17
CONFIDENTIAL FP303 COMPUTER NETWORK Pages 2 of 18 SECTION A OBJECTIVES (50 marks) INSTRUCTIONS: This section consists of FORTY (40) objective questions. Answer ALL questions in the answers booklet. 1. Which is NOT a network operating system? [CLO 1] A. Windows NT B. Windows 2000 C. Novel Netware D. Win XP 2. A simple type of wireless networking that allows the formation of a small network with up to eight devices being connected at once. This statement refers to _____________________ . [CLO 2] A. Bluetooth B. Infared C. RFID D. 3G

FP 303 COMPUTER NETWORK PAPER FINAL Q

Embed Size (px)

Citation preview

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 2 of 18

SECTION A

OBJECTIVES (50 marks)

INSTRUCTIONS:

This section consists of FORTY (40) objective questions. Answer ALL questions in

the answers booklet.

1. Which is NOT a network operating system?

[CLO 1]

A. Windows NT

B. Windows 2000

C. Novel Netware

D. Win XP

2. A simple type of wireless networking that allows the formation of a

small network with up to eight devices being connected at once. This

statement refers to _____________________ .

[CLO 2]

A. Bluetooth

B. Infared

C. RFID

D. 3G

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 3 of 18

3. Figure 5 below can be described as:

[CLO 1]

Figure 5

A. Point-to-point refers to a connection restricted to two endpoints

that sometimes referred as P2P

B. Process where multiple analog message signals or digital data

streams are combined into one signal over a shared medium

C. Two-way simultaneous communication is possible e.g.

telephone system.

D.

Distribution of audio and video content to a dispersed audience

via radio, television.

4. List 3 components of DNS.

[CLO 1]

A. Name servers, Resolvers, & Name space

B. Name server, Name client, & Acknowledgement

C. Resolvers, Name server, & Name client

D.

Acknowledgement, Name space, & Name Space

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 4 of 18

5. “Service provider runs program on user’s computer that notifies

service provider when IP address changes“

This statement describe about :

[CLO 1]

A. DHCP

B. SMTP

C. DDNS

D. DNS

6. A television company wants to provide a new sport channel from an

European Channel for their customers. What is the type of

transmission they need to setup for the service?

[CLO 1]

A. Point to point transmission

B. Broadcasting transmission

C. Bluetooth transmission

D. Network transmission

7. “A common connection point for devices in a network. Commonly

used to connect segments of a LAN. This device contains multiple

ports.” This statement refers to _____________________ .

[CLO 2]

A. Network Interface Card (NIC)

B. Repeater

C. Router

D. Hub

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 5 of 18

8. A new hardware item is using an IEEE 802.11b a wireless LAN. What

is the maximum data rate specified for this WLAN?

[CLO 2]

A. 10 mbps

B. 11 Mbps

C. 1000 Mbps

D. 16 Mbps

9. Which is best to describe about Internet Service Provider ( ISP ) ?

[CLO 1]

A. Company that provides the connections and support to access

the Internet.

B. Worldwide collection of computer networks, cooperating with

each other to exchange information using common standards.

C. A multinational of networks.

D. Exchange information in a variety of forms.

10. Which protocol does DHCP use at the transport layer?

[CLO 1]

A. IP

B. TCP

C. UDP

D. ARP

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 6 of 18

11. There are two (2) types of Infrared which are point-to-point and

_____________________.

[CLO 2]

A. Multicast

B. Unicast

C. Broadcast

D. Broadband

12. The Ethernet protocol defines many aspects of communication over

the local network. Including message format, message size, timing,

_____________________ and message patterns.

[CLO 1]

A. Segments

B. Encoding

C. Syntax

D. Semantic

13. The IEEE _______uses 5Ghz RF spectrum, and the IEEE ________ is

the newest standard in development.

[CLO 2]

A. 802.11n , 802.11g

B. 802.11g , 802.11b

C. 802.11a, 802.11g

D. 802.11a, 802.11n

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 7 of 18

14. In the 802.11 standard, IEEE specifies ___________ type of access

method.

[CLO 2]

A. CSMA/CA

B. CSMA/CD

C. Demand priority

D. Beacon passing

15. Which protocol does ping use?

[CLO 3]

A. TCP

B. ARP

C. ICMP

D. BootP

16.

Figure 2

Refer to Figure 2. Why would the response shown be displayed after

issuing the command ping 127.0.0.1 on a PC?

[CLO 3]

A. The default gateway device is not operating

B. There is a problem at the physical or data link layer

C. The IP settings are not properly configured on the host.

D. A router on the path to the destination host has gone down

-- 127.0.0.1 ping statistics –

4 packets transmitted, 0 packets

received, 100% packet loss

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 8 of 18

17. The synchronous modems are more costly than the asynchronous

modems because_____________________ . [CLO1]

A. They produce large volume of data

B. They contain clock recovery circuits

C. They transmit the data with stop and start bits

D. They operate with a larger bandwidth

18. Which of the following resolves domain names into IP addresses?

[CLO 1]

A. DNS

B. FTP

C. DHCP

D. SNMP

19. What protocol is used between E-Mail servers?

[CLO 1]

A. HTTP

B. POP3

C. SNMP

D. SMTP

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 9 of 18

20. In the TCP/IP model, which layer below deals with reliability, flow

control and error correction?

[CLO 1]

A. Application

B. Transport

C. Internet

D. Network access

21. Which of the following is an example of a client/server application?

[CLO 1]

A. A NIC

B. E-mail

C. A spreadsheet

D. Hard-drive utilites

22. Which of the following is the most secured password?

[CLO 2]

A. 12345ABC

B. dolphins

C. !t1z0GS557x^^L

D. A1B2C3

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 10 of 18

23. Which one of the following fiber connector supports full duplex

Ethernet?

[CLO 1]

A.

B.

C.

D.

24. _________________ is a signal source used in fiber optics.

[CLO 1]

A. Light

B. Radio

C. Microwave

D.

Very low-frequency

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 11 of 18

25. _________ is one of tools that used in wireless installation

[CLO 2]

A. Access Point ( AP )

B. BNC Connector

C. Coaxial Cable

D. RJ-58

26. It is referring to something that is continuous and the data will have

certain value at each of the signals. This explanation best describes

_____________________ .

[CLO 1]

A. Digital signals

B. Binary signals

C. Analog signals

D. Synchronous signals

27. A network administrator wants to control which user hosts can access

the network based on their MAC address. What will prevent

workstations with unauthorized MAC addresses from connecting to

the network through a switch?

[CLO 3]

A. Port security

B. RSTP

C. STP

D. BPDU

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 12 of 18

28. SPX is a protocol stack for LAN and WAN designed by

___________________ network operating system.

[CLO 1]

A. Windows

B. Novel

C. Window 2000

D. Linux

29. Your help desk has informed you that it received an urgent call from

the vice president last night requesting his logon ID and password.

What type of attack is this?

[CLO 2]

A. Spoofing

B. Replay attack

C. Social engineering

D. Trojan horse

30. Which statement is true concerning wireless bridges?

[CLO 2]

A. Increase the strength of a wireless signal.

B. Connects two networks with a wireless link.

C. Stationary device that connects to a wireless LAN.

D.

Allows wireless clients to connect to a wired network.

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 13 of 18

31. What should a network analyst actually do to implement the solution

for the network problem?

[CLO 3]

i. Collect documentation about problem

ii. Investigate & find someone that cause the problem

iii. Perform change, replacement, or addition

iv. Make backups

A. i, ii, and iii

B. i, iii, and iv

C. ii, iii, and iv

D. i, ii, iii, and iv

32. By default, wireless devices do not require authentication. Any and all

clients are able to associate regardless of who they are. This is

referring to ___________.

[CLO 2]

A. Pre-shared key

B. open authentication

C. Extensible authentication protocol

D. Encryption

33. Which method of attack is used to try to guess passwords or to

decipher an encryption code?

[CLO 2]

A. Phishing

B. Brute force

C. Data manipulation

D. Distributed denial of service

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 14 of 18

34. Which one of the following firewall product consists of a firewall

application that runs on network operating system (NOS) such as

UNIX or WINDOW?

[CLO 2]

network operating system(NOS) such as UNIX or WINDOW? (CLO2,M, 5.3)

A. Personal

B. Integrated

C. Server-based

D. Appliance-based

35. Daya Maju Company has newly extended their business. Another

branch is opened about 1.5 KM from the main building. The CEO

wants to share the information between 2 (two) buildings. What is the

suitable transmission media to connect each building?

[CLO2]

A. UTP Cat 5e

B. STP

C. Coaxial

D. Fiber optic

36. You are responsible for securing the polytechnic wireless LAN using

WPA. Which of the statement best describe the wireless security

standard that is defined by WPA?

[CLO 3]

I. It includes authentication by PSK

II. It requires use of an open authentication method

III. It specifies use of a static encryption key that must be changed

frequently to enhance security

IV. It specifies the use of a dynamic encryption keys that change

each time a client established a connection

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 15 of 18

A. I and II

B. II and III

C. III and IV

D I and IV

37. For _________ to be effective, the attacker must be able to establish

legitimacy with intended target or victim

[CLO 2]

A. Phiss

B. Fishing

C. Vishing

D. Phishing

38. Users are unable to access a company server. The system logs show

that the server is operating slowly because it is receiving a high level

of fake requests for service. Which type of the below attack is

occurring?

[CLO 3]

A. Trojan horse

B. Access

C. DoS

D. Worm

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 16 of 18

39. Using a 20-bit key as encryption is _________ more secured than

using an 18-bit key

[CLO 2]

A. Two times

B. Three times

C. Four times

D. Eight times

40. Which of the following requires port-based authentication?

[CLO2]

A. Kerberos

B. RADIUS

C. WEP

D. WPA

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 17 of 18

SECTION B

STRUCTURE QUESTIONS (50 marks)

INSTRUCTION:

This section consists of TWO (2) structures questions. Answer ALL the questions.

QUESTION 1

(a) Explain the main function for; [CLO 1]

(8 marks)

i. Session layer

ii. Transport layer

iii. Network layer

iv. Physical layer

(b) State FOUR (4) organizations that set standards for networking and explain

each of the functions. [CLO 1]

(4 marks)

(c) Give detail explanation about 3 types of wireless technologies. [CLO 2]

(8 marks)

(d) You need to build peer to peer network using coaxial cable with ring

topology at your office, find and state the suitable devices needed to setup the

network? [CLO 2]

(2 marks)

(e) Bridges is one of the network devices that can be used to filter the packet in

network, state two limitations of bridges? [CLO 2]

(3 marks)

CONFIDENTIAL FP303 COMPUTER NETWORK

Pages 18 of 18

QUESTION 2

(a) Explain the following command used in MS DOS Prompt Windows:

[CLO 3]

(4 marks)

i. ipconfig

ii. ping

(b) State five IEEE 802.11 Wireless Standards. [CLO 1]

(5 marks)

(c) Explain about the term carrier sense in CSMA/CD? [CLO 1]

(3 marks)

(d) Distinguish the three major topology (star, ring, and bus) based on

the following criteria: [CLO 1]

i. Information transfer

ii. Troubleshoot (6 marks)

(e) Why are protocols needed? [CLO 1]

(2 marks)

(f) One way to detect failures in the network is through ping. Write down the

steps to detect a computer problem in network using Ping. [CLO 3]

(5 marks)