SlideShare a Scribd company logo
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 2 of 18 
SECTION A 
OBJECTIVES (50 marks) INSTRUCTIONS: 
This section consists of FORTY (40) objective questions. Answer ALL questions in the answers booklet. 
1. 
Which is NOT a network operating system? [CLO 1] 
A. 
Windows NT 
B. 
Windows 2000 
C. 
Novel Netware 
D. 
Win XP 
2. 
A simple type of wireless networking that allows the formation of a small network with up to eight devices being connected at once. This statement refers to _____________________ . [CLO 2] 
A. 
Bluetooth 
B. 
Infared 
C. 
RFID 
D. 
3G
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 3 of 18 
3. 
Figure 5 below can be described as: [CLO 1] 
Figure 5 
A. 
Point-to-point refers to a connection restricted to two endpoints that sometimes referred as P2P 
B. 
Process where multiple analog message signals or digital data streams are combined into one signal over a shared medium 
C. 
Two-way simultaneous communication is possible e.g. telephone system. 
D. 
Distribution of audio and video content to a dispersed audience via radio, television. 
4. 
List 3 components of DNS. [CLO 1] 
A. 
Name servers, Resolvers, & Name space 
B. 
Name server, Name client, & Acknowledgement 
C. 
Resolvers, Name server, & Name client 
D. 
Acknowledgement, Name space, & Name Space
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 4 of 18 
5. 
“Service provider runs program on user’s computer that notifies service provider when IP address changes“ 
This statement describe about : [CLO 1] 
A. 
DHCP 
B. 
SMTP 
C. 
DDNS 
D. 
DNS 
6. 
A television company wants to provide a new sport channel from an European Channel for their customers. What is the type of transmission they need to setup for the service? [CLO 1] 
A. 
Point to point transmission 
B. 
Broadcasting transmission 
C. 
Bluetooth transmission 
D. 
Network transmission 
7. 
“A common connection point for devices in a network. Commonly used to connect segments of a LAN. This device contains multiple ports.” This statement refers to _____________________ . [CLO 2] 
A. 
Network Interface Card (NIC) 
B. 
Repeater 
C. 
Router 
D. 
Hub
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 5 of 18 
8. 
A new hardware item is using an IEEE 802.11b a wireless LAN. What is the maximum data rate specified for this WLAN? [CLO 2] 
A. 
10 mbps 
B. 
11 Mbps 
C. 
1000 Mbps 
D. 
16 Mbps 
9. 
Which is best to describe about Internet Service Provider ( ISP ) ? [CLO 1] 
A. 
Company that provides the connections and support to access the Internet. 
B. 
Worldwide collection of computer networks, cooperating with each other to exchange information using common standards. 
C. 
A multinational of networks. 
D. 
Exchange information in a variety of forms. 
10. 
Which protocol does DHCP use at the transport layer? [CLO 1] 
A. 
IP 
B. 
TCP 
C. 
UDP 
D. 
ARP
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 6 of 18 
11. 
There are two (2) types of Infrared which are point-to-point and _____________________. [CLO 2] 
A. 
Multicast 
B. 
Unicast 
C. 
Broadcast 
D. 
Broadband 
12. 
The Ethernet protocol defines many aspects of communication over the local network. Including message format, message size, timing, _____________________ and message patterns. [CLO 1] 
A. 
Segments 
B. 
Encoding 
C. 
Syntax 
D. 
Semantic 
13. 
The IEEE _______uses 5Ghz RF spectrum, and the IEEE ________ is the newest standard in development. [CLO 2] 
A. 
802.11n , 802.11g 
B. 
802.11g , 802.11b 
C. 
802.11a, 802.11g 
D. 
802.11a, 802.11n
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 7 of 18 
14. 
In the 802.11 standard, IEEE specifies ___________ type of access method. [CLO 2] 
A. 
CSMA/CA 
B. 
CSMA/CD 
C. 
Demand priority 
D. 
Beacon passing 
15. 
Which protocol does ping use? [CLO 3] 
A. 
TCP 
B. 
ARP 
C. 
ICMP 
D. 
BootP 
16. 
Figure 2 
Refer to Figure 2. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC? [CLO 3] 
A. 
The default gateway device is not operating 
B. 
There is a problem at the physical or data link layer 
C. 
The IP settings are not properly configured on the host. 
D. 
A router on the path to the destination host has gone down 
-- 127.0.0.1 ping statistics – 
4 packets transmitted, 0 packets received, 100% packet loss
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 8 of 18 
17. 
The synchronous modems are more costly than the asynchronous modems because_____________________ . [CLO1] 
A. 
They produce large volume of data 
B. 
They contain clock recovery circuits 
C. 
They transmit the data with stop and start bits 
D. 
They operate with a larger bandwidth 
18. 
Which of the following resolves domain names into IP addresses? [CLO 1] 
A. 
DNS 
B. 
FTP 
C. 
DHCP 
D. 
SNMP 
19. 
What protocol is used between E-Mail servers? [CLO 1] 
A. 
HTTP 
B. 
POP3 
C. 
SNMP 
D. 
SMTP
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 9 of 18 
20. 
In the TCP/IP model, which layer below deals with reliability, flow control and error correction? [CLO 1] 
A. 
Application 
B. 
Transport 
C. 
Internet 
D. 
Network access 
21. 
Which of the following is an example of a client/server application? [CLO 1] 
A. 
A NIC 
B. 
E-mail 
C. 
A spreadsheet 
D. 
Hard-drive utilites 
22. 
Which of the following is the most secured password? [CLO 2] 
A. 
12345ABC 
B. 
dolphins 
C. 
!t1z0GS557x^^L 
D. 
A1B2C3
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 10 of 18 
23. 
Which one of the following fiber connector supports full duplex Ethernet? 
[CLO 1] 
A. 
B. 
C. 
D. 
24. 
_________________ is a signal source used in fiber optics. [CLO 1] 
A. 
Light 
B. 
Radio 
C. 
Microwave 
D. 
Very low-frequency
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 11 of 18 
25. 
_________ is one of tools that used in wireless installation [CLO 2] 
A. 
Access Point ( AP ) 
B. 
BNC Connector 
C. 
Coaxial Cable 
D. 
RJ-58 
26. 
It is referring to something that is continuous and the data will have certain value at each of the signals. This explanation best describes _____________________ . [CLO 1] 
A. 
Digital signals 
B. 
Binary signals 
C. 
Analog signals 
D. 
Synchronous signals 
27. 
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch? [CLO 3] 
A. 
Port security 
B. 
RSTP 
C. 
STP 
D. 
BPDU
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 12 of 18 
28. 
SPX is a protocol stack for LAN and WAN designed by ___________________ network operating system. [CLO 1] 
A. 
Windows 
B. 
Novel 
C. 
Window 2000 
D. 
Linux 
29. 
Your help desk has informed you that it received an urgent call from the vice president last night requesting his logon ID and password. What type of attack is this? [CLO 2] 
A. 
Spoofing 
B. 
Replay attack 
C. 
Social engineering 
D. 
Trojan horse 
30. 
Which statement is true concerning wireless bridges? [CLO 2] 
A. 
Increase the strength of a wireless signal. 
B. 
Connects two networks with a wireless link. 
C. 
Stationary device that connects to a wireless LAN. 
D. 
Allows wireless clients to connect to a wired network.
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 13 of 18 
31. 
What should a network analyst actually do to implement the solution for the network problem? [CLO 3] 
i. Collect documentation about problem 
ii. Investigate & find someone that cause the problem 
iii. Perform change, replacement, or addition 
iv. Make backups 
A. 
i, ii, and iii 
B. 
i, iii, and iv 
C. 
ii, iii, and iv 
D. 
i, ii, iii, and iv 
32. 
By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they are. This is referring to ___________. [CLO 2] 
A. 
Pre-shared key 
B. 
open authentication 
C. 
Extensible authentication protocol 
D. 
Encryption 
33. 
Which method of attack is used to try to guess passwords or to decipher an encryption code? [CLO 2] 
A. 
Phishing 
B. 
Brute force 
C. 
Data manipulation 
D. 
Distributed denial of service
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 14 of 18 
34. 
Which one of the following firewall product consists of a firewall application that runs on network operating system (NOS) such as UNIX or WINDOW? 
[CLO 2] 
network A. 
Personal 
B. 
Integrated 
C. 
Server-based 
D. 
Appliance-based 
35. 
Daya Maju Company has newly extended their business. Another branch is opened about 1.5 KM from the main building. The CEO wants to share the information between 2 (two) buildings. What is the suitable transmission media to connect each building? [CLO2] 
A. 
UTP Cat 5e 
B. 
STP 
C. 
Coaxial 
D. 
Fiber optic 
36. 
You are responsible for securing the polytechnic wireless LAN using WPA. Which of the statement best describe the wireless security standard that is defined by WPA? [CLO 3] 
I. It includes authentication by PSK 
II. It requires use of an open authentication method 
III. It specifies use of a static encryption key that must be changed frequently to enhance security 
IV. It specifies the use of a dynamic encryption keys that change each time a client established a connection
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 15 of 18 
A. 
I and II 
B. 
II and III 
C. 
III and IV 
D 
I and IV 
37. 
For _________ to be effective, the attacker must be able to establish legitimacy with intended target or victim [CLO 2] 
A. 
Phiss 
B. 
Fishing 
C. 
Vishing 
D. 
Phishing 
38. 
Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of the below attack is occurring? 
[CLO 3] 
A. 
Trojan horse 
B. 
Access 
C. 
DoS 
D. 
Worm
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 16 of 18 
39. 
Using a 20-bit key as encryption is _________ more secured than using an 18-bit key [CLO 2] 
A. 
Two times 
B. 
Three times 
C. 
Four times 
D. 
Eight times 
40. 
Which of the following requires port-based authentication? [CLO2] 
A. 
Kerberos 
B. 
RADIUS 
C. 
WEP 
D. 
WPA
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 17 of 18 
SECTION B 
STRUCTURE QUESTIONS (50 marks) 
INSTRUCTION: 
This section consists of TWO (2) structures questions. Answer ALL the questions. 
QUESTION 1 
(a) Explain the main function for; [CLO 1] 
(8 marks) 
i. Session layer 
ii. Transport layer 
iii. Network layer 
iv. Physical layer 
(b) State FOUR (4) organizations that set standards for networking and explain each of the functions. [CLO 1] 
(4 marks) 
(c) Give detail explanation about 3 types of wireless technologies. [CLO 2] 
(8 marks) 
(d) You need to build peer to peer network using coaxial cable with ring 
topology at your office, find and state the suitable devices needed to setup the 
network? [CLO 2] 
(2 marks) 
(e) Bridges is one of the network devices that can be used to filter the packet in 
network, state two limitations of bridges? [CLO 2] 
(3 marks)
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 18 of 18 
QUESTION 2 
(a) Explain the following command used in MS DOS Prompt Windows: 
[CLO 3] 
(4 marks) 
i. ipconfig 
ii. ping 
(b) State five IEEE 802.11 Wireless Standards. [CLO 1] 
(5 marks) 
(c) Explain about the term carrier sense in CSMA/CD? [CLO 1] 
(3 marks) 
(d) Distinguish the three major topology (star, ring, and bus) based on 
the following criteria: [CLO 1] 
i. Information transfer 
ii. Troubleshoot (6 marks) 
(e) Why are protocols needed? [CLO 1] 
(2 marks) 
(f) One way to detect failures in the network is through ping. Write down the 
steps to detect a computer problem in network using Ping. [CLO 3] 
(5 marks)

More Related Content

What's hot

Uccn1003 -may2010_-_mid_term_01_-_part1of2
Uccn1003  -may2010_-_mid_term_01_-_part1of2Uccn1003  -may2010_-_mid_term_01_-_part1of2
Uccn1003 -may2010_-_mid_term_01_-_part1of2Shu Shin
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
tadeseguchi
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
Abhishek Jaguessar
 
Network
NetworkNetwork
Network
wacasr12
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
Ahmar Hashmi
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer Numericals
Manisha Keim
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
Carlos Humberto Rivera Mera
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017
Satyendra Singh
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
Krishna Mohan
 
Internet Technology (2017) Slip---Mumbai University
Internet Technology (2017) Slip---Mumbai University Internet Technology (2017) Slip---Mumbai University
Internet Technology (2017) Slip---Mumbai University
Satyendra Singh
 
Classful and classless addressing
Classful and classless addressingClassful and classless addressing
Classful and classless addressing
Sourav Jyoti Das
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
Manisha Keim
 
Human Interface & Multimedia
Human Interface & MultimediaHuman Interface & Multimedia
Human Interface & Multimedia
Tanat Tonguthaisri
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
Tanat Tonguthaisri
 
Ccna 3-discovery-4-0-module-4-100-
Ccna 3-discovery-4-0-module-4-100-Ccna 3-discovery-4-0-module-4-100-
Ccna 3-discovery-4-0-module-4-100-junkut3
 
About ip address
About ip addressAbout ip address
About ip address
gaurav koriya
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
Yaser Rahmati
 

What's hot (20)

Uccn1003 -may2010_-_mid_term_01_-_part1of2
Uccn1003  -may2010_-_mid_term_01_-_part1of2Uccn1003  -may2010_-_mid_term_01_-_part1of2
Uccn1003 -may2010_-_mid_term_01_-_part1of2
 
Network (FE)
Network (FE)Network (FE)
Network (FE)
 
CN Unit 3
CN Unit 3 CN Unit 3
CN Unit 3
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
Computer Networking Multiple Choice Questions
Computer Networking Multiple Choice QuestionsComputer Networking Multiple Choice Questions
Computer Networking Multiple Choice Questions
 
Network
NetworkNetwork
Network
 
02 Network Models
02 Network Models02 Network Models
02 Network Models
 
Transport Layer Numericals
Transport Layer NumericalsTransport Layer Numericals
Transport Layer Numericals
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
Internet Technology Practical (Mumbai University) -2017
Internet Technology Practical  (Mumbai University) -2017Internet Technology Practical  (Mumbai University) -2017
Internet Technology Practical (Mumbai University) -2017
 
Subnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examplesSubnetting (FLSM & VLSM) with examples
Subnetting (FLSM & VLSM) with examples
 
Internet Technology (2017) Slip---Mumbai University
Internet Technology (2017) Slip---Mumbai University Internet Technology (2017) Slip---Mumbai University
Internet Technology (2017) Slip---Mumbai University
 
Classful and classless addressing
Classful and classless addressingClassful and classless addressing
Classful and classless addressing
 
Network Layer Numericals
Network Layer NumericalsNetwork Layer Numericals
Network Layer Numericals
 
Human Interface & Multimedia
Human Interface & MultimediaHuman Interface & Multimedia
Human Interface & Multimedia
 
Network (IP)
Network (IP)Network (IP)
Network (IP)
 
Ccna 3-discovery-4-0-module-4-100-
Ccna 3-discovery-4-0-module-4-100-Ccna 3-discovery-4-0-module-4-100-
Ccna 3-discovery-4-0-module-4-100-
 
About ip address
About ip addressAbout ip address
About ip address
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
 

Viewers also liked

Exercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With SolutionsExercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With Solutions
Felipe Suarez
 
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALFP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINAL
Syahriha Ruslan
 
FP305 data structure PAPER FINAL SEM 3
FP305 data structure PAPER FINAL SEM 3FP305 data structure PAPER FINAL SEM 3
FP305 data structure PAPER FINAL SEM 3
Syahriha Ruslan
 
Subnet questions with ans(networking)
Subnet questions with ans(networking)Subnet questions with ans(networking)
Subnet questions with ans(networking)welcometofacebook
 
FP 301 OOP FINAL PAPER JUNE 2013
FP 301 OOP FINAL PAPER JUNE 2013FP 301 OOP FINAL PAPER JUNE 2013
FP 301 OOP FINAL PAPER JUNE 2013
Syahriha Ruslan
 
FP305 data structure june 2012
FP305   data structure june 2012FP305   data structure june 2012
FP305 data structure june 2012
Syahriha Ruslan
 
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMINGFINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMINGAmira Dolce Farhana
 
FP305 data structure
FP305     data structure FP305     data structure
FP305 data structure
Syahriha Ruslan
 
FP 301 OOP FINAL PAPER
FP 301 OOP FINAL PAPER FP 301 OOP FINAL PAPER
FP 301 OOP FINAL PAPER
Syahriha Ruslan
 
Final paper FN511 Switching & Routing
Final paper FN511 Switching & RoutingFinal paper FN511 Switching & Routing
Final paper FN511 Switching & Routing
Amira Dolce Farhana
 
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
OBJECT ORIENTED ROGRAMMING With Question And Answer  FullOBJECT ORIENTED ROGRAMMING With Question And Answer  Full
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
Manas Rai
 
Problem Based Task 1
Problem Based Task 1Problem Based Task 1
Problem Based Task 1rozimm78
 
Embedded system (Chapter 2) part 2
Embedded system (Chapter 2) part 2Embedded system (Chapter 2) part 2
Embedded system (Chapter 2) part 2Ikhwan_Fakrudin
 

Viewers also liked (14)

Exercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With SolutionsExercises TCP/IP Networking With Solutions
Exercises TCP/IP Networking With Solutions
 
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALFP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINAL
 
FP305 data structure PAPER FINAL SEM 3
FP305 data structure PAPER FINAL SEM 3FP305 data structure PAPER FINAL SEM 3
FP305 data structure PAPER FINAL SEM 3
 
Subnet questions with ans(networking)
Subnet questions with ans(networking)Subnet questions with ans(networking)
Subnet questions with ans(networking)
 
FP 301 OOP FINAL PAPER JUNE 2013
FP 301 OOP FINAL PAPER JUNE 2013FP 301 OOP FINAL PAPER JUNE 2013
FP 301 OOP FINAL PAPER JUNE 2013
 
FP305 data structure june 2012
FP305   data structure june 2012FP305   data structure june 2012
FP305 data structure june 2012
 
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMINGFINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
 
FP305 data structure
FP305     data structure FP305     data structure
FP305 data structure
 
Ism
IsmIsm
Ism
 
FP 301 OOP FINAL PAPER
FP 301 OOP FINAL PAPER FP 301 OOP FINAL PAPER
FP 301 OOP FINAL PAPER
 
Final paper FN511 Switching & Routing
Final paper FN511 Switching & RoutingFinal paper FN511 Switching & Routing
Final paper FN511 Switching & Routing
 
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
OBJECT ORIENTED ROGRAMMING With Question And Answer  FullOBJECT ORIENTED ROGRAMMING With Question And Answer  Full
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
 
Problem Based Task 1
Problem Based Task 1Problem Based Task 1
Problem Based Task 1
 
Embedded system (Chapter 2) part 2
Embedded system (Chapter 2) part 2Embedded system (Chapter 2) part 2
Embedded system (Chapter 2) part 2
 

Similar to FP 303 COMPUTER NETWORK PAPER FINAL Q

FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES Amira Dolce Farhana
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
bunyansaturnina
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
Neda Shekarkhar
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
cravennichole326
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
elbanglis
 
Implementation of a bluetooth attack on controller area network
Implementation of a bluetooth attack on controller area networkImplementation of a bluetooth attack on controller area network
Implementation of a bluetooth attack on controller area network
nooriasukmaningtyas
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A Model Of An Integrated Unified Communication Network Using Public Switched ...
A Model Of An Integrated Unified Communication Network Using Public Switched ...A Model Of An Integrated Unified Communication Network Using Public Switched ...
A Model Of An Integrated Unified Communication Network Using Public Switched ...
Becky Gilbert
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
ManojGowdaKb
 
Connecting network
Connecting networkConnecting network
Connecting network
imacomobio
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptx
imacomobio
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
VUPHUONGTHAO9
 
Final project report
Final project reportFinal project report
Final project report
RaziaSultanaHimu
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
tadeseguchi
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
Total Assignment Help
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
ssuser2cc0d4
 
資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)
逸 張
 
Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docx
ssuser774ad41
 

Similar to FP 303 COMPUTER NETWORK PAPER FINAL Q (20)

FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES FINAL PAPER FN311 INTERNET SERVICES
FINAL PAPER FN311 INTERNET SERVICES
 
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxPage1 of 101. Prior tocellular radio, mobile radio and telep.docx
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
Ccna guide
Ccna guideCcna guide
Ccna guide
 
Implementation of a bluetooth attack on controller area network
Implementation of a bluetooth attack on controller area networkImplementation of a bluetooth attack on controller area network
Implementation of a bluetooth attack on controller area network
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Model Of An Integrated Unified Communication Network Using Public Switched ...
A Model Of An Integrated Unified Communication Network Using Public Switched ...A Model Of An Integrated Unified Communication Network Using Public Switched ...
A Model Of An Integrated Unified Communication Network Using Public Switched ...
 
Rashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptxRashmi T S-Intrenship PPT.pptx
Rashmi T S-Intrenship PPT.pptx
 
Connecting network
Connecting networkConnecting network
Connecting network
 
Connecting network.pptx
Connecting network.pptxConnecting network.pptx
Connecting network.pptx
 
CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
Set5 ict-question
Set5 ict-questionSet5 ict-question
Set5 ict-question
 
Final project report
Final project reportFinal project report
Final project report
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
Network assignment on project design
Network assignment on project designNetwork assignment on project design
Network assignment on project design
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)資管所網路補充考卷(適用交大、政大、中山、成大)
資管所網路補充考卷(適用交大、政大、中山、成大)
 
Question 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docxQuestion 1The OSI model has seven layers where each layer pe.docx
Question 1The OSI model has seven layers where each layer pe.docx
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 

FP 303 COMPUTER NETWORK PAPER FINAL Q

  • 1. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 2 of 18 SECTION A OBJECTIVES (50 marks) INSTRUCTIONS: This section consists of FORTY (40) objective questions. Answer ALL questions in the answers booklet. 1. Which is NOT a network operating system? [CLO 1] A. Windows NT B. Windows 2000 C. Novel Netware D. Win XP 2. A simple type of wireless networking that allows the formation of a small network with up to eight devices being connected at once. This statement refers to _____________________ . [CLO 2] A. Bluetooth B. Infared C. RFID D. 3G
  • 2. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 3 of 18 3. Figure 5 below can be described as: [CLO 1] Figure 5 A. Point-to-point refers to a connection restricted to two endpoints that sometimes referred as P2P B. Process where multiple analog message signals or digital data streams are combined into one signal over a shared medium C. Two-way simultaneous communication is possible e.g. telephone system. D. Distribution of audio and video content to a dispersed audience via radio, television. 4. List 3 components of DNS. [CLO 1] A. Name servers, Resolvers, & Name space B. Name server, Name client, & Acknowledgement C. Resolvers, Name server, & Name client D. Acknowledgement, Name space, & Name Space
  • 3. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 4 of 18 5. “Service provider runs program on user’s computer that notifies service provider when IP address changes“ This statement describe about : [CLO 1] A. DHCP B. SMTP C. DDNS D. DNS 6. A television company wants to provide a new sport channel from an European Channel for their customers. What is the type of transmission they need to setup for the service? [CLO 1] A. Point to point transmission B. Broadcasting transmission C. Bluetooth transmission D. Network transmission 7. “A common connection point for devices in a network. Commonly used to connect segments of a LAN. This device contains multiple ports.” This statement refers to _____________________ . [CLO 2] A. Network Interface Card (NIC) B. Repeater C. Router D. Hub
  • 4. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 5 of 18 8. A new hardware item is using an IEEE 802.11b a wireless LAN. What is the maximum data rate specified for this WLAN? [CLO 2] A. 10 mbps B. 11 Mbps C. 1000 Mbps D. 16 Mbps 9. Which is best to describe about Internet Service Provider ( ISP ) ? [CLO 1] A. Company that provides the connections and support to access the Internet. B. Worldwide collection of computer networks, cooperating with each other to exchange information using common standards. C. A multinational of networks. D. Exchange information in a variety of forms. 10. Which protocol does DHCP use at the transport layer? [CLO 1] A. IP B. TCP C. UDP D. ARP
  • 5. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 6 of 18 11. There are two (2) types of Infrared which are point-to-point and _____________________. [CLO 2] A. Multicast B. Unicast C. Broadcast D. Broadband 12. The Ethernet protocol defines many aspects of communication over the local network. Including message format, message size, timing, _____________________ and message patterns. [CLO 1] A. Segments B. Encoding C. Syntax D. Semantic 13. The IEEE _______uses 5Ghz RF spectrum, and the IEEE ________ is the newest standard in development. [CLO 2] A. 802.11n , 802.11g B. 802.11g , 802.11b C. 802.11a, 802.11g D. 802.11a, 802.11n
  • 6. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 7 of 18 14. In the 802.11 standard, IEEE specifies ___________ type of access method. [CLO 2] A. CSMA/CA B. CSMA/CD C. Demand priority D. Beacon passing 15. Which protocol does ping use? [CLO 3] A. TCP B. ARP C. ICMP D. BootP 16. Figure 2 Refer to Figure 2. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC? [CLO 3] A. The default gateway device is not operating B. There is a problem at the physical or data link layer C. The IP settings are not properly configured on the host. D. A router on the path to the destination host has gone down -- 127.0.0.1 ping statistics – 4 packets transmitted, 0 packets received, 100% packet loss
  • 7. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 8 of 18 17. The synchronous modems are more costly than the asynchronous modems because_____________________ . [CLO1] A. They produce large volume of data B. They contain clock recovery circuits C. They transmit the data with stop and start bits D. They operate with a larger bandwidth 18. Which of the following resolves domain names into IP addresses? [CLO 1] A. DNS B. FTP C. DHCP D. SNMP 19. What protocol is used between E-Mail servers? [CLO 1] A. HTTP B. POP3 C. SNMP D. SMTP
  • 8. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 9 of 18 20. In the TCP/IP model, which layer below deals with reliability, flow control and error correction? [CLO 1] A. Application B. Transport C. Internet D. Network access 21. Which of the following is an example of a client/server application? [CLO 1] A. A NIC B. E-mail C. A spreadsheet D. Hard-drive utilites 22. Which of the following is the most secured password? [CLO 2] A. 12345ABC B. dolphins C. !t1z0GS557x^^L D. A1B2C3
  • 9. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 10 of 18 23. Which one of the following fiber connector supports full duplex Ethernet? [CLO 1] A. B. C. D. 24. _________________ is a signal source used in fiber optics. [CLO 1] A. Light B. Radio C. Microwave D. Very low-frequency
  • 10. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 11 of 18 25. _________ is one of tools that used in wireless installation [CLO 2] A. Access Point ( AP ) B. BNC Connector C. Coaxial Cable D. RJ-58 26. It is referring to something that is continuous and the data will have certain value at each of the signals. This explanation best describes _____________________ . [CLO 1] A. Digital signals B. Binary signals C. Analog signals D. Synchronous signals 27. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch? [CLO 3] A. Port security B. RSTP C. STP D. BPDU
  • 11. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 12 of 18 28. SPX is a protocol stack for LAN and WAN designed by ___________________ network operating system. [CLO 1] A. Windows B. Novel C. Window 2000 D. Linux 29. Your help desk has informed you that it received an urgent call from the vice president last night requesting his logon ID and password. What type of attack is this? [CLO 2] A. Spoofing B. Replay attack C. Social engineering D. Trojan horse 30. Which statement is true concerning wireless bridges? [CLO 2] A. Increase the strength of a wireless signal. B. Connects two networks with a wireless link. C. Stationary device that connects to a wireless LAN. D. Allows wireless clients to connect to a wired network.
  • 12. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 13 of 18 31. What should a network analyst actually do to implement the solution for the network problem? [CLO 3] i. Collect documentation about problem ii. Investigate & find someone that cause the problem iii. Perform change, replacement, or addition iv. Make backups A. i, ii, and iii B. i, iii, and iv C. ii, iii, and iv D. i, ii, iii, and iv 32. By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they are. This is referring to ___________. [CLO 2] A. Pre-shared key B. open authentication C. Extensible authentication protocol D. Encryption 33. Which method of attack is used to try to guess passwords or to decipher an encryption code? [CLO 2] A. Phishing B. Brute force C. Data manipulation D. Distributed denial of service
  • 13. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 14 of 18 34. Which one of the following firewall product consists of a firewall application that runs on network operating system (NOS) such as UNIX or WINDOW? [CLO 2] network A. Personal B. Integrated C. Server-based D. Appliance-based 35. Daya Maju Company has newly extended their business. Another branch is opened about 1.5 KM from the main building. The CEO wants to share the information between 2 (two) buildings. What is the suitable transmission media to connect each building? [CLO2] A. UTP Cat 5e B. STP C. Coaxial D. Fiber optic 36. You are responsible for securing the polytechnic wireless LAN using WPA. Which of the statement best describe the wireless security standard that is defined by WPA? [CLO 3] I. It includes authentication by PSK II. It requires use of an open authentication method III. It specifies use of a static encryption key that must be changed frequently to enhance security IV. It specifies the use of a dynamic encryption keys that change each time a client established a connection
  • 14. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 15 of 18 A. I and II B. II and III C. III and IV D I and IV 37. For _________ to be effective, the attacker must be able to establish legitimacy with intended target or victim [CLO 2] A. Phiss B. Fishing C. Vishing D. Phishing 38. Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of the below attack is occurring? [CLO 3] A. Trojan horse B. Access C. DoS D. Worm
  • 15. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 16 of 18 39. Using a 20-bit key as encryption is _________ more secured than using an 18-bit key [CLO 2] A. Two times B. Three times C. Four times D. Eight times 40. Which of the following requires port-based authentication? [CLO2] A. Kerberos B. RADIUS C. WEP D. WPA
  • 16. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 17 of 18 SECTION B STRUCTURE QUESTIONS (50 marks) INSTRUCTION: This section consists of TWO (2) structures questions. Answer ALL the questions. QUESTION 1 (a) Explain the main function for; [CLO 1] (8 marks) i. Session layer ii. Transport layer iii. Network layer iv. Physical layer (b) State FOUR (4) organizations that set standards for networking and explain each of the functions. [CLO 1] (4 marks) (c) Give detail explanation about 3 types of wireless technologies. [CLO 2] (8 marks) (d) You need to build peer to peer network using coaxial cable with ring topology at your office, find and state the suitable devices needed to setup the network? [CLO 2] (2 marks) (e) Bridges is one of the network devices that can be used to filter the packet in network, state two limitations of bridges? [CLO 2] (3 marks)
  • 17. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 18 of 18 QUESTION 2 (a) Explain the following command used in MS DOS Prompt Windows: [CLO 3] (4 marks) i. ipconfig ii. ping (b) State five IEEE 802.11 Wireless Standards. [CLO 1] (5 marks) (c) Explain about the term carrier sense in CSMA/CD? [CLO 1] (3 marks) (d) Distinguish the three major topology (star, ring, and bus) based on the following criteria: [CLO 1] i. Information transfer ii. Troubleshoot (6 marks) (e) Why are protocols needed? [CLO 1] (2 marks) (f) One way to detect failures in the network is through ping. Write down the steps to detect a computer problem in network using Ping. [CLO 3] (5 marks)