FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

15
EXAMINATION AND EVALUATION DIVISION DEPARTMENT OF POLYTECHNIC EDUCATION (MINISTRY OF HIGHER EDUCATION) INFORMATION & COMMUNICATION TECHNOLOGY (ICT) DEPARTMENT FINAL EXAMINATION JUNE 2012 SESSION FP303: COMPUTER NETWORK DATE: 19 NOV 2012 (MONDAY) DURATION: 2 HOURS (2.30 PM - 4.30 PM) This paper consists of FIFTEEN (15) pages including the front page. Section A: Objective (40 questions answer ALL) Section B: Structure (2 questions answer ALL). CONFIDENTIAL DO NOT OPEN THIS QUESTION PAPER UNTIL INSTRUCTED BY THE CHIEF INVIGILATOR (The CLO stated is for reference only)

Transcript of FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

Page 1: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

EXAMINATION AND EVALUATION DIVISION

DEPARTMENT OF POLYTECHNIC EDUCATION

(MINISTRY OF HIGHER EDUCATION)

INFORMATION & COMMUNICATION TECHNOLOGY (ICT)

DEPARTMENT

FINAL EXAMINATION

JUNE 2012 SESSION

FP303: COMPUTER NETWORK

DATE: 19 NOV 2012 (MONDAY)

DURATION: 2 HOURS (2.30 PM - 4.30 PM)

This paper consists of FIFTEEN (15) pages including the front page.

Section A: Objective (40 questions – answer ALL)

Section B: Structure (2 questions – answer ALL).

CONFIDENTIAL

DO NOT OPEN THIS QUESTION PAPER UNTIL INSTRUCTED BY THE

CHIEF INVIGILATOR

(The CLO stated is for reference only)

Page 2: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 2 of 15

SECTION A

OBJECTIVE (50 marks)

Instructions: This section consists of FORTY (40) objective questions. Answer ALL the

questions in the answer booklet.

1. Which of the following terms describes a network of computers and other devices that

are confined to a relatively small space, such as a building or even an office?

[CLO 1]

A. Personal Area Network

B. Local Area Network

C. Metropolitan Area Network

D. Wide Area Network

2. Which agency created standards for network interfaces and public networks (X series)

and for telephone communications (V series)?

[CLO 1]

A. EIA

B. ISO

C. ANSI

D. ITU-T

3. Which topology is relevant with the statement above? [CLO 1]

A. Bus topology

B. Star topology

C. Ring topology

D. Point-to-Point topology

The expansion of this network structure is easy as long as there is a free port on the

hub, only a cable is needed to connect other computers

Page 3: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 3 of 15

Each station can both transmit and receive, but not at the same time. When one

device is sending, the other can only receive and vice versa.

4. Based on the statement above, what type of transmission mode is it referring to?

[CLO 1]

A. Simplex

B. Half-duplex

C. Full-duplex

D. Automatic

5. _______________is a set of techniques that enable more than one device to combine

and send their signals simultaneously through a single data link at the same time.

[CLO 1]

A. Multiplexing

B. Point-to-Point transmission

C. Broadcast transmission

D. Bandwidth

Figure 1: Network Diagram 1

6. Refer to the Figure 1, what type of device is used to connect two networks?

[CLO 1]

A. Hub

B. Switch

C. Router

D. Access point

7. ___________is a process where multiple analog or digital message signals are

combined into one signal over a shared medium.

[CLO 1]

A. Modulating

B. Multiplexing

C. Broadcasting

D. Full-Duplex transmission

Page 4: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 4 of 15

8. Which of the following is a benefit of VLANs?

[CLO 1]

A. They increase the size of collision domains.

B. They allow logical grouping of users by function.

C. They increase the size of broadcast domains while decreasing the number

of collision domains.

D. They simplify switch administration.

9. Determine an advantage of the use of layers in the OSI reference model. [CLO 1]

A. It increases complexity.

B. It breaks network communications into larger parts.

C. It prevents changes in one layer from affecting other layers.

D. It requires the use of single-vendor equipment for hardware and

software communications.

10. Which of the following is the correct order of the layers of the OSI reference model,

starting at the lowest to the higher layer of the model? [CLO 1]

A. data Link, Physical, Transport, Network, Presentation, Session, application

B. data link, network, physical, session, transport, presentation, application

C. physical, data link, network, transport, presentation, session, application

D. physical, data link, network, transport, session, presentation, application

11. Which OSI layer is responsible for formatting data based on a standard syntax and

character set conversion?

[CLO 1]

A. Transport

B. Network

C. Presentation

D. Session

12. Determine the main function of the transport layer. [CLO 1]

A. Node-to-node delivery

B. End-to-end message delivery

C. Synchronization

D. Updating and maintenance of routing tables

Page 5: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 5 of 15

13. Identify application layer protocol used to support file transfers between a client and a

server. [CLO 2]

A. HTML

B. HTTP

C. FTP

D. Telnet

14. Based on the statement above, which of the following network address belong to this

host? [CLO 2]

A. 176.33.0.0

B. 176.33.33.0

C. 176.33.68.0

D. 176.33.65.30

15. Which default subnet mask provides the most host bits? [CLO 2]

A. 255.0.0.0

B. 255.255.0.0

C. 255.255.255.0

D. 255.255.255.255

16. Which of the following addresses is an example of a broadcast address on the network

123.10.0.0 with a subnet mask of 255.255.0.0? [CLO 2]

A. 123.255.255.255

B. 123.10.255.255

C. 123.13.0.0

D. 123.1.1.1

IP address: 176.33.68.16

Subnet mask: 255.255.0.0

Page 6: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 6 of 15

17. Which statement describes a straight-through cable? [CLO 1]

i. It maps a wire to the same pins on both ends of the cable

ii. Two devices directly connected and using different pins to transmit and receive

iii. Two devices directly connected and using same pins to transmit and receive

iv. T568A on one end of the cable and T568B on the other end of the same cable

A. i and ii

B. i and iii

C. ii and iii

D. ii and iv

18. Based on the statement above, identify the type of connection cable. [CLO 1]

A. Cross-over

B. Cross-line

C. Straight-through

D. Roll Over

19. Based on the statement given above, which of the following type of media meet the

requirements? [CLO 1]

A. STP

B. UTP

C. Single-Mode Fiber

D. Multimode Fiber

Router port to router port

Switch port to switch port

Switch port to hub port

Hub port to hub port

A network administrator is required to use media in the network that can run

up to 100 meters in cable length without using repeaters. The chosen media

must be inexpensive and easily installed. The installation will be in a pre-

existing building with limited cabling space.

Page 7: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 7 of 15

It is often used to connect a TV set to the signal source, be it a cable TV outlet,

satellite TV, or conventional antenna.

20. Which of the following types of channels moves data relatively slow?

[CLO 1]

A. Wideband channel

B. Voiceband channel

C. Narrowband channel

D. Broadband channel

21. Identify the function of Ping and Tracert commands. [CLO 1]

A. Tracert shows each hop, while ping show a destination reply only

B. Ping shows whether the transmission is unsuccessful; tracert does not

C. Both ping and tracert can show results in a graphical display

D. Tracert uses IP addresses; ping does not

22. Which of the following describes each router through which a packet travels when

moving between source and destination networks?

[CLO 1]

A. NOC

B. ISP

C. Segment

D. Hop

23. Which elements are required to successfully connect to the Internet? [CLO 1]

A. File sharing enabled

B. A network connection

C. Server services enabled

D. An address obtained directly from the RIR

24. Based on the statement above, which type of media would be the BEST to meet these

requirements? [CLO 1]

A. STP

B. UTP

C. Coaxial

D. Fiber

Page 8: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 8 of 15

25. Identify the purpose of nslookup. [CLO 1]

A. Display network connection

B. Display route taken to destination

C. Displays IP configuration information

D. Directly queries the name server for information on a destination

domain

26. The inner core of an optical fiber is ________________in composition. [CLO 1]

A. glass or plastic

B. copper

C. bimetallic

D. liquid

27. Determine the major factor that makes coaxial cable less susceptible to noise than

twisted pair cable. [CLO 1]

A. Inner conductor

B. Diameter of cable

C. Outer conductor

D. Insulating material

28. Determine the factor of IEEE 802.11 wireless technology which is able to transmit

further distances than Bluetooth technology.

[CLO 2]

A. Has higher power output

B. Uses better encryption methods

C. Transmits at much lower frequencies

D. Transmits at much higher frequencies

29. Which of the following describes the importance of security in wireless networks?

[CLO 2]

A. Wireless networks are typically slower than wired networks.

B. Televisions and other devices can interfere with wireless signals.

C. Environment factors such as thunderstorm can affect wireless networks.

D. Wireless networks broadcast data over a medium that allows easy

access.

Page 9: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 9 of 15

30. Classify the access-point feature which allows a network administrator to define what

type of data can enter the wireless network. [CLO 3]

A. Traffic filtering

B. Hacking block

C. Authentication

D. Encryption

31. Match the function of WEP and EAP in wireless network.

[CLO 2]

A. Encrypt and authenticate users on

B. Filter traffic and select the operating frequency for

C. Identify the wireless network and compress data on

D. Create the smallest wireless network and limit the number of users on

Page 10: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 10 of 15

Figure 2: Linksys Interface

32. Refer to Figure 2. In the Wireless menu of a Linksys integrated router, which of the

following configuration options allow the presence of the access point to be known to

nearby clients? [CLO 2]

A. Network Mode

B. Network Name (SSID)

C. Standard Channel

D. SSID Broadcast

33. Which method of attack is used to try to guess passwords or to decipher an encryption

code? [CLO 2]

A. Phishing

B. Brute force

C. Data manipulation

D. Distributed denial of service

Page 11: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 11 of 15

34. Identify the method of phishing attack. [CLO 2]

A. by e-mail

B. by telephone

C. by VOIP

D. through a person they know in common

35. The statement above refers to _________________________________ [CLO 3]

A. adware

B. pop-ups

C. spyware

D. pop-unders

36. Based on the statement above, determine the most likeable cause of the problem.

[CLO 3]

A. The hub is unplugged

B. The web server is down

C. The user’s workstation is not connected to the network

D. The server is not routing protocols to your workstation

Type of program installs and gathers personal information, including password

and account information from a computer without the permission or knowledge of

the user program install and gathers personal.

You’ve been called in to troubleshoot a network in corporate intranet web server.

The users are complaining that they can’t access corporate intranet web server.

The users receive “Host Not found” error while accessing web server address.

Several minutes later, another user reported the same problem. At the same time,

users still send e-mail and transfer files to another server.

Page 12: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 12 of 15

37. Which of the following troubleshooting techniques are suitable for both home

networks and large corporate networks? [CLO 3]

i. Having a backup ISR

ii. Running a network monitoring application

iii. Documenting the troubleshooting processes

iv. Keeping record of system upgrades and software versions

A. i and ii

B. ii and iii

C. iii and iv

D. i and iv

38. Identify the main factor that prevents the hosts to connect to network. [CLO 3]

A. Operator error

B. Cabling problems

C. Equipment failure

D. Addressing problems

39. Based on the situation given above, determine the correct action to troubleshoot this

problem. [CLO 3]

A. Attach a different keyboard

B. Add the PC to your network to see if it can communicate with other PCs

C. Attach the PC to the Internet to check its operating system website for

patches

D. Boot the PC and run anti-virus and anti-spyware application from an

external drive.

40. Determine the next action that should be taken once a problem is resolved. [CLO 3]

A. Consult an FAQ

B. Escalate the problem

C. Update the documentation

D. Run remote access software

A network administrator is troubleshooting a computer that is operating

strangely. It boots slowly, programs will not load, and the keyboard responds

very slowly.

Page 13: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 13 of 15

SECTION B

SUBJECTIVE (50 marks)

Instruction: This section consists of TWO (2) subjective questions. Answer ALL the

questions in the answer booklet.

QUESTION 1

Figure 3: Topology Y

a) i. Refer to figure 3, name the type of network topology. [CLO 1]

(1 marks)

ii) Describe TWO (2) advantages and TWO (2) disadvantages of the network

topology in question a) i. [CLO1]

(4 marks)

b) Describe the common transmission flaws affecting data signals below: [CLO 1]

(6 marks)

i) Noise

ii) Attenuation

iii) Latency

Page 14: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 14 of 15

c) i) Identify network devices operate in OSI model Layers [CLO 1]

(3 marks)

OSI model Layer Network device

Network Layer

Data Link Layer

Physical Layer

Scenario A

ii) Draw the network design for this network using all information in scenario A

above. [CLO 2]

(4 marks)

d) Describe the differences between straight-through cable and cross over cable

[CLO 1]

(3 marks)

e) Describe the importance of Internet Protocols (IP). [CLO 1]

(4 marks)

Company ABC needs to build a simple network in new branch office with the

following characteristics:

i. 2 workstation

ii. 1 switch

iii. 1 server

iv. IP address 192.168.1.1 until 192.168.3

Page 15: FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

CONFIDENTIAL FP303 COMPUTER NETWORK

Page 15 of 15

QUESTION 2

a) Describe the relationships of ISP and internet. [CLO 1]

(2 marks)

b) Wireless technologies

i) Wireless systems are systems that do not use wires to send information but rather transmit it

through the air. The growth of wireless systems creates several opportunities for attackers.

Explain THREE (3) methods to avoid WLAN attacks. [CLO 3]

(6 marks)

ii) Describe TWO (2) basic modes of WLAN installations. [CLO 2]

(2 marks)

c) You’ve been asked to help troubleshoot a problem that is occurring in your polytechnic’s

computer lab. Students are complaining about viruses that are infecting the thumb drives they

bring to computer lab. How can you help solve this situation? [CLO 3]

(6 marks)

d) Explain social engineering and phishing in networking [CLO 2]

(3 marks)

e) Classify THREE (3) physical problems in network and explain how to solve

each problem. . [CLO 3]

(6 marks)