SlideShare a Scribd company logo
3
Most read
4
Most read
12
Most read
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 2 of 18 
SECTION A 
OBJECTIVES (50 marks) INSTRUCTIONS: 
This section consists of FORTY (40) objective questions. Answer ALL questions in the answers booklet. 
1. 
Which is NOT a network operating system? [CLO 1] 
A. 
Windows NT 
B. 
Windows 2000 
C. 
Novel Netware 
D. 
Win XP 
2. 
A simple type of wireless networking that allows the formation of a small network with up to eight devices being connected at once. This statement refers to _____________________ . [CLO 2] 
A. 
Bluetooth 
B. 
Infared 
C. 
RFID 
D. 
3G
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 3 of 18 
3. 
Figure 5 below can be described as: [CLO 1] 
Figure 5 
A. 
Point-to-point refers to a connection restricted to two endpoints that sometimes referred as P2P 
B. 
Process where multiple analog message signals or digital data streams are combined into one signal over a shared medium 
C. 
Two-way simultaneous communication is possible e.g. telephone system. 
D. 
Distribution of audio and video content to a dispersed audience via radio, television. 
4. 
List 3 components of DNS. [CLO 1] 
A. 
Name servers, Resolvers, & Name space 
B. 
Name server, Name client, & Acknowledgement 
C. 
Resolvers, Name server, & Name client 
D. 
Acknowledgement, Name space, & Name Space
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 4 of 18 
5. 
“Service provider runs program on user’s computer that notifies service provider when IP address changes“ 
This statement describe about : [CLO 1] 
A. 
DHCP 
B. 
SMTP 
C. 
DDNS 
D. 
DNS 
6. 
A television company wants to provide a new sport channel from an European Channel for their customers. What is the type of transmission they need to setup for the service? [CLO 1] 
A. 
Point to point transmission 
B. 
Broadcasting transmission 
C. 
Bluetooth transmission 
D. 
Network transmission 
7. 
“A common connection point for devices in a network. Commonly used to connect segments of a LAN. This device contains multiple ports.” This statement refers to _____________________ . [CLO 2] 
A. 
Network Interface Card (NIC) 
B. 
Repeater 
C. 
Router 
D. 
Hub
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 5 of 18 
8. 
A new hardware item is using an IEEE 802.11b a wireless LAN. What is the maximum data rate specified for this WLAN? [CLO 2] 
A. 
10 mbps 
B. 
11 Mbps 
C. 
1000 Mbps 
D. 
16 Mbps 
9. 
Which is best to describe about Internet Service Provider ( ISP ) ? [CLO 1] 
A. 
Company that provides the connections and support to access the Internet. 
B. 
Worldwide collection of computer networks, cooperating with each other to exchange information using common standards. 
C. 
A multinational of networks. 
D. 
Exchange information in a variety of forms. 
10. 
Which protocol does DHCP use at the transport layer? [CLO 1] 
A. 
IP 
B. 
TCP 
C. 
UDP 
D. 
ARP
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 6 of 18 
11. 
There are two (2) types of Infrared which are point-to-point and _____________________. [CLO 2] 
A. 
Multicast 
B. 
Unicast 
C. 
Broadcast 
D. 
Broadband 
12. 
The Ethernet protocol defines many aspects of communication over the local network. Including message format, message size, timing, _____________________ and message patterns. [CLO 1] 
A. 
Segments 
B. 
Encoding 
C. 
Syntax 
D. 
Semantic 
13. 
The IEEE _______uses 5Ghz RF spectrum, and the IEEE ________ is the newest standard in development. [CLO 2] 
A. 
802.11n , 802.11g 
B. 
802.11g , 802.11b 
C. 
802.11a, 802.11g 
D. 
802.11a, 802.11n
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 7 of 18 
14. 
In the 802.11 standard, IEEE specifies ___________ type of access method. [CLO 2] 
A. 
CSMA/CA 
B. 
CSMA/CD 
C. 
Demand priority 
D. 
Beacon passing 
15. 
Which protocol does ping use? [CLO 3] 
A. 
TCP 
B. 
ARP 
C. 
ICMP 
D. 
BootP 
16. 
Figure 2 
Refer to Figure 2. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC? [CLO 3] 
A. 
The default gateway device is not operating 
B. 
There is a problem at the physical or data link layer 
C. 
The IP settings are not properly configured on the host. 
D. 
A router on the path to the destination host has gone down 
-- 127.0.0.1 ping statistics – 
4 packets transmitted, 0 packets received, 100% packet loss
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 8 of 18 
17. 
The synchronous modems are more costly than the asynchronous modems because_____________________ . [CLO1] 
A. 
They produce large volume of data 
B. 
They contain clock recovery circuits 
C. 
They transmit the data with stop and start bits 
D. 
They operate with a larger bandwidth 
18. 
Which of the following resolves domain names into IP addresses? [CLO 1] 
A. 
DNS 
B. 
FTP 
C. 
DHCP 
D. 
SNMP 
19. 
What protocol is used between E-Mail servers? [CLO 1] 
A. 
HTTP 
B. 
POP3 
C. 
SNMP 
D. 
SMTP
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 9 of 18 
20. 
In the TCP/IP model, which layer below deals with reliability, flow control and error correction? [CLO 1] 
A. 
Application 
B. 
Transport 
C. 
Internet 
D. 
Network access 
21. 
Which of the following is an example of a client/server application? [CLO 1] 
A. 
A NIC 
B. 
E-mail 
C. 
A spreadsheet 
D. 
Hard-drive utilites 
22. 
Which of the following is the most secured password? [CLO 2] 
A. 
12345ABC 
B. 
dolphins 
C. 
!t1z0GS557x^^L 
D. 
A1B2C3
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 10 of 18 
23. 
Which one of the following fiber connector supports full duplex Ethernet? 
[CLO 1] 
A. 
B. 
C. 
D. 
24. 
_________________ is a signal source used in fiber optics. [CLO 1] 
A. 
Light 
B. 
Radio 
C. 
Microwave 
D. 
Very low-frequency
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 11 of 18 
25. 
_________ is one of tools that used in wireless installation [CLO 2] 
A. 
Access Point ( AP ) 
B. 
BNC Connector 
C. 
Coaxial Cable 
D. 
RJ-58 
26. 
It is referring to something that is continuous and the data will have certain value at each of the signals. This explanation best describes _____________________ . [CLO 1] 
A. 
Digital signals 
B. 
Binary signals 
C. 
Analog signals 
D. 
Synchronous signals 
27. 
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch? [CLO 3] 
A. 
Port security 
B. 
RSTP 
C. 
STP 
D. 
BPDU
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 12 of 18 
28. 
SPX is a protocol stack for LAN and WAN designed by ___________________ network operating system. [CLO 1] 
A. 
Windows 
B. 
Novel 
C. 
Window 2000 
D. 
Linux 
29. 
Your help desk has informed you that it received an urgent call from the vice president last night requesting his logon ID and password. What type of attack is this? [CLO 2] 
A. 
Spoofing 
B. 
Replay attack 
C. 
Social engineering 
D. 
Trojan horse 
30. 
Which statement is true concerning wireless bridges? [CLO 2] 
A. 
Increase the strength of a wireless signal. 
B. 
Connects two networks with a wireless link. 
C. 
Stationary device that connects to a wireless LAN. 
D. 
Allows wireless clients to connect to a wired network.
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 13 of 18 
31. 
What should a network analyst actually do to implement the solution for the network problem? [CLO 3] 
i. Collect documentation about problem 
ii. Investigate & find someone that cause the problem 
iii. Perform change, replacement, or addition 
iv. Make backups 
A. 
i, ii, and iii 
B. 
i, iii, and iv 
C. 
ii, iii, and iv 
D. 
i, ii, iii, and iv 
32. 
By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they are. This is referring to ___________. [CLO 2] 
A. 
Pre-shared key 
B. 
open authentication 
C. 
Extensible authentication protocol 
D. 
Encryption 
33. 
Which method of attack is used to try to guess passwords or to decipher an encryption code? [CLO 2] 
A. 
Phishing 
B. 
Brute force 
C. 
Data manipulation 
D. 
Distributed denial of service
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 14 of 18 
34. 
Which one of the following firewall product consists of a firewall application that runs on network operating system (NOS) such as UNIX or WINDOW? 
[CLO 2] 
network A. 
Personal 
B. 
Integrated 
C. 
Server-based 
D. 
Appliance-based 
35. 
Daya Maju Company has newly extended their business. Another branch is opened about 1.5 KM from the main building. The CEO wants to share the information between 2 (two) buildings. What is the suitable transmission media to connect each building? [CLO2] 
A. 
UTP Cat 5e 
B. 
STP 
C. 
Coaxial 
D. 
Fiber optic 
36. 
You are responsible for securing the polytechnic wireless LAN using WPA. Which of the statement best describe the wireless security standard that is defined by WPA? [CLO 3] 
I. It includes authentication by PSK 
II. It requires use of an open authentication method 
III. It specifies use of a static encryption key that must be changed frequently to enhance security 
IV. It specifies the use of a dynamic encryption keys that change each time a client established a connection
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 15 of 18 
A. 
I and II 
B. 
II and III 
C. 
III and IV 
D 
I and IV 
37. 
For _________ to be effective, the attacker must be able to establish legitimacy with intended target or victim [CLO 2] 
A. 
Phiss 
B. 
Fishing 
C. 
Vishing 
D. 
Phishing 
38. 
Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of the below attack is occurring? 
[CLO 3] 
A. 
Trojan horse 
B. 
Access 
C. 
DoS 
D. 
Worm
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 16 of 18 
39. 
Using a 20-bit key as encryption is _________ more secured than using an 18-bit key [CLO 2] 
A. 
Two times 
B. 
Three times 
C. 
Four times 
D. 
Eight times 
40. 
Which of the following requires port-based authentication? [CLO2] 
A. 
Kerberos 
B. 
RADIUS 
C. 
WEP 
D. 
WPA
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 17 of 18 
SECTION B 
STRUCTURE QUESTIONS (50 marks) 
INSTRUCTION: 
This section consists of TWO (2) structures questions. Answer ALL the questions. 
QUESTION 1 
(a) Explain the main function for; [CLO 1] 
(8 marks) 
i. Session layer 
ii. Transport layer 
iii. Network layer 
iv. Physical layer 
(b) State FOUR (4) organizations that set standards for networking and explain each of the functions. [CLO 1] 
(4 marks) 
(c) Give detail explanation about 3 types of wireless technologies. [CLO 2] 
(8 marks) 
(d) You need to build peer to peer network using coaxial cable with ring 
topology at your office, find and state the suitable devices needed to setup the 
network? [CLO 2] 
(2 marks) 
(e) Bridges is one of the network devices that can be used to filter the packet in 
network, state two limitations of bridges? [CLO 2] 
(3 marks)
CONFIDENTIAL FP303 COMPUTER NETWORK 
Pages 18 of 18 
QUESTION 2 
(a) Explain the following command used in MS DOS Prompt Windows: 
[CLO 3] 
(4 marks) 
i. ipconfig 
ii. ping 
(b) State five IEEE 802.11 Wireless Standards. [CLO 1] 
(5 marks) 
(c) Explain about the term carrier sense in CSMA/CD? [CLO 1] 
(3 marks) 
(d) Distinguish the three major topology (star, ring, and bus) based on 
the following criteria: [CLO 1] 
i. Information transfer 
ii. Troubleshoot (6 marks) 
(e) Why are protocols needed? [CLO 1] 
(2 marks) 
(f) One way to detect failures in the network is through ping. Write down the 
steps to detect a computer problem in network using Ping. [CLO 3] 
(5 marks)

More Related Content

PDF
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
PPT
Midterm review questions ans(networking)
PPT
Final exam review answer(networking)
PPTX
Soalan bab 3
PDF
Lecture 06
PDF
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
PDF
exam2
PPT
Security (FE)
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
Midterm review questions ans(networking)
Final exam review answer(networking)
Soalan bab 3
Lecture 06
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
exam2
Security (FE)

What's hot (19)

PDF
Uccn1003 -may2010_-_mid_term_01_-_part1of2
PPT
Network (FE)
PPTX
CN Unit 3
PDF
200+ [updated] computer networking mc qs and answers 2020
PPTX
Computer Networking Multiple Choice Questions
PPTX
Network
PPT
02 Network Models
PDF
Transport Layer Numericals
PPTX
IPv4 Addressing
PDF
Ccn aquestions jul_7_2015
PDF
Internet Technology Practical (Mumbai University) -2017
PPTX
Subnetting (FLSM & VLSM) with examples
PDF
Internet Technology (2017) Slip---Mumbai University
DOCX
Classful and classless addressing
PDF
Network Layer Numericals
PPT
Human Interface & Multimedia
PPT
Network (IP)
PDF
Ccna 3-discovery-4-0-module-4-100-
PPT
About ip address
Uccn1003 -may2010_-_mid_term_01_-_part1of2
Network (FE)
CN Unit 3
200+ [updated] computer networking mc qs and answers 2020
Computer Networking Multiple Choice Questions
Network
02 Network Models
Transport Layer Numericals
IPv4 Addressing
Ccn aquestions jul_7_2015
Internet Technology Practical (Mumbai University) -2017
Subnetting (FLSM & VLSM) with examples
Internet Technology (2017) Slip---Mumbai University
Classful and classless addressing
Network Layer Numericals
Human Interface & Multimedia
Network (IP)
Ccna 3-discovery-4-0-module-4-100-
About ip address
Ad

Viewers also liked (14)

PDF
Exercises TCP/IP Networking With Solutions
PDF
FP 303 COMPUTER NETWORK PAPER FINAL
PDF
FP305 data structure PAPER FINAL SEM 3
DOC
Subnet questions with ans(networking)
PDF
FP 301 OOP FINAL PAPER JUNE 2013
PDF
FP305 data structure june 2012
PDF
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
PDF
FP305 data structure
PDF
FP 301 OOP FINAL PAPER
DOCX
Final paper FN511 Switching & Routing
DOCX
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
PDF
Problem Based Task 1
PDF
Embedded system (Chapter 2) part 2
Exercises TCP/IP Networking With Solutions
FP 303 COMPUTER NETWORK PAPER FINAL
FP305 data structure PAPER FINAL SEM 3
Subnet questions with ans(networking)
FP 301 OOP FINAL PAPER JUNE 2013
FP305 data structure june 2012
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
FP305 data structure
FP 301 OOP FINAL PAPER
Final paper FN511 Switching & Routing
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
Problem Based Task 1
Embedded system (Chapter 2) part 2
Ad

Similar to FP 303 COMPUTER NETWORK PAPER FINAL Q (20)

PDF
FINAL PAPER FN311 INTERNET SERVICES
DOCX
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
PDF
Tutorial 1 chapter 1
DOCX
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
DOCX
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
DOCX
Ccna guide
PDF
Implementation of a bluetooth attack on controller area network
PDF
Technology In Action Complete 15th Edition Evans Test Bank
PDF
Digital Business Networks 1st Edition Dooley Test Bank
PDF
Technology In Action Complete 15th Edition Evans Test Bank
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
A Model Of An Integrated Unified Communication Network Using Public Switched ...
PDF
Digital Business Networks 1st Edition Dooley Test Bank
DOCX
TLE 9 Second quarter exams (Parts of Computer)
PPTX
Rashmi T S-Intrenship PPT.pptx
PPTX
Connecting network
PDF
Management Information Systems 13th Edition Laudon Test Bank
PDF
Digital Business Networks 1st Edition Dooley Test Bank
PDF
Test Bank for Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshoo...
PPTX
Connecting network.pptx
FINAL PAPER FN311 INTERNET SERVICES
Page1 of 101. Prior tocellular radio, mobile radio and telep.docx
Tutorial 1 chapter 1
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Ccna guide
Implementation of a bluetooth attack on controller area network
Technology In Action Complete 15th Edition Evans Test Bank
Digital Business Networks 1st Edition Dooley Test Bank
Technology In Action Complete 15th Edition Evans Test Bank
International Journal of Computational Engineering Research(IJCER)
A Model Of An Integrated Unified Communication Network Using Public Switched ...
Digital Business Networks 1st Edition Dooley Test Bank
TLE 9 Second quarter exams (Parts of Computer)
Rashmi T S-Intrenship PPT.pptx
Connecting network
Management Information Systems 13th Edition Laudon Test Bank
Digital Business Networks 1st Edition Dooley Test Bank
Test Bank for Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshoo...
Connecting network.pptx

Recently uploaded (20)

PPTX
Institutional Correction lecture only . . .
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Basic Mud Logging Guide for educational purpose
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Pharma ospi slides which help in ospi learning
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
master seminar digital applications in india
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Institutional Correction lecture only . . .
2.FourierTransform-ShortQuestionswithAnswers.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
Module 4: Burden of Disease Tutorial Slides S2 2025
Abdominal Access Techniques with Prof. Dr. R K Mishra
Week 4 Term 3 Study Techniques revisited.pptx
Basic Mud Logging Guide for educational purpose
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Final Presentation General Medicine 03-08-2024.pptx
Pharma ospi slides which help in ospi learning
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
O5-L3 Freight Transport Ops (International) V1.pdf
master seminar digital applications in india
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table

FP 303 COMPUTER NETWORK PAPER FINAL Q

  • 1. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 2 of 18 SECTION A OBJECTIVES (50 marks) INSTRUCTIONS: This section consists of FORTY (40) objective questions. Answer ALL questions in the answers booklet. 1. Which is NOT a network operating system? [CLO 1] A. Windows NT B. Windows 2000 C. Novel Netware D. Win XP 2. A simple type of wireless networking that allows the formation of a small network with up to eight devices being connected at once. This statement refers to _____________________ . [CLO 2] A. Bluetooth B. Infared C. RFID D. 3G
  • 2. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 3 of 18 3. Figure 5 below can be described as: [CLO 1] Figure 5 A. Point-to-point refers to a connection restricted to two endpoints that sometimes referred as P2P B. Process where multiple analog message signals or digital data streams are combined into one signal over a shared medium C. Two-way simultaneous communication is possible e.g. telephone system. D. Distribution of audio and video content to a dispersed audience via radio, television. 4. List 3 components of DNS. [CLO 1] A. Name servers, Resolvers, & Name space B. Name server, Name client, & Acknowledgement C. Resolvers, Name server, & Name client D. Acknowledgement, Name space, & Name Space
  • 3. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 4 of 18 5. “Service provider runs program on user’s computer that notifies service provider when IP address changes“ This statement describe about : [CLO 1] A. DHCP B. SMTP C. DDNS D. DNS 6. A television company wants to provide a new sport channel from an European Channel for their customers. What is the type of transmission they need to setup for the service? [CLO 1] A. Point to point transmission B. Broadcasting transmission C. Bluetooth transmission D. Network transmission 7. “A common connection point for devices in a network. Commonly used to connect segments of a LAN. This device contains multiple ports.” This statement refers to _____________________ . [CLO 2] A. Network Interface Card (NIC) B. Repeater C. Router D. Hub
  • 4. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 5 of 18 8. A new hardware item is using an IEEE 802.11b a wireless LAN. What is the maximum data rate specified for this WLAN? [CLO 2] A. 10 mbps B. 11 Mbps C. 1000 Mbps D. 16 Mbps 9. Which is best to describe about Internet Service Provider ( ISP ) ? [CLO 1] A. Company that provides the connections and support to access the Internet. B. Worldwide collection of computer networks, cooperating with each other to exchange information using common standards. C. A multinational of networks. D. Exchange information in a variety of forms. 10. Which protocol does DHCP use at the transport layer? [CLO 1] A. IP B. TCP C. UDP D. ARP
  • 5. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 6 of 18 11. There are two (2) types of Infrared which are point-to-point and _____________________. [CLO 2] A. Multicast B. Unicast C. Broadcast D. Broadband 12. The Ethernet protocol defines many aspects of communication over the local network. Including message format, message size, timing, _____________________ and message patterns. [CLO 1] A. Segments B. Encoding C. Syntax D. Semantic 13. The IEEE _______uses 5Ghz RF spectrum, and the IEEE ________ is the newest standard in development. [CLO 2] A. 802.11n , 802.11g B. 802.11g , 802.11b C. 802.11a, 802.11g D. 802.11a, 802.11n
  • 6. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 7 of 18 14. In the 802.11 standard, IEEE specifies ___________ type of access method. [CLO 2] A. CSMA/CA B. CSMA/CD C. Demand priority D. Beacon passing 15. Which protocol does ping use? [CLO 3] A. TCP B. ARP C. ICMP D. BootP 16. Figure 2 Refer to Figure 2. Why would the response shown be displayed after issuing the command ping 127.0.0.1 on a PC? [CLO 3] A. The default gateway device is not operating B. There is a problem at the physical or data link layer C. The IP settings are not properly configured on the host. D. A router on the path to the destination host has gone down -- 127.0.0.1 ping statistics – 4 packets transmitted, 0 packets received, 100% packet loss
  • 7. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 8 of 18 17. The synchronous modems are more costly than the asynchronous modems because_____________________ . [CLO1] A. They produce large volume of data B. They contain clock recovery circuits C. They transmit the data with stop and start bits D. They operate with a larger bandwidth 18. Which of the following resolves domain names into IP addresses? [CLO 1] A. DNS B. FTP C. DHCP D. SNMP 19. What protocol is used between E-Mail servers? [CLO 1] A. HTTP B. POP3 C. SNMP D. SMTP
  • 8. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 9 of 18 20. In the TCP/IP model, which layer below deals with reliability, flow control and error correction? [CLO 1] A. Application B. Transport C. Internet D. Network access 21. Which of the following is an example of a client/server application? [CLO 1] A. A NIC B. E-mail C. A spreadsheet D. Hard-drive utilites 22. Which of the following is the most secured password? [CLO 2] A. 12345ABC B. dolphins C. !t1z0GS557x^^L D. A1B2C3
  • 9. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 10 of 18 23. Which one of the following fiber connector supports full duplex Ethernet? [CLO 1] A. B. C. D. 24. _________________ is a signal source used in fiber optics. [CLO 1] A. Light B. Radio C. Microwave D. Very low-frequency
  • 10. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 11 of 18 25. _________ is one of tools that used in wireless installation [CLO 2] A. Access Point ( AP ) B. BNC Connector C. Coaxial Cable D. RJ-58 26. It is referring to something that is continuous and the data will have certain value at each of the signals. This explanation best describes _____________________ . [CLO 1] A. Digital signals B. Binary signals C. Analog signals D. Synchronous signals 27. A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch? [CLO 3] A. Port security B. RSTP C. STP D. BPDU
  • 11. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 12 of 18 28. SPX is a protocol stack for LAN and WAN designed by ___________________ network operating system. [CLO 1] A. Windows B. Novel C. Window 2000 D. Linux 29. Your help desk has informed you that it received an urgent call from the vice president last night requesting his logon ID and password. What type of attack is this? [CLO 2] A. Spoofing B. Replay attack C. Social engineering D. Trojan horse 30. Which statement is true concerning wireless bridges? [CLO 2] A. Increase the strength of a wireless signal. B. Connects two networks with a wireless link. C. Stationary device that connects to a wireless LAN. D. Allows wireless clients to connect to a wired network.
  • 12. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 13 of 18 31. What should a network analyst actually do to implement the solution for the network problem? [CLO 3] i. Collect documentation about problem ii. Investigate & find someone that cause the problem iii. Perform change, replacement, or addition iv. Make backups A. i, ii, and iii B. i, iii, and iv C. ii, iii, and iv D. i, ii, iii, and iv 32. By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they are. This is referring to ___________. [CLO 2] A. Pre-shared key B. open authentication C. Extensible authentication protocol D. Encryption 33. Which method of attack is used to try to guess passwords or to decipher an encryption code? [CLO 2] A. Phishing B. Brute force C. Data manipulation D. Distributed denial of service
  • 13. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 14 of 18 34. Which one of the following firewall product consists of a firewall application that runs on network operating system (NOS) such as UNIX or WINDOW? [CLO 2] network A. Personal B. Integrated C. Server-based D. Appliance-based 35. Daya Maju Company has newly extended their business. Another branch is opened about 1.5 KM from the main building. The CEO wants to share the information between 2 (two) buildings. What is the suitable transmission media to connect each building? [CLO2] A. UTP Cat 5e B. STP C. Coaxial D. Fiber optic 36. You are responsible for securing the polytechnic wireless LAN using WPA. Which of the statement best describe the wireless security standard that is defined by WPA? [CLO 3] I. It includes authentication by PSK II. It requires use of an open authentication method III. It specifies use of a static encryption key that must be changed frequently to enhance security IV. It specifies the use of a dynamic encryption keys that change each time a client established a connection
  • 14. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 15 of 18 A. I and II B. II and III C. III and IV D I and IV 37. For _________ to be effective, the attacker must be able to establish legitimacy with intended target or victim [CLO 2] A. Phiss B. Fishing C. Vishing D. Phishing 38. Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of the below attack is occurring? [CLO 3] A. Trojan horse B. Access C. DoS D. Worm
  • 15. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 16 of 18 39. Using a 20-bit key as encryption is _________ more secured than using an 18-bit key [CLO 2] A. Two times B. Three times C. Four times D. Eight times 40. Which of the following requires port-based authentication? [CLO2] A. Kerberos B. RADIUS C. WEP D. WPA
  • 16. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 17 of 18 SECTION B STRUCTURE QUESTIONS (50 marks) INSTRUCTION: This section consists of TWO (2) structures questions. Answer ALL the questions. QUESTION 1 (a) Explain the main function for; [CLO 1] (8 marks) i. Session layer ii. Transport layer iii. Network layer iv. Physical layer (b) State FOUR (4) organizations that set standards for networking and explain each of the functions. [CLO 1] (4 marks) (c) Give detail explanation about 3 types of wireless technologies. [CLO 2] (8 marks) (d) You need to build peer to peer network using coaxial cable with ring topology at your office, find and state the suitable devices needed to setup the network? [CLO 2] (2 marks) (e) Bridges is one of the network devices that can be used to filter the packet in network, state two limitations of bridges? [CLO 2] (3 marks)
  • 17. CONFIDENTIAL FP303 COMPUTER NETWORK Pages 18 of 18 QUESTION 2 (a) Explain the following command used in MS DOS Prompt Windows: [CLO 3] (4 marks) i. ipconfig ii. ping (b) State five IEEE 802.11 Wireless Standards. [CLO 1] (5 marks) (c) Explain about the term carrier sense in CSMA/CD? [CLO 1] (3 marks) (d) Distinguish the three major topology (star, ring, and bus) based on the following criteria: [CLO 1] i. Information transfer ii. Troubleshoot (6 marks) (e) Why are protocols needed? [CLO 1] (2 marks) (f) One way to detect failures in the network is through ping. Write down the steps to detect a computer problem in network using Ping. [CLO 3] (5 marks)