ICT106 T222 FinalExam MarkingGuide
ICT106 T222 FinalExam MarkingGuide
ICT106 T222 FinalExam MarkingGuide
Examination Conditions:
Total /100
/50%
A) Peer to peer
B) Client-server
C) None of the above
D) Secure network
2. A private internetwork in which devices and servers are only available to those users connected
to the internal network is called ______________.
A) Internet
B) Intranet
C) Extranet
D) None of the above
3. The amount of data that can be transferred on a network during a specific interval is called the
________________________________.
A) Network bandwidth
B) Network speed rating
C) Line speed rating
D) Duplexing speed
4. Which IP address expressed in CIDR notation has the subnet mask 255.255.255.0?
A) 10.100.44.123/24
B) 172.16.88.222/16
C) 192.168.100.1/26
D) 172.29.111.201/18
5. Which protocol can configure a computer’s IP address and subnet mask automatically?
A) UDP
B) SNMP
C) DHCP
D) DNS
6. What should you configure on a switch that’s connected to three broadcast domains?
A) IGMP
B) VLANs
C) Port security
D) STP
8. Which OSI layer handles flow control, data segmentation, and reliability?
A) Application
B) Physical
C) Transport
D) Data Link
A) Tunnelling
B) Concentrating
C) Encapsulating
D) Authenticating
10. Unsolicited e-mail that takes up e-mail storage space, network bandwidth and people’s time is
________________________ .
A) Worm
B) Virus
C) Spam
D) Spyware
Section B Match the terms in column A to the terms in column B: There is one extra
phrase in column B that does not match with any term in Column A. (30 marks)
Question 11 Match the terms.
Column A Column B
Address Resolution Protocol A networked collection of LANs tied together by devices such as
(ARP) routers.
Firewall The standard protocol for sending email over the Internet
Dynamic Host Configuration Prevent someone who has gained physical access to a computer
Protocol (DHCP) from being able to use the data
Simple Network Management That determines how bits are represented on the medium
(SNMP)
Authentication Use encryption technology to ensure the communication is secure
while travelling through the public Internet
Virtual Private Network Allows several hundred workstations to access the Internet with a
single public Internet address
Port Address Translation (PAT) Enables switches to detect when there is a potential for a switching
loop
Spanning Tree Protocol (STP) A hardware device or software program that inspects packets going
into or out of a network
Security features allow administrators to control what users can do
after they are logged on to the network
Virtual Private Network use encryption technology to ensure the communication is secure
while travelling through the public Internet
Port Address Translation (PAT) Allows several hundred workstations to access the Internet with a
single public Internet address
Spanning Tree Protocol (STP) Enables switches to detect when there is a potential for a switching
loop
Question 12
a) The following IP address has 21 bits allocated to the network portion of the address and 11 bit
allocated to the node portion of the address.
141.132.196.33 / 21
How would you write the subnet mask of the above IP address in the way that subnet masks are normally
written? 255.255.248.0………………….
b) What is the difference between TCP and UDP
(2+4=6 marks)
The connection-oriented (TCP)communication offers features like same order delivery, reliability, flow
control, congestion avoidance, and multiplexing while connectionless communication(UDP) does not offer
these features and rely on best-effort delivery
Question 13
You are a network administrator and you are going to use some technologies for securing data tramission
in your network,Explain two types of technology which you can use to secure data transmission in your
network? [2*3=6 marks]
Question 14
Briefly explained the following: [3 * 2 = 6 marks]
Fibre optic cables are mainly used in environments that are highly susceptible to noise and other
interferences. Since these cables carry light signals, they are not prone to any interference problems. These
cables are highly secure as they do not emit any external signals.
Fibre optic cables are available in different sizes with varying core and cladding diameters. But the most
commonly used fibre optic cable is the 62.5/125 micrometre. The diameter of the core is 62.5 micrometre
and that of the cladding is 125 micrometre.
Question 15
What is the VPN stands for? What is the usage of the VPN and also what is the advantage of the VPN?
[1 + 2 + 3 = 6 marks]
A virtual private network (VPN) uses the Internet to give users or branch offices secure access to a
company’s network resources
VPNs use encryption technology to ensure the communication is secure while travelling through the public
Internet
A “tunnel” is created between the VPN client and the VPN server
VPN servers can be configured on server OSs or they can be in the form of a dedicated device with the sole
purpose of handling VPN connections
VPN Benefits
VPN benefits include the following:
Enable mobile users to connect with corporate networks securely wherever an Internet connection is
available
Allow multiple sites to maintain permanent secure connections via the Internet instead of using expensive
WAN links
Reduce costs by using the ISP’s support services instead of paying for more expensive WAN support
Question 16
Discuss the models of Peer to Peer networks and Server Based networks. Draw diagrams to elaborate your
answer. [4 + 2 = 6 marks]
A network model defines how and where resources are shared and how access to these resources is
regulated
Fall into two major types
– Peer-to-peer network – most computers function as clients or servers (no centralized
control over who has access to network resources)
– Server-based network – certain computers take on specialized roles and function
mainly as servers, and ordinary users’ machines tend to function mainly as clients
Question 17
You are working as a network technician at xyz company. You need to secure the physical access in to
server room in that company .What is the physical security best practice for this purpose?[6 mraks]
Question 18
a. What does DoS attack stand for? Explain how it works? (3 marks)
b. Explain about ping flood attack (3 marks)
[3+3= 6 marks]
Question 19
Draw the OSI network model with at least one protocol in each layer [6 marks]
6in4 is an IPv6 transition mechanism for migrating from Internet Protocol version 4 (IPv4)
to IPv6. It is a tunnelling protocol that encapsulates IPv6 packets on specially
configured IPv4 links according to the specifications of RFC 4213. The IP protocol number
for 6in4 is 41, per IANA reservation
Acess control: By using Router as a chockpoint we can contraol the packets which travel
through it as an access control system.It can be IPS or IDS
Question 21
You have been called as a network consultant for a new network design for the Smith company. They want
to shift the staff to work from home. The requirements of this design are summarized as follows:
• It has two buildings 12 miles apart
• They have 300 user workstations and 5 servers in each building
• Most of the staff are needed to be flexible working from home and/or in-office
• The company is aiming to increase the temporary staff in an ad-hoc network in a short amount of
time.
a) What devices, medium types, and topologies are you going to use for this network/Adhoc? [2 marks]
b) What type of technology will be provided to staff who wish to work from home? How can staff access
the company's file from home in a secure way?[3 marks]
c) What solution can you suggest for connecting the buildings across the street with the existing
building? [1 marks]
[2+3+1= 6 marks]
a) For Ad-hoc ,Wireless is a good option. We need to use routers and also, AP
b) Use VPN, Tunnelling
c) Use Wireless or Fibre optic