Upload
cenyum-cokmo
View
238
Download
4
Embed Size (px)
Citation preview
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 2 of 18
SECTION A
OBJECTIVES (50 marks)
INSTRUCTIONS:
This section consists of FORTY (40) objective questions. Answer ALL questions in
the answers booklet.
1. Which is NOT a network operating system?
[CLO 1]
A. Windows NT
B. Windows 2000
C. Novel Netware
D. Win XP
2. A simple type of wireless networking that allows the formation of a
small network with up to eight devices being connected at once. This
statement refers to _____________________ .
[CLO 2]
A. Bluetooth
B. Infared
C. RFID
D. 3G
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 3 of 18
3. Figure 5 below can be described as:
[CLO 1]
Figure 5
A. Point-to-point refers to a connection restricted to two endpoints
that sometimes referred as P2P
B. Process where multiple analog message signals or digital data
streams are combined into one signal over a shared medium
C. Two-way simultaneous communication is possible e.g.
telephone system.
D.
Distribution of audio and video content to a dispersed audience
via radio, television.
4. List 3 components of DNS.
[CLO 1]
A. Name servers, Resolvers, & Name space
B. Name server, Name client, & Acknowledgement
C. Resolvers, Name server, & Name client
D.
Acknowledgement, Name space, & Name Space
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 4 of 18
5. “Service provider runs program on user’s computer that notifies
service provider when IP address changes“
This statement describe about :
[CLO 1]
A. DHCP
B. SMTP
C. DDNS
D. DNS
6. A television company wants to provide a new sport channel from an
European Channel for their customers. What is the type of
transmission they need to setup for the service?
[CLO 1]
A. Point to point transmission
B. Broadcasting transmission
C. Bluetooth transmission
D. Network transmission
7. “A common connection point for devices in a network. Commonly
used to connect segments of a LAN. This device contains multiple
ports.” This statement refers to _____________________ .
[CLO 2]
A. Network Interface Card (NIC)
B. Repeater
C. Router
D. Hub
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 5 of 18
8. A new hardware item is using an IEEE 802.11b a wireless LAN. What
is the maximum data rate specified for this WLAN?
[CLO 2]
A. 10 mbps
B. 11 Mbps
C. 1000 Mbps
D. 16 Mbps
9. Which is best to describe about Internet Service Provider ( ISP ) ?
[CLO 1]
A. Company that provides the connections and support to access
the Internet.
B. Worldwide collection of computer networks, cooperating with
each other to exchange information using common standards.
C. A multinational of networks.
D. Exchange information in a variety of forms.
10. Which protocol does DHCP use at the transport layer?
[CLO 1]
A. IP
B. TCP
C. UDP
D. ARP
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 6 of 18
11. There are two (2) types of Infrared which are point-to-point and
_____________________.
[CLO 2]
A. Multicast
B. Unicast
C. Broadcast
D. Broadband
12. The Ethernet protocol defines many aspects of communication over
the local network. Including message format, message size, timing,
_____________________ and message patterns.
[CLO 1]
A. Segments
B. Encoding
C. Syntax
D. Semantic
13. The IEEE _______uses 5Ghz RF spectrum, and the IEEE ________ is
the newest standard in development.
[CLO 2]
A. 802.11n , 802.11g
B. 802.11g , 802.11b
C. 802.11a, 802.11g
D. 802.11a, 802.11n
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 7 of 18
14. In the 802.11 standard, IEEE specifies ___________ type of access
method.
[CLO 2]
A. CSMA/CA
B. CSMA/CD
C. Demand priority
D. Beacon passing
15. Which protocol does ping use?
[CLO 3]
A. TCP
B. ARP
C. ICMP
D. BootP
16.
Figure 2
Refer to Figure 2. Why would the response shown be displayed after
issuing the command ping 127.0.0.1 on a PC?
[CLO 3]
A. The default gateway device is not operating
B. There is a problem at the physical or data link layer
C. The IP settings are not properly configured on the host.
D. A router on the path to the destination host has gone down
-- 127.0.0.1 ping statistics –
4 packets transmitted, 0 packets
received, 100% packet loss
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 8 of 18
17. The synchronous modems are more costly than the asynchronous
modems because_____________________ . [CLO1]
A. They produce large volume of data
B. They contain clock recovery circuits
C. They transmit the data with stop and start bits
D. They operate with a larger bandwidth
18. Which of the following resolves domain names into IP addresses?
[CLO 1]
A. DNS
B. FTP
C. DHCP
D. SNMP
19. What protocol is used between E-Mail servers?
[CLO 1]
A. HTTP
B. POP3
C. SNMP
D. SMTP
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 9 of 18
20. In the TCP/IP model, which layer below deals with reliability, flow
control and error correction?
[CLO 1]
A. Application
B. Transport
C. Internet
D. Network access
21. Which of the following is an example of a client/server application?
[CLO 1]
A. A NIC
B. E-mail
C. A spreadsheet
D. Hard-drive utilites
22. Which of the following is the most secured password?
[CLO 2]
A. 12345ABC
B. dolphins
C. !t1z0GS557x^^L
D. A1B2C3
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 10 of 18
23. Which one of the following fiber connector supports full duplex
Ethernet?
[CLO 1]
A.
B.
C.
D.
24. _________________ is a signal source used in fiber optics.
[CLO 1]
A. Light
B. Radio
C. Microwave
D.
Very low-frequency
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 11 of 18
25. _________ is one of tools that used in wireless installation
[CLO 2]
A. Access Point ( AP )
B. BNC Connector
C. Coaxial Cable
D. RJ-58
26. It is referring to something that is continuous and the data will have
certain value at each of the signals. This explanation best describes
_____________________ .
[CLO 1]
A. Digital signals
B. Binary signals
C. Analog signals
D. Synchronous signals
27. A network administrator wants to control which user hosts can access
the network based on their MAC address. What will prevent
workstations with unauthorized MAC addresses from connecting to
the network through a switch?
[CLO 3]
A. Port security
B. RSTP
C. STP
D. BPDU
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 12 of 18
28. SPX is a protocol stack for LAN and WAN designed by
___________________ network operating system.
[CLO 1]
A. Windows
B. Novel
C. Window 2000
D. Linux
29. Your help desk has informed you that it received an urgent call from
the vice president last night requesting his logon ID and password.
What type of attack is this?
[CLO 2]
A. Spoofing
B. Replay attack
C. Social engineering
D. Trojan horse
30. Which statement is true concerning wireless bridges?
[CLO 2]
A. Increase the strength of a wireless signal.
B. Connects two networks with a wireless link.
C. Stationary device that connects to a wireless LAN.
D.
Allows wireless clients to connect to a wired network.
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 13 of 18
31. What should a network analyst actually do to implement the solution
for the network problem?
[CLO 3]
i. Collect documentation about problem
ii. Investigate & find someone that cause the problem
iii. Perform change, replacement, or addition
iv. Make backups
A. i, ii, and iii
B. i, iii, and iv
C. ii, iii, and iv
D. i, ii, iii, and iv
32. By default, wireless devices do not require authentication. Any and all
clients are able to associate regardless of who they are. This is
referring to ___________.
[CLO 2]
A. Pre-shared key
B. open authentication
C. Extensible authentication protocol
D. Encryption
33. Which method of attack is used to try to guess passwords or to
decipher an encryption code?
[CLO 2]
A. Phishing
B. Brute force
C. Data manipulation
D. Distributed denial of service
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 14 of 18
34. Which one of the following firewall product consists of a firewall
application that runs on network operating system (NOS) such as
UNIX or WINDOW?
[CLO 2]
network operating system(NOS) such as UNIX or WINDOW? (CLO2,M, 5.3)
A. Personal
B. Integrated
C. Server-based
D. Appliance-based
35. Daya Maju Company has newly extended their business. Another
branch is opened about 1.5 KM from the main building. The CEO
wants to share the information between 2 (two) buildings. What is the
suitable transmission media to connect each building?
[CLO2]
A. UTP Cat 5e
B. STP
C. Coaxial
D. Fiber optic
36. You are responsible for securing the polytechnic wireless LAN using
WPA. Which of the statement best describe the wireless security
standard that is defined by WPA?
[CLO 3]
I. It includes authentication by PSK
II. It requires use of an open authentication method
III. It specifies use of a static encryption key that must be changed
frequently to enhance security
IV. It specifies the use of a dynamic encryption keys that change
each time a client established a connection
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 15 of 18
A. I and II
B. II and III
C. III and IV
D I and IV
37. For _________ to be effective, the attacker must be able to establish
legitimacy with intended target or victim
[CLO 2]
A. Phiss
B. Fishing
C. Vishing
D. Phishing
38. Users are unable to access a company server. The system logs show
that the server is operating slowly because it is receiving a high level
of fake requests for service. Which type of the below attack is
occurring?
[CLO 3]
A. Trojan horse
B. Access
C. DoS
D. Worm
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 16 of 18
39. Using a 20-bit key as encryption is _________ more secured than
using an 18-bit key
[CLO 2]
A. Two times
B. Three times
C. Four times
D. Eight times
40. Which of the following requires port-based authentication?
[CLO2]
A. Kerberos
B. RADIUS
C. WEP
D. WPA
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 17 of 18
SECTION B
STRUCTURE QUESTIONS (50 marks)
INSTRUCTION:
This section consists of TWO (2) structures questions. Answer ALL the questions.
QUESTION 1
(a) Explain the main function for; [CLO 1]
(8 marks)
i. Session layer
ii. Transport layer
iii. Network layer
iv. Physical layer
(b) State FOUR (4) organizations that set standards for networking and explain
each of the functions. [CLO 1]
(4 marks)
(c) Give detail explanation about 3 types of wireless technologies. [CLO 2]
(8 marks)
(d) You need to build peer to peer network using coaxial cable with ring
topology at your office, find and state the suitable devices needed to setup the
network? [CLO 2]
(2 marks)
(e) Bridges is one of the network devices that can be used to filter the packet in
network, state two limitations of bridges? [CLO 2]
(3 marks)
CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 18 of 18
QUESTION 2
(a) Explain the following command used in MS DOS Prompt Windows:
[CLO 3]
(4 marks)
i. ipconfig
ii. ping
(b) State five IEEE 802.11 Wireless Standards. [CLO 1]
(5 marks)
(c) Explain about the term carrier sense in CSMA/CD? [CLO 1]
(3 marks)
(d) Distinguish the three major topology (star, ring, and bus) based on
the following criteria: [CLO 1]
i. Information transfer
ii. Troubleshoot (6 marks)
(e) Why are protocols needed? [CLO 1]
(2 marks)
(f) One way to detect failures in the network is through ping. Write down the
steps to detect a computer problem in network using Ping. [CLO 3]
(5 marks)