWO (2) disadvantages of the network
topology in question a) i. [CLO1]
(4 marks)
b) Describe the common transmission flaws affecting data signals below: [CLO 1]
(6 marks)
i) Noise
ii) Attenuation
iii) Latency
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 14 of 15
c) i) Identify network devices operate in OSI model Layers [CLO 1]
(3 marks)
OSI model Layer Network device
Network Layer
Data Link Layer
Physical Layer
Scenario A
ii) Draw the network design for this network using all information in scenario A
above. [CLO 2]
(4 marks)
d) Describe the differences between straight-through cable and cross over cable
[CLO 1]
(3 marks)
e) Describe the importance of Internet Protocols (IP). [CLO 1]
(4 marks)
Company ABC needs to build a simple network in new branch office with the
following characteristics:
i. 2 workstation
ii. 1 switch
iii. 1 server
iv. IP address 192.168.1.1 until 192.168.3
CONFIDENTIAL FP303 COMPUTER NETWORK
Page 15 of 15
QUESTION 2
a) Describe the relationships of ISP and internet. [CLO 1]
(2 marks)
b) Wireless technologies
i) Wireless systems are systems that do not use wires to send information but rather transmit it
through the air. The growth of wireless systems creates several opportunities for attackers.
Explain THREE (3) methods to avoid WLAN attacks. [CLO 3]
(6 marks)
ii) Describe TWO (2) basic modes of WLAN installations. [CLO 2]
(2 marks)
c) You’ve been asked to help troubleshoot a problem that is occurring in your polytechnic’s
computer lab. Students are complaining about viruses that are infecting the thumb drives they
bring to computer lab. How can you help solve this situation? [CLO 3]
(6 marks)
d) Explain social engineering and phishing in networking [CLO 2]
(3 marks)
e) Classify THREE (3) physical problems in network and explain how to solve
each problem. . [CLO 3]
(6 marks)