ICT106 T222 FinalExam MarkingGuide

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

Newsletter Title Page 1

Seat Number: ________ _Room: ________________


Student Number: ________________________________
Surname: ________________________________
Given Name: ________________________________
Lecturer/Tutor: ________________________________
This paper and all materials issued MUST be returned at the end of the examination.
They are NOT to be removed from the examination room.

Examination Conditions:

King’s Own Institute examinations are run


in accordance with KOI examination ICT106 Data Communications and Networks
procedures. Any student breaching these
procedures will be dealt with in T222 FINAL EXAMINATION
accordance with KOI’s Student Academic
Misconduct Policy. Time Allowed: 2 hours plus 10 minutes reading time
It is your responsibility to ensure that you Reading time is for reading only. You are not permitted to write,
are in the correct examination. calculate or mark your paper in any way during reading time.
It is your responsibility to fill out and
complete your details in the space
provided on all the examination material This is a CLOSED BOOK exam
provided. Use the time before your
examination to complete this task as you Permitted materials for this exam:
will not be granted any additional time to
do so. - Non-programmable calculators,
- English dictionaries
You are NOT permitted to have at your
desk or on your person any unauthorized Materials provided for the examination:
material. This includes but is not limited
to: - This examination paper
 Mobile Phones
 Smart watches Instructions for Students:
 Electronic Devices
- This exam consists of three (3) sections: A, B and C.
 Notes
- Section A consists of ten (10) multiple choice questions each
You are not permitted to obtain assistance worth two (1) marks. For a maximum of twenty (10) marks
by improper means or to ask for or give
help to any other person. - Section B consists of ten (10) match the column questions each
worth two (3) marks. For a maximum of twenty (30) marks
You may not leave the room, including
using the bathroom, for the first 60 - Section C Short Answer Questions worth a maximum of sixty
minutes or during the last 15 minutes. (60) marks.
During the examination you must seek
permission (by raising your hand) from a
supervisor if you wish to:
 Leave early
 Use the bathroom
 Access your bag
 Require assistance

DO NOT open your examination paper until instructed

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 2

EXAMINATION MARKING SHEET


For use by Examiners only.

Question Student Mark

Section A Multiple Choice Questions /10

Section B Match Columns /30

Section C Short Answer Questions /60

Total /100

/50%

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 3
SECTION A: Multiple Choice Questions (10 marks)

1. A _________________ network model has centralized authority over resources.

A) Peer to peer
B) Client-server
C) None of the above
D) Secure network

2. A private internetwork in which devices and servers are only available to those users connected
to the internal network is called ______________.

A) Internet
B) Intranet
C) Extranet
D) None of the above

3. The amount of data that can be transferred on a network during a specific interval is called the
________________________________.

A) Network bandwidth
B) Network speed rating
C) Line speed rating
D) Duplexing speed

4. Which IP address expressed in CIDR notation has the subnet mask 255.255.255.0?

A) 10.100.44.123/24
B) 172.16.88.222/16
C) 192.168.100.1/26
D) 172.29.111.201/18

5. Which protocol can configure a computer’s IP address and subnet mask automatically?

A) UDP
B) SNMP
C) DHCP
D) DNS

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 4

6. What should you configure on a switch that’s connected to three broadcast domains?

A) IGMP
B) VLANs
C) Port security
D) STP

7. Which of the following IPv6 features is an enhancement to IPv4?

A) Larger address space


B) Works at the Internetwork and Transport layers
C) Works with routers
D) None of the above

8. Which OSI layer handles flow control, data segmentation, and reliability?

A) Application
B) Physical
C) Transport
D) Data Link

9. How do VPNs accomplish the “private” part of a virtual private network?

A) Tunnelling
B) Concentrating
C) Encapsulating
D) Authenticating

10. Unsolicited e-mail that takes up e-mail storage space, network bandwidth and people’s time is
________________________ .

A) Worm
B) Virus
C) Spam
D) Spyware

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 5

Section B Match the terms in column A to the terms in column B: There is one extra
phrase in column B that does not match with any term in Column A. (30 marks)
Question 11 Match the terms.
Column A Column B
Address Resolution Protocol A networked collection of LANs tied together by devices such as
(ARP) routers.
Firewall The standard protocol for sending email over the Internet

Encryption Used to automatically assign IP addresses as needed


Encoding Used to resolve a logical (IP) address to physical (MAC) address

Dynamic Host Configuration Prevent someone who has gained physical access to a computer
Protocol (DHCP) from being able to use the data

Simple Network Management That determines how bits are represented on the medium
(SNMP)
Authentication Use encryption technology to ensure the communication is secure
while travelling through the public Internet
Virtual Private Network Allows several hundred workstations to access the Internet with a
single public Internet address

Port Address Translation (PAT) Enables switches to detect when there is a potential for a switching
loop

Spanning Tree Protocol (STP) A hardware device or software program that inspects packets going
into or out of a network
Security features allow administrators to control what users can do
after they are logged on to the network

Write your answer:


Column A Column B
Address Resolution Protocol Used to resolve a logical (IP) address to physical (MAC) address
(ARP)
Firewall A hardware device or software program that inspects packets going
into or out of a network
Encryption Prevent someone who has gained physical access to a computer
from being able to use the data

Encoding That determines how bits are represented on the medium

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 6
Dynamic Host Configuration Used to automatically assign IP addresses as needed
Protocol (DHCP)
Simple Network Management The standard protocol for sending email over the Internet
(SNMP)
Authentication Security features allow administrators to control what users can do
after they are logged on to the network

Virtual Private Network use encryption technology to ensure the communication is secure
while travelling through the public Internet
Port Address Translation (PAT) Allows several hundred workstations to access the Internet with a
single public Internet address

Spanning Tree Protocol (STP) Enables switches to detect when there is a potential for a switching
loop

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 7
Section C Short Answer Questions (60 marks)

Question 12
a) The following IP address has 21 bits allocated to the network portion of the address and 11 bit
allocated to the node portion of the address.
141.132.196.33 / 21
How would you write the subnet mask of the above IP address in the way that subnet masks are normally
written? 255.255.248.0………………….
b) What is the difference between TCP and UDP

(2+4=6 marks)

The connection-oriented (TCP)communication offers features like same order delivery, reliability, flow
control, congestion avoidance, and multiplexing while connectionless communication(UDP) does not offer
these features and rely on best-effort delivery

Question 13
You are a network administrator and you are going to use some technologies for securing data tramission
in your network,Explain two types of technology which you can use to secure data transmission in your
network? [2*3=6 marks]

Securing data on a network has many facets:


Authentication and authorization
Encryption
Virtual private networks (VPNs)
Wireless security
Network security devices
Malware protection
Students can choose any two options above with explanation

Question 14
Briefly explained the following: [3 * 2 = 6 marks]

 Wired and wireless networks


 UTP and fibre optic cables
 TCP 3-way handshaking

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 8
A wired network uses cables to connect devices, such as laptop or desktop computers, to the Internet or
another network. A wireless network allows devices to stay connected to the network but roam
untethered to any wires.
UTP (Unshielded Twisted Pair Cable) is a pair of unshielded wires wound around each other. This is the
cheapest form of cables available for networking purposes. It is mostly used in Local Area Network
(LAN) environments. The installation cost of the cable is very cheap as it is easy to install.

Fibre optic cables are mainly used in environments that are highly susceptible to noise and other
interferences. Since these cables carry light signals, they are not prone to any interference problems. These
cables are highly secure as they do not emit any external signals.
Fibre optic cables are available in different sizes with varying core and cladding diameters. But the most
commonly used fibre optic cable is the 62.5/125 micrometre. The diameter of the core is 62.5 micrometre
and that of the cladding is 125 micrometre.

The initiator sends the first packet of the 3-way handshake.


The SYN flag is set to indicate it is proposing an initial Sequence Number for traffic in that direction.
The receiver sends back the second packet of the 3-way handshake with the ASY & ACK flags set.
This packet proposes a sequence number in the opposite direction and acknowledges the first
packet.
The initiator sends the third packet of the 3-way handshake. It has the ACK flag set to acknowledge
the second packet.

Question 15
What is the VPN stands for? What is the usage of the VPN and also what is the advantage of the VPN?
[1 + 2 + 3 = 6 marks]

A virtual private network (VPN) uses the Internet to give users or branch offices secure access to a
company’s network resources
VPNs use encryption technology to ensure the communication is secure while travelling through the public
Internet
A “tunnel” is created between the VPN client and the VPN server
VPN servers can be configured on server OSs or they can be in the form of a dedicated device with the sole
purpose of handling VPN connections
VPN Benefits
VPN benefits include the following:
Enable mobile users to connect with corporate networks securely wherever an Internet connection is
available
Allow multiple sites to maintain permanent secure connections via the Internet instead of using expensive
WAN links
Reduce costs by using the ISP’s support services instead of paying for more expensive WAN support

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 9

Question 16
Discuss the models of Peer to Peer networks and Server Based networks. Draw diagrams to elaborate your
answer. [4 + 2 = 6 marks]

A network model defines how and where resources are shared and how access to these resources is
regulated
Fall into two major types
– Peer-to-peer network – most computers function as clients or servers (no centralized
control over who has access to network resources)
– Server-based network – certain computers take on specialized roles and function
mainly as servers, and ordinary users’ machines tend to function mainly as clients

4 marks for explanation and 2 marks for diagram

Question 17
You are working as a network technician at xyz company. You need to secure the physical access in to
server room in that company .What is the physical security best practice for this purpose?[6 mraks]

– Best practices to secure your network from physical assault:


– Ensure that rooms are available to house servers and equipment
– Rooms should have locks, adequate power receptacles, adequate cooling measures, and an
EMI-free environment
– If a suitable room is not available, locking cabinets can be purchased to house servers and
equipment in public areas
– Wiring from workstations to wiring cabinets should be inaccessible to eavesdropping
equipment
– Your physical security plan should include procedures for recovery from natural disasters
such as fire or floods

– Servers can generate a substantial amount of heat and need adequate cooling
– Lack of cooling can cause damage to hardware components
– Power to the server should be on a separate circuit from other electrical devices
– Verify power requirements for UPSs – some UPSs require special twist-lock outlet plugs
rated for high currents
– If you’re forced to place servers in a public access area, locking cabinets are a must

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 10

Question 18
a. What does DoS attack stand for? Explain how it works? (3 marks)
b. Explain about ping flood attack (3 marks)

[3+3= 6 marks]

• attempt to tie up network bandwidth or network services


• Three common types of DoS attacks focus on typing up a server or network service:
– Packet storms - use the UDP protocol to send UDP packets that have a spoofed (made up)
host address, causing the host to be unavailable to respond to other packets

– A ping flood sends a large number of ping packets to a host


• They cause the host to reply, typing up CPU cycles and bandwidth

Question 19
Draw the OSI network model with at least one protocol in each layer [6 marks]

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 11
Question 20
Explain any two of the following measures provided for securing data: [6 marks]
• Tunnelling
• Wireless security
• Access control
• Malware protection

 6in4 is an IPv6 transition mechanism for migrating from Internet Protocol version 4 (IPv4)
to IPv6. It is a tunnelling protocol that encapsulates IPv6 packets on specially
configured IPv4 links according to the specifications of RFC 4213. The IP protocol number
for 6in4 is 41, per IANA reservation

 Wireless security is the prevention of unauthorized access or damage to computers or data


using wireless networks, which include Wi-Fi networks. The most common type is Wi-
Fi security, which includes Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access
(WPA).

 Malware security protection provides that second vital layer of protection for your


computer or network. ... Good antivirus protection can also recognize — and warn against
— even previously unknown malware threats, based on technical features (such as
attempting to "hide" on a computer) that are characteristic of malware.

 Acess control: By using Router as a chockpoint we can contraol the packets which travel
through it as an access control system.It can be IPS or IDS

Question 21
You have been called as a network consultant for a new network design for the Smith company. They want
to shift the staff to work from home. The requirements of this design are summarized as follows:
• It has two buildings 12 miles apart
• They have 300 user workstations and 5 servers in each building
• Most of the staff are needed to be flexible working from home and/or in-office
• The company is aiming to increase the temporary staff in an ad-hoc network in a short amount of
time.

a) What devices, medium types, and topologies are you going to use for this network/Adhoc? [2 marks]
b) What type of technology will be provided to staff who wish to work from home? How can staff access
the company's file from home in a secure way?[3 marks]
c) What solution can you suggest for connecting the buildings across the street with the existing
building? [1 marks]
[2+3+1= 6 marks]

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15


Newsletter Title Page 12

a) For Ad-hoc ,Wireless is a good option. We need to use routers and also, AP
b) Use VPN, Tunnelling
c) Use Wireless or Fibre optic

END OF EXAMINATION PAPER

T222 Final Examination: ICT106 Data Communications and Networks Page 6 of 15

You might also like