This document contains a 40 question objective exam on computer networks. The exam covers topics like network operating systems, wireless networking standards, networking components, protocols, network attacks and security. It tests the student's understanding of fundamental networking concepts as well as practical scenarios involving networking tasks and troubleshooting problems.
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
Here is the presentation for Transport Layer Questions from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
hey! everybody this is my third and last pps of this month and i ensure that this will definately guide you about ip address and its contain and what r all different kinds of ip r available with questions tags specified also. all thoes who u cannot find on any search engine u can get all stuff here!!!!!!
hope u loved it ???!@@@#
A computer network or data network is a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other using a data link. The connections between nodes are established using either cable media or wireless media.
Here is the presentation for Transport Layer Questions from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
Here is the presentation for Network Layer Numericals from the book Andrew S. Tanenbaum (Computer Networks) and B A Forouzan ( Data Communication and Networking)
hey! everybody this is my third and last pps of this month and i ensure that this will definately guide you about ip address and its contain and what r all different kinds of ip r available with questions tags specified also. all thoes who u cannot find on any search engine u can get all stuff here!!!!!!
hope u loved it ???!@@@#
Page1 of 101. Prior tocellular radio, mobile radio and telep.docxbunyansaturnina
Page1 of 10
1. Prior tocellular radio, mobile radio and telephoneservices required:
A. a high-power transmitter/receiver
B. multiple transmitters/receivers
C. only one or two dedicated channels
D. that many channels be used, which exceed the frequency capacity
2. When using cellular networks, __________.
A. a single base station can serve multiple cells
B. adjacent cells must use the same frequencies
C. adjacent cells are assigned different frequencies
D. non-adjacent cells are assigned different frequencies
3. Theideal design for cells in a cellular network is a hexagonal shape because _____.
A. this makes enforcement of shapes easier
B. this is the easiest to implement
C. this makes all frequencies available to all cells
D. this makes the distance to all adjacent cells thesame
4. When a mobile unit moves, it may connect with a different base station. This action is called
____________.
A. a handoff
C. a reconfiguration
B. a transfer
D. a dropped signal
5. Which of the following is NOT one of theways that frequency spectrum can be divided among
active users?
A. frequency division multiple access
C. code division multiple access
B. time division multipleaccess
D. cell division multiple access
6. Because of the limited frequencies available, a key design element of any cellular system is to
___________.
A. usesmall cells
B. employ multipleaccess
C. limit the number of users at one time
D. use as many frequencies as possible
7. The Wireless Application Protocol (WAP) is:
A. proprietary protocol developed in theUSA for wireless security
B. dependent on the specific network technologies employed
C. an Internet standard that replaces HTML, HTTP, and XML
D. designed to overcome many of the limitations hindering acceptance of mobile data services
Page2 of 10
Page3 of 10
8. Which of the following is NOT one of thecomponents of the WAP specification?
A. A framework for wireless telephony applications
B. A full-featured communications protocol stack
C. A programming model based on the WWW
D. A markup languageadhering to XML
9. The WAP Programming Model uses a ________that acts as a proxy server for thewireless domain.
A. translator
C. gateway
B. WAP server
D. decoder
10. For a given system, multiple access is based on _______.
A. TDMA
C. CDMA
B. FDMA
D. all of the above
11. Important objectives of computer security include:
A. confidentiality
C. availability
B. integrity
D. all of the above
12. One type of attack on the security of a computer system or network that impacts the availability
of a system (e.g. destruction of a resourcein the system) is referred to as ___________.
A. incapacitation
C. modification
B. interception
D. all of the above
13. Thetype of attack on communications lines and networks known as traffic analysis belongs to the
general category of ____________.
A. active attacks
C.
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxcravennichole326
Exam IT 505
Multiple Choice (20 questions , 2 points each)
Please Submit a word document of your exam. Please DO NOT repeat the questions. Only submit your answers for example 1.A, 2. B……Ect
1. Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate B. high-speed interface
C. distributed access D. extended distance
2. Problems with using a single Local Area Network (LAN) to interconnect devices
on a premise include:
A. insufficient reliability, limited capacity, and inappropriate network
interconnection devices
B. insufficient reliability, limited capacity, and limited distances
C. insufficient reliability, limited distances, and inappropriate network
interconnection devices
D. limited distances, limited capacity, and inappropriate network
interconnection devices
3. Which of following is NOT one of the designs that determines data rate and
distance?
A. the number of senders B. the number of receivers
C. transmission impairment D. bandwidth
4. The fact that signal strength falls off with distance is called ________________.
A. bandwidth B. attenuation
C. resistance D. propagation
5. Which of the following is NOT one of the distinguishing characteristics for optical
fiber cables compared with twisted pair or coaxial cables?
A. greater capacity B. lower attenuation
C. electromagnetic isolation D. heavier weight
6.________ is a set of function and call programs that allow clients and servers to intercommunicate.
A. IaaS B. SQL C. API D. Middleware
7. A computer that houses information for manipulation by networked clients is a __________.
A. server B. minicomputer C. PaaS D. broker
8. ________ is software that improves connectivity between a client application and a server.
A. SQL B. API C. Middleware D. SAP
9. The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds B. its high overhead
C. the extensive use of in-band signaling D. the increasing reliability of networks
10. All Frame Relay nodes contain which of the following protocols?
A. LAPB B. LAPD
C. LAPF Core D. LAPF Control
11. The technique employed by Frame Relay is called __________.
A. inband signaling B. outband signaling
C. common channel signaling D. open shortest path first routing
12. In ATM, the basic transmission unit is the ________.
A. frame B. cell
C. packet D. segment
13. When using ATM, which of the following is NOT one of the advantages for the
use of virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C.
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxelbanglis
Exam IT 505
Multiple Choice (20 questions , 2 points each)
Please Submit a word document of your exam. Please DO NOT repeat the questions. Only submit your answers for example 1.A, 2. B……Ect
1. Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate B. high-speed interface
C. distributed access D. extended distance
2. Problems with using a single Local Area Network (LAN) to interconnect devices
on a premise include:
A. insufficient reliability, limited capacity, and inappropriate network
interconnection devices
B. insufficient reliability, limited capacity, and limited distances
C. insufficient reliability, limited distances, and inappropriate network
interconnection devices
D. limited distances, limited capacity, and inappropriate network
interconnection devices
3. Which of following is NOT one of the designs that determines data rate and
distance?
A. the number of senders B. the number of receivers
C. transmission impairment D. bandwidth
4. The fact that signal strength falls off with distance is called ________________.
A. bandwidth B. attenuation
C. resistance D. propagation
5. Which of the following is NOT one of the distinguishing characteristics for optical
fiber cables compared with twisted pair or coaxial cables?
A. greater capacity B. lower attenuation
C. electromagnetic isolation D. heavier weight
6.________ is a set of function and call programs that allow clients and servers to intercommunicate.
A. IaaS B. SQL C. API D. Middleware
7. A computer that houses information for manipulation by networked clients is a __________.
A. server B. minicomputer C. PaaS D. broker
8. ________ is software that improves connectivity between a client application and a server.
A. SQL B. API C. Middleware D. SAP
9. The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds B. its high overhead
C. the extensive use of in-band signaling D. the increasing reliability of networks
10. All Frame Relay nodes contain which of the following protocols?
A. LAPB B. LAPD
C. LAPF Core D. LAPF Control
11. The technique employed by Frame Relay is called __________.
A. inband signaling B. outband signaling
C. common channel signaling D. open shortest path first routing
12. In ATM, the basic transmission unit is the ________.
A. frame B. cell
C. packet D. segment
13. When using ATM, which of the following is NOT one of the advantages for the
use of virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C ...
Implementation of a bluetooth attack on controller area networknooriasukmaningtyas
In this paper a general overview of the vulnerability of the controller area network (CAN) bus is presented and a practical short-range attack is proposed. There are more and more potential attacks on the CAN bus, which may cause leakage of information and thereby there may be danger for safe driving. The attack combines several techniques, such as how to update a node firmware using a Bluetooth module and inject a priority fake frame, in order to block the legitimate messages.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Fast Ethernet cables are uses for interdependent connection; on the other hand, serial cables are used for the connection of central organization router with department routers.
Question 1The OSI model has seven layers where each layer pe.docxssuser774ad41
Question 1
The OSI model has seven layers where each layer performs various functions that are integrated to ensure that the network performs efficiently. The layers are arranged as follows from the bottom to the top layer:
a) The physical layer:
This is the first layer of the model and it has several functions. These are:
i. Bit synchronization:
The physical layer is very crucial in terms of timing and synchronizing the period and the amount of bits that are transferred between the sender and the recipient of a message. It uses a clock to ensure accurate and reliable synchronization.
ii. Bit rate control:
The physical layer also controls the bandwidth in a network by determining the number of bits that are transferred over the network channel within the specified time which is seconds in most cases.
iii. Physical topologies:
The physical layer also determines the design which is used to connect all the devices that make up the network. These include routers, switches, hubs and other equipment used in a network.
iv. Transmission mode:
The connection of devices in the physical layer determines how data between the communicating devices flows. There are various transmission modes which are supported by the physical layer. These are simplex, half-duplex and full-duplex. In simplex, data flows in only one direction. In half-duplex data can flow in both directions but not simultaneously. In the full-duplex transmission mode, data flows in both directions at the same time.
b) Data Link Layer:
This is the second layer of the OSI model. Some of its functions include:
i. Framing:
Data that is being transmitted is segmented into pieces known as frames to make the transmission process easier. The Data link layer facilitates the framing process to ensure that the receiver acquires the accurate and relevant information within the shortest possible time.
ii. Physical addressing:
The frames require adequate data regarding the sender and the recipient to ensure that a message does not fail to reach the intended recipient. The Data Link Layer achieves this by adding a MAC address to the header section of each of the frames that are being transmitted.
iii. Error control:
The use of frames in the DLL enables the network layer to detect when frames do not reach the intended recipient. In return, the DLL is able to retransmit the lost or damaged frames using the details in the headers.
iv. Flow control:
The DLL ensures that the flow of data between the sender and the recipient is constant. This techniques ensures the stability of the communication channel that is established when transmitting data.
v. Access control:
The assigning of MAC addresses to all the computers in a network enables the Data Link Layer to determine the machines with access to certain resources.
c) Network layer:
The functions of the third OSI model layer are:
i. Routing:
The network layer assesses the different routes that a frame can use to reach its recipient and it chooses the best rou ...
Similar to FP 303 COMPUTER NETWORK PAPER FINAL Q (20)
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 2 of 18
SECTION A
OBJECTIVES (50 marks) INSTRUCTIONS:
This section consists of FORTY (40) objective questions. Answer ALL questions in the answers booklet.
1.
Which is NOT a network operating system? [CLO 1]
A.
Windows NT
B.
Windows 2000
C.
Novel Netware
D.
Win XP
2.
A simple type of wireless networking that allows the formation of a small network with up to eight devices being connected at once. This statement refers to _____________________ . [CLO 2]
A.
Bluetooth
B.
Infared
C.
RFID
D.
3G
2. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 3 of 18
3.
Figure 5 below can be described as: [CLO 1]
Figure 5
A.
Point-to-point refers to a connection restricted to two endpoints that sometimes referred as P2P
B.
Process where multiple analog message signals or digital data streams are combined into one signal over a shared medium
C.
Two-way simultaneous communication is possible e.g. telephone system.
D.
Distribution of audio and video content to a dispersed audience via radio, television.
4.
List 3 components of DNS. [CLO 1]
A.
Name servers, Resolvers, & Name space
B.
Name server, Name client, & Acknowledgement
C.
Resolvers, Name server, & Name client
D.
Acknowledgement, Name space, & Name Space
3. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 4 of 18
5.
“Service provider runs program on user’s computer that notifies service provider when IP address changes“
This statement describe about : [CLO 1]
A.
DHCP
B.
SMTP
C.
DDNS
D.
DNS
6.
A television company wants to provide a new sport channel from an European Channel for their customers. What is the type of transmission they need to setup for the service? [CLO 1]
A.
Point to point transmission
B.
Broadcasting transmission
C.
Bluetooth transmission
D.
Network transmission
7.
“A common connection point for devices in a network. Commonly used to connect segments of a LAN. This device contains multiple ports.” This statement refers to _____________________ . [CLO 2]
A.
Network Interface Card (NIC)
B.
Repeater
C.
Router
D.
Hub
4. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 5 of 18
8.
A new hardware item is using an IEEE 802.11b a wireless LAN. What is the maximum data rate specified for this WLAN? [CLO 2]
A.
10 mbps
B.
11 Mbps
C.
1000 Mbps
D.
16 Mbps
9.
Which is best to describe about Internet Service Provider ( ISP ) ? [CLO 1]
A.
Company that provides the connections and support to access the Internet.
B.
Worldwide collection of computer networks, cooperating with each other to exchange information using common standards.
C.
A multinational of networks.
D.
Exchange information in a variety of forms.
10.
Which protocol does DHCP use at the transport layer? [CLO 1]
A.
IP
B.
TCP
C.
UDP
D.
ARP
5. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 6 of 18
11.
There are two (2) types of Infrared which are point-to-point and _____________________. [CLO 2]
A.
Multicast
B.
Unicast
C.
Broadcast
D.
Broadband
12.
The Ethernet protocol defines many aspects of communication over the local network. Including message format, message size, timing, _____________________ and message patterns. [CLO 1]
A.
Segments
B.
Encoding
C.
Syntax
D.
Semantic
13.
The IEEE _______uses 5Ghz RF spectrum, and the IEEE ________ is the newest standard in development. [CLO 2]
A.
802.11n , 802.11g
B.
802.11g , 802.11b
C.
802.11a, 802.11g
D.
802.11a, 802.11n
6. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 7 of 18
14.
In the 802.11 standard, IEEE specifies ___________ type of access method. [CLO 2]
A.
CSMA/CA
B.
CSMA/CD
C.
Demand priority
D.
Beacon passing
15.
Which protocol does ping use? [CLO 3]
A.
TCP
B.
ARP
C.
ICMP
D.
BootP
16.
Figure 2
Refer to Figure 2. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC? [CLO 3]
A.
The default gateway device is not operating
B.
There is a problem at the physical or data link layer
C.
The IP settings are not properly configured on the host.
D.
A router on the path to the destination host has gone down
-- 127.0.0.1 ping statistics –
4 packets transmitted, 0 packets received, 100% packet loss
7. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 8 of 18
17.
The synchronous modems are more costly than the asynchronous modems because_____________________ . [CLO1]
A.
They produce large volume of data
B.
They contain clock recovery circuits
C.
They transmit the data with stop and start bits
D.
They operate with a larger bandwidth
18.
Which of the following resolves domain names into IP addresses? [CLO 1]
A.
DNS
B.
FTP
C.
DHCP
D.
SNMP
19.
What protocol is used between E-Mail servers? [CLO 1]
A.
HTTP
B.
POP3
C.
SNMP
D.
SMTP
8. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 9 of 18
20.
In the TCP/IP model, which layer below deals with reliability, flow control and error correction? [CLO 1]
A.
Application
B.
Transport
C.
Internet
D.
Network access
21.
Which of the following is an example of a client/server application? [CLO 1]
A.
A NIC
B.
E-mail
C.
A spreadsheet
D.
Hard-drive utilites
22.
Which of the following is the most secured password? [CLO 2]
A.
12345ABC
B.
dolphins
C.
!t1z0GS557x^^L
D.
A1B2C3
9. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 10 of 18
23.
Which one of the following fiber connector supports full duplex Ethernet?
[CLO 1]
A.
B.
C.
D.
24.
_________________ is a signal source used in fiber optics. [CLO 1]
A.
Light
B.
Radio
C.
Microwave
D.
Very low-frequency
10. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 11 of 18
25.
_________ is one of tools that used in wireless installation [CLO 2]
A.
Access Point ( AP )
B.
BNC Connector
C.
Coaxial Cable
D.
RJ-58
26.
It is referring to something that is continuous and the data will have certain value at each of the signals. This explanation best describes _____________________ . [CLO 1]
A.
Digital signals
B.
Binary signals
C.
Analog signals
D.
Synchronous signals
27.
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch? [CLO 3]
A.
Port security
B.
RSTP
C.
STP
D.
BPDU
11. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 12 of 18
28.
SPX is a protocol stack for LAN and WAN designed by ___________________ network operating system. [CLO 1]
A.
Windows
B.
Novel
C.
Window 2000
D.
Linux
29.
Your help desk has informed you that it received an urgent call from the vice president last night requesting his logon ID and password. What type of attack is this? [CLO 2]
A.
Spoofing
B.
Replay attack
C.
Social engineering
D.
Trojan horse
30.
Which statement is true concerning wireless bridges? [CLO 2]
A.
Increase the strength of a wireless signal.
B.
Connects two networks with a wireless link.
C.
Stationary device that connects to a wireless LAN.
D.
Allows wireless clients to connect to a wired network.
12. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 13 of 18
31.
What should a network analyst actually do to implement the solution for the network problem? [CLO 3]
i. Collect documentation about problem
ii. Investigate & find someone that cause the problem
iii. Perform change, replacement, or addition
iv. Make backups
A.
i, ii, and iii
B.
i, iii, and iv
C.
ii, iii, and iv
D.
i, ii, iii, and iv
32.
By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they are. This is referring to ___________. [CLO 2]
A.
Pre-shared key
B.
open authentication
C.
Extensible authentication protocol
D.
Encryption
33.
Which method of attack is used to try to guess passwords or to decipher an encryption code? [CLO 2]
A.
Phishing
B.
Brute force
C.
Data manipulation
D.
Distributed denial of service
13. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 14 of 18
34.
Which one of the following firewall product consists of a firewall application that runs on network operating system (NOS) such as UNIX or WINDOW?
[CLO 2]
network A.
Personal
B.
Integrated
C.
Server-based
D.
Appliance-based
35.
Daya Maju Company has newly extended their business. Another branch is opened about 1.5 KM from the main building. The CEO wants to share the information between 2 (two) buildings. What is the suitable transmission media to connect each building? [CLO2]
A.
UTP Cat 5e
B.
STP
C.
Coaxial
D.
Fiber optic
36.
You are responsible for securing the polytechnic wireless LAN using WPA. Which of the statement best describe the wireless security standard that is defined by WPA? [CLO 3]
I. It includes authentication by PSK
II. It requires use of an open authentication method
III. It specifies use of a static encryption key that must be changed frequently to enhance security
IV. It specifies the use of a dynamic encryption keys that change each time a client established a connection
14. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 15 of 18
A.
I and II
B.
II and III
C.
III and IV
D
I and IV
37.
For _________ to be effective, the attacker must be able to establish legitimacy with intended target or victim [CLO 2]
A.
Phiss
B.
Fishing
C.
Vishing
D.
Phishing
38.
Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of the below attack is occurring?
[CLO 3]
A.
Trojan horse
B.
Access
C.
DoS
D.
Worm
15. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 16 of 18
39.
Using a 20-bit key as encryption is _________ more secured than using an 18-bit key [CLO 2]
A.
Two times
B.
Three times
C.
Four times
D.
Eight times
40.
Which of the following requires port-based authentication? [CLO2]
A.
Kerberos
B.
RADIUS
C.
WEP
D.
WPA
16. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 17 of 18
SECTION B
STRUCTURE QUESTIONS (50 marks)
INSTRUCTION:
This section consists of TWO (2) structures questions. Answer ALL the questions.
QUESTION 1
(a) Explain the main function for; [CLO 1]
(8 marks)
i. Session layer
ii. Transport layer
iii. Network layer
iv. Physical layer
(b) State FOUR (4) organizations that set standards for networking and explain each of the functions. [CLO 1]
(4 marks)
(c) Give detail explanation about 3 types of wireless technologies. [CLO 2]
(8 marks)
(d) You need to build peer to peer network using coaxial cable with ring
topology at your office, find and state the suitable devices needed to setup the
network? [CLO 2]
(2 marks)
(e) Bridges is one of the network devices that can be used to filter the packet in
network, state two limitations of bridges? [CLO 2]
(3 marks)
17. CONFIDENTIAL FP303 COMPUTER NETWORK
Pages 18 of 18
QUESTION 2
(a) Explain the following command used in MS DOS Prompt Windows:
[CLO 3]
(4 marks)
i. ipconfig
ii. ping
(b) State five IEEE 802.11 Wireless Standards. [CLO 1]
(5 marks)
(c) Explain about the term carrier sense in CSMA/CD? [CLO 1]
(3 marks)
(d) Distinguish the three major topology (star, ring, and bus) based on
the following criteria: [CLO 1]
i. Information transfer
ii. Troubleshoot (6 marks)
(e) Why are protocols needed? [CLO 1]
(2 marks)
(f) One way to detect failures in the network is through ping. Write down the
steps to detect a computer problem in network using Ping. [CLO 3]
(5 marks)