SlideShare a Scribd company logo
EXAMINATION AND EVALUATION DIVISION 
DEPARTMENT OF POLYTECHNIC EDUCATION 
(MINISTRY OF HIGHER EDUCATION) 
INFORMATION & COMMUNICATION TECHNOLOGY (ICT) 
DEPARTMENT 
FINAL EXAMINATION 
JUNE 2012 SESSION 
FP303: COMPUTER NETWORK 
DATE: 19 NOV 2012 (MONDAY) 
DURATION: 2 HOURS (2.30 PM - 4.30 PM) 
This paper consists of FIFTEEN (15) pages including the front page. 
Section A: Objective (40 questions – answer ALL) 
Section B: Structure (2 questions – answer ALL). 
CONFIDENTIAL 
DO NOT OPEN THIS QUESTION PAPER UNTIL INSTRUCTED BY THE CHIEF INVIGILATOR 
(The CLO stated is for reference only)
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 2 of 15 
SECTION A 
OBJECTIVE (50 marks) 
Instructions: This section consists of FORTY (40) objective questions. Answer ALL the questions in the answer booklet. 
1. Which of the following terms describes a network of computers and other devices that are confined to a relatively small space, such as a building or even an office? 
[CLO 1] 
A. Personal Area Network 
B. Local Area Network 
C. Metropolitan Area Network 
D. Wide Area Network 
2. Which agency created standards for network interfaces and public networks (X series) and for telephone communications (V series)? 
[CLO 1] 
A. EIA 
B. ISO 
C. ANSI 
D. ITU-T 
3. Which topology is relevant with the statement above? [CLO 1] 
A. Bus topology 
B. Star topology 
C. Ring topology 
D. Point-to-Point topology 
The expansion of this network structure is easy as long as there is a free port on the hub, only a cable is needed to connect other computers
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 3 of 15 
Each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive and vice versa. 
4. Based on the statement above, what type of transmission mode is it referring to? 
[CLO 1] 
A. Simplex 
B. Half-duplex 
C. Full-duplex 
D. Automatic 
5. _______________is a set of techniques that enable more than one device to combine and send their signals simultaneously through a single data link at the same time. 
[CLO 1] 
A. Multiplexing 
B. Point-to-Point transmission 
C. Broadcast transmission 
D. Bandwidth 
Figure 1: Network Diagram 1 
6. Refer to the Figure 1, what type of device is used to connect two networks? [CLO 1] 
A. Hub 
B. Switch 
C. Router 
D. Access point 7. ___________is a process where multiple analog or digital message signals are combined into one signal over a shared medium. [CLO 1] 
A. Modulating 
B. Multiplexing 
C. Broadcasting 
D. Full-Duplex transmission
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 4 of 15 
8. Which of the following is a benefit of VLANs? [CLO 1] A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They increase the size of broadcast domains while decreasing the number of collision domains. D. They simplify switch administration. 
9. Determine an advantage of the use of layers in the OSI reference model. [CLO 1] 
A. It increases complexity. 
B. It breaks network communications into larger parts. C. It prevents changes in one layer from affecting other layers. D. It requires the use of single-vendor equipment for hardware and software communications. 
10. Which of the following is the correct order of the layers of the OSI reference model, starting at the lowest to the higher layer of the model? [CLO 1] 
A. data Link, Physical, Transport, Network, Presentation, Session, application B. data link, network, physical, session, transport, presentation, application C. physical, data link, network, transport, presentation, session, application D. physical, data link, network, transport, session, presentation, application 
11. Which OSI layer is responsible for formatting data based on a standard syntax and character set conversion? 
[CLO 1] 
A. Transport 
B. Network 
C. Presentation 
D. Session 
12. Determine the main function of the transport layer. [CLO 1] 
A. Node-to-node delivery 
B. End-to-end message delivery 
C. Synchronization 
D. Updating and maintenance of routing tables
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 5 of 15 
13. Identify application layer protocol used to support file transfers between a client and a server. [CLO 2] 
A. HTML 
B. HTTP 
C. FTP 
D. Telnet 
14. Based on the statement above, which of the following network address belong to this host? [CLO 2] 
A. 176.33.0.0 
B. 176.33.33.0 
C. 176.33.68.0 
D. 176.33.65.30 
15. Which default subnet mask provides the most host bits? [CLO 2] 
A. 255.0.0.0 
B. 255.255.0.0 
C. 255.255.255.0 
D. 255.255.255.255 
16. Which of the following addresses is an example of a broadcast address on the network 123.10.0.0 with a subnet mask of 255.255.0.0? [CLO 2] 
A. 123.255.255.255 
B. 123.10.255.255 
C. 123.13.0.0 
D. 123.1.1.1 
IP address: 176.33.68.16 
Subnet mask: 255.255.0.0
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 6 of 15 
17. Which statement describes a straight-through cable? [CLO 1] 
i. It maps a wire to the same pins on both ends of the cable 
ii. Two devices directly connected and using different pins to transmit and receive 
iii. Two devices directly connected and using same pins to transmit and receive 
iv. T568A on one end of the cable and T568B on the other end of the same cable 
A. i and ii 
B. i and iii 
C. ii and iii 
D. ii and iv 
18. Based on the statement above, identify the type of connection cable. [CLO 1] 
A. Cross-over 
B. Cross-line 
C. Straight-through 
D. Roll Over 
19. Based on the statement given above, which of the following type of media meet the requirements? [CLO 1] 
A. STP 
B. UTP 
C. Single-Mode Fiber 
D. Multimode Fiber 
 Router port to router port 
 Switch port to switch port 
 Switch port to hub port 
 Hub port to hub port 
A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre- existing building with limited cabling space.
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 7 of 15 
It is often used to connect a TV set to the signal source, be it a cable TV outlet, satellite TV, or conventional antenna. 
20. Which of the following types of channels moves data relatively slow? 
[CLO 1] 
A. Wideband channel 
B. Voiceband channel 
C. Narrowband channel 
D. Broadband channel 
21. Identify the function of Ping and Tracert commands. [CLO 1] 
A. Tracert shows each hop, while ping show a destination reply only 
B. Ping shows whether the transmission is unsuccessful; tracert does not 
C. Both ping and tracert can show results in a graphical display 
D. Tracert uses IP addresses; ping does not 
22. Which of the following describes each router through which a packet travels when moving between source and destination networks? 
[CLO 1] 
A. NOC 
B. ISP 
C. Segment 
D. Hop 
23. Which elements are required to successfully connect to the Internet? [CLO 1] 
A. File sharing enabled B. A network connection C. Server services enabled 
D. An address obtained directly from the RIR 
24. Based on the statement above, which type of media would be the BEST to meet these requirements? [CLO 1] 
A. STP 
B. UTP 
C. Coaxial 
D. Fiber
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 8 of 15 
25. Identify the purpose of nslookup. [CLO 1] 
A. Display network connection 
B. Display route taken to destination 
C. Displays IP configuration information 
D. Directly queries the name server for information on a destination domain 
26. The inner core of an optical fiber is ________________in composition. [CLO 1] 
A. glass or plastic 
B. copper 
C. bimetallic 
D. liquid 
27. Determine the major factor that makes coaxial cable less susceptible to noise than twisted pair cable. [CLO 1] 
A. Inner conductor 
B. Diameter of cable 
C. Outer conductor 
D. Insulating material 
28. Determine the factor of IEEE 802.11 wireless technology which is able to transmit further distances than Bluetooth technology. 
[CLO 2] 
A. Has higher power output 
B. Uses better encryption methods 
C. Transmits at much lower frequencies 
D. Transmits at much higher frequencies 
29. Which of the following describes the importance of security in wireless networks? [CLO 2] 
A. Wireless networks are typically slower than wired networks. 
B. Televisions and other devices can interfere with wireless signals. 
C. Environment factors such as thunderstorm can affect wireless networks. 
D. Wireless networks broadcast data over a medium that allows easy access.
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 9 of 15 
30. Classify the access-point feature which allows a network administrator to define what type of data can enter the wireless network. [CLO 3] 
A. Traffic filtering 
B. Hacking block 
C. Authentication 
D. Encryption 
31. Match the function of WEP and EAP in wireless network. 
[CLO 2] 
A. Encrypt and authenticate users on B. Filter traffic and select the operating frequency for C. Identify the wireless network and compress data on D. Create the smallest wireless network and limit the number of users on
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 10 of 15 
Figure 2: Linksys Interface 
32. Refer to Figure 2. In the Wireless menu of a Linksys integrated router, which of the following configuration options allow the presence of the access point to be known to nearby clients? [CLO 2] 
A. Network Mode 
B. Network Name (SSID) 
C. Standard Channel 
D. SSID Broadcast 
33. Which method of attack is used to try to guess passwords or to decipher an encryption code? [CLO 2] 
A. Phishing 
B. Brute force 
C. Data manipulation 
D. Distributed denial of service
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 11 of 15 
34. Identify the method of phishing attack. [CLO 2] 
A. by e-mail 
B. by telephone 
C. by VOIP 
D. through a person they know in common 
35. The statement above refers to _________________________________ [CLO 3] 
A. adware 
B. pop-ups 
C. spyware 
D. pop-unders 
36. Based on the statement above, determine the most likeable cause of the problem. 
[CLO 3] 
A. The hub is unplugged 
B. The web server is down 
C. The user’s workstation is not connected to the network 
D. The server is not routing protocols to your workstation 
Type of program installs and gathers personal information, including password and account information from a computer without the permission or knowledge of the user program install and gathers personal. 
You’ve been called in to troubleshoot a network in corporate intranet web server. The users are complaining that they can’t access corporate intranet web server. The users receive “Host Not found” error while accessing web server address. Several minutes later, another user reported the same problem. At the same time, users still send e-mail and transfer files to another server.
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 12 of 15 
37. Which of the following troubleshooting techniques are suitable for both home networks and large corporate networks? [CLO 3] 
i. Having a backup ISR 
ii. Running a network monitoring application 
iii. Documenting the troubleshooting processes 
iv. Keeping record of system upgrades and software versions 
A. i and ii 
B. ii and iii 
C. iii and iv 
D. i and iv 
38. Identify the main factor that prevents the hosts to connect to network. [CLO 3] 
A. Operator error 
B. Cabling problems 
C. Equipment failure 
D. Addressing problems 
39. Based on the situation given above, determine the correct action to troubleshoot this problem. [CLO 3] 
A. Attach a different keyboard 
B. Add the PC to your network to see if it can communicate with other PCs 
C. Attach the PC to the Internet to check its operating system website for patches 
D. Boot the PC and run anti-virus and anti-spyware application from an external drive. 
40. Determine the next action that should be taken once a problem is resolved. [CLO 3] 
A. Consult an FAQ 
B. Escalate the problem 
C. Update the documentation 
D. Run remote access software 
A network administrator is troubleshooting a computer that is operating strangely. It boots slowly, programs will not load, and the keyboard responds very slowly.
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 13 of 15 
SECTION B 
SUBJECTIVE (50 marks) 
Instruction: This section consists of TWO (2) subjective questions. Answer ALL the questions in the answer booklet. 
QUESTION 1 
Figure 3: Topology Y 
a) i. Refer to figure 3, name the type of network topology. [CLO 1] 
(1 marks) 
ii) Describe TWO (2) advantages and TWO (2) disadvantages of the network 
topology in question a) i. [CLO1] (4 marks) 
b) Describe the common transmission flaws affecting data signals below: [CLO 1] (6 marks) 
i) Noise 
ii) Attenuation 
iii) Latency
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 14 of 15 
c) i) Identify network devices operate in OSI model Layers [CLO 1] 
(3 marks) 
OSI model Layer 
Network device 
Network Layer 
Data Link Layer 
Physical Layer 
Scenario A 
ii) Draw the network design for this network using all information in scenario A 
above. [CLO 2] 
(4 marks) 
d) Describe the differences between straight-through cable and cross over cable 
[CLO 1] 
(3 marks) 
e) Describe the importance of Internet Protocols (IP). [CLO 1] (4 marks) 
Company ABC needs to build a simple network in new branch office with the following characteristics: 
i. 2 workstation 
ii. 1 switch 
iii. 1 server 
iv. IP address 192.168.1.1 until 192.168.3
CONFIDENTIAL FP303 COMPUTER NETWORK 
Page 15 of 15 
QUESTION 2 
a) Describe the relationships of ISP and internet. [CLO 1] 
(2 marks) 
b) Wireless technologies 
i) Wireless systems are systems that do not use wires to send information but rather transmit it through the air. The growth of wireless systems creates several opportunities for attackers. Explain THREE (3) methods to avoid WLAN attacks. [CLO 3] 
(6 marks) 
ii) Describe TWO (2) basic modes of WLAN installations. [CLO 2] (2 marks) 
c) You’ve been asked to help troubleshoot a problem that is occurring in your polytechnic’s computer lab. Students are complaining about viruses that are infecting the thumb drives they bring to computer lab. How can you help solve this situation? [CLO 3] 
(6 marks) 
d) Explain social engineering and phishing in networking [CLO 2] 
(3 marks) 
e) Classify THREE (3) physical problems in network and explain how to solve 
each problem. . [CLO 3] (6 marks)

More Related Content

PPSX
Packet Tracer Tutorial # 2
PPSX
Packet Tracer Tutorial # 1
PPTX
Subnetting made simple
PPTX
Networking basics
PPTX
Wireless Networking
DOC
How to Configure QinQ?
PPTX
Subnetting
PPT
1 introduction-to-computer-networking
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 1
Subnetting made simple
Networking basics
Wireless Networking
How to Configure QinQ?
Subnetting
1 introduction-to-computer-networking

What's hot (20)

PPTX
Introduction to network switches
PPTX
IPv4 addressing and subnetting
PPT
Chapter 8: Switching
PPT
1 survey system design_and_engg
PPT
Chapter 1: Introduction to Data Communication and Networks
PDF
Computer Communication Networks-Wireless LAN
PDF
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
PPT
Final exam review answer(networking)
PDF
Basic ccna interview questions and answers ~ sysnet notes
PPT
Ip addressing classless
PPT
line coding.ppt
DOCX
Ccna 1 final exam answer v5
PPT
POLITEKNIK MALAYSIA
PPT
Ip address and subnetting
PPSX
Subnetting
PPTX
Ethernet - Networking presentation
PDF
Peer- to -peer connection using ciscio packet tracer
PPT
Chapter10
Introduction to network switches
IPv4 addressing and subnetting
Chapter 8: Switching
1 survey system design_and_engg
Chapter 1: Introduction to Data Communication and Networks
Computer Communication Networks-Wireless LAN
SOLUTION MANUAL OF COMMUNICATION NETWORKS BY ALBERTO LEON GARCIA & INDRA WIDJAJA
Final exam review answer(networking)
Basic ccna interview questions and answers ~ sysnet notes
Ip addressing classless
line coding.ppt
Ccna 1 final exam answer v5
POLITEKNIK MALAYSIA
Ip address and subnetting
Subnetting
Ethernet - Networking presentation
Peer- to -peer connection using ciscio packet tracer
Chapter10
Ad

Viewers also liked (20)

PDF
FP 303 COMPUTER NETWORK PAPER FINAL
PDF
FP 303 COMPUTER NETWORK PAPER FINAL Q
DOC
Subnet questions with ans(networking)
PDF
FP 301 OOP FINAL PAPER JUNE 2013
PDF
FP305 data structure PAPER FINAL SEM 3
PDF
Exercises TCP/IP Networking With Solutions
PDF
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
PDF
FP305 data structure june 2012
PDF
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
PPT
Midterm review questions ans(networking)
PPTX
Netwok cable(edisi bahasa kebangsan)
PDF
Embedded system (Chapter 2) part 2
PDF
FP 301 OOP FINAL PAPER
PDF
Data Structures (BE)
DOCX
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
PPTX
Hacking
PPTX
Mengapa Komputer Membutuhkan Arus DC
PPT
Computer Networks And Topology
PDF
Problem Based Task 1
PPTX
Perbedaan Mikroprosesor dan Mikrokontroler
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINAL Q
Subnet questions with ans(networking)
FP 301 OOP FINAL PAPER JUNE 2013
FP305 data structure PAPER FINAL SEM 3
Exercises TCP/IP Networking With Solutions
FINAL PAPER FP301 OBJECT ORIENTED PROGRAMMING
FP305 data structure june 2012
FINAL PAPER FP501 OPEN SOURCE OPERATING SYSTEM
Midterm review questions ans(networking)
Netwok cable(edisi bahasa kebangsan)
Embedded system (Chapter 2) part 2
FP 301 OOP FINAL PAPER
Data Structures (BE)
OBJECT ORIENTED ROGRAMMING With Question And Answer Full
Hacking
Mengapa Komputer Membutuhkan Arus DC
Computer Networks And Topology
Problem Based Task 1
Perbedaan Mikroprosesor dan Mikrokontroler
Ad

Similar to FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012 (20)

PDF
FINAL PAPER FN311 INTERNET SERVICES
PDF
New IMazing Crack Free Latest Version 2025
PDF
803632567-ITS323Y12S1E02-Final-Exam-Answers.pdf
PDF
Wondershare Filmora 14.3.2 Crack + License Key Free Latest 2025
PDF
Grand Theft Auto GTA 5 Free Download for PC Crack Full Latest Version 2025
PDF
CCNA Exam Question
PDF
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
PDF
COPA Networking MCQ Most Important Question
PDF
CISCO Exact Questions By: Konard
PDF
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
PDF
Technology In Action Complete 15th Edition Evans Test Bank
PDF
Technology In Action Complete 15th Edition Evans Test Bank
PDF
Computer Networks - Fundamentals & Basics.pdf
PDF
Test Bank for Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshoo...
DOCX
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
DOCX
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
PPT
Chapter 3 slides (Distributed Systems)
DOCX
Ccna guide
PDF
Test Bank for Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshoo...
PDF
C. Science (I) solution.pdf
FINAL PAPER FN311 INTERNET SERVICES
New IMazing Crack Free Latest Version 2025
803632567-ITS323Y12S1E02-Final-Exam-Answers.pdf
Wondershare Filmora 14.3.2 Crack + License Key Free Latest 2025
Grand Theft Auto GTA 5 Free Download for PC Crack Full Latest Version 2025
CCNA Exam Question
Cisco.actualtests.200 120.v2013-12-10.by.watson.314q (2 new q)
COPA Networking MCQ Most Important Question
CISCO Exact Questions By: Konard
Cisco.exactquestions.200 120.v2014-12-23.by.konrad.338q
Technology In Action Complete 15th Edition Evans Test Bank
Technology In Action Complete 15th Edition Evans Test Bank
Computer Networks - Fundamentals & Basics.pdf
Test Bank for Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshoo...
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Chapter 3 slides (Distributed Systems)
Ccna guide
Test Bank for Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshoo...
C. Science (I) solution.pdf

More from Syahriha Ruslan (6)

PPT
OSOS SEM 4 Chapter 2 part 1
PPT
OSOS SEM 4 Chapter 1
PDF
FP305 data structure
PDF
FP304 DATABASE SYSTEM PAPER FINAL EXAM AGAIN
PDF
FP304 DATABASE SYSTEM FINAL PAPER
PDF
Fp304 DATABASE SYSTEM JUNE 2012
OSOS SEM 4 Chapter 2 part 1
OSOS SEM 4 Chapter 1
FP305 data structure
FP304 DATABASE SYSTEM PAPER FINAL EXAM AGAIN
FP304 DATABASE SYSTEM FINAL PAPER
Fp304 DATABASE SYSTEM JUNE 2012

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Cell Types and Its function , kingdom of life
PPTX
Cell Structure & Organelles in detailed.
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Lesson notes of climatology university.
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
Basic Mud Logging Guide for educational purpose
PDF
Complications of Minimal Access Surgery at WLH
PDF
Pre independence Education in Inndia.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPH.pptx obstetrics and gynecology in nursing
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Microbial diseases, their pathogenesis and prophylaxis
Cell Types and Its function , kingdom of life
Cell Structure & Organelles in detailed.
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
O5-L3 Freight Transport Ops (International) V1.pdf
Supply Chain Operations Speaking Notes -ICLT Program
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Lesson notes of climatology university.
TR - Agricultural Crops Production NC III.pdf
Pharma ospi slides which help in ospi learning
Basic Mud Logging Guide for educational purpose
Complications of Minimal Access Surgery at WLH
Pre independence Education in Inndia.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...

FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012

  • 1. EXAMINATION AND EVALUATION DIVISION DEPARTMENT OF POLYTECHNIC EDUCATION (MINISTRY OF HIGHER EDUCATION) INFORMATION & COMMUNICATION TECHNOLOGY (ICT) DEPARTMENT FINAL EXAMINATION JUNE 2012 SESSION FP303: COMPUTER NETWORK DATE: 19 NOV 2012 (MONDAY) DURATION: 2 HOURS (2.30 PM - 4.30 PM) This paper consists of FIFTEEN (15) pages including the front page. Section A: Objective (40 questions – answer ALL) Section B: Structure (2 questions – answer ALL). CONFIDENTIAL DO NOT OPEN THIS QUESTION PAPER UNTIL INSTRUCTED BY THE CHIEF INVIGILATOR (The CLO stated is for reference only)
  • 2. CONFIDENTIAL FP303 COMPUTER NETWORK Page 2 of 15 SECTION A OBJECTIVE (50 marks) Instructions: This section consists of FORTY (40) objective questions. Answer ALL the questions in the answer booklet. 1. Which of the following terms describes a network of computers and other devices that are confined to a relatively small space, such as a building or even an office? [CLO 1] A. Personal Area Network B. Local Area Network C. Metropolitan Area Network D. Wide Area Network 2. Which agency created standards for network interfaces and public networks (X series) and for telephone communications (V series)? [CLO 1] A. EIA B. ISO C. ANSI D. ITU-T 3. Which topology is relevant with the statement above? [CLO 1] A. Bus topology B. Star topology C. Ring topology D. Point-to-Point topology The expansion of this network structure is easy as long as there is a free port on the hub, only a cable is needed to connect other computers
  • 3. CONFIDENTIAL FP303 COMPUTER NETWORK Page 3 of 15 Each station can both transmit and receive, but not at the same time. When one device is sending, the other can only receive and vice versa. 4. Based on the statement above, what type of transmission mode is it referring to? [CLO 1] A. Simplex B. Half-duplex C. Full-duplex D. Automatic 5. _______________is a set of techniques that enable more than one device to combine and send their signals simultaneously through a single data link at the same time. [CLO 1] A. Multiplexing B. Point-to-Point transmission C. Broadcast transmission D. Bandwidth Figure 1: Network Diagram 1 6. Refer to the Figure 1, what type of device is used to connect two networks? [CLO 1] A. Hub B. Switch C. Router D. Access point 7. ___________is a process where multiple analog or digital message signals are combined into one signal over a shared medium. [CLO 1] A. Modulating B. Multiplexing C. Broadcasting D. Full-Duplex transmission
  • 4. CONFIDENTIAL FP303 COMPUTER NETWORK Page 4 of 15 8. Which of the following is a benefit of VLANs? [CLO 1] A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They increase the size of broadcast domains while decreasing the number of collision domains. D. They simplify switch administration. 9. Determine an advantage of the use of layers in the OSI reference model. [CLO 1] A. It increases complexity. B. It breaks network communications into larger parts. C. It prevents changes in one layer from affecting other layers. D. It requires the use of single-vendor equipment for hardware and software communications. 10. Which of the following is the correct order of the layers of the OSI reference model, starting at the lowest to the higher layer of the model? [CLO 1] A. data Link, Physical, Transport, Network, Presentation, Session, application B. data link, network, physical, session, transport, presentation, application C. physical, data link, network, transport, presentation, session, application D. physical, data link, network, transport, session, presentation, application 11. Which OSI layer is responsible for formatting data based on a standard syntax and character set conversion? [CLO 1] A. Transport B. Network C. Presentation D. Session 12. Determine the main function of the transport layer. [CLO 1] A. Node-to-node delivery B. End-to-end message delivery C. Synchronization D. Updating and maintenance of routing tables
  • 5. CONFIDENTIAL FP303 COMPUTER NETWORK Page 5 of 15 13. Identify application layer protocol used to support file transfers between a client and a server. [CLO 2] A. HTML B. HTTP C. FTP D. Telnet 14. Based on the statement above, which of the following network address belong to this host? [CLO 2] A. 176.33.0.0 B. 176.33.33.0 C. 176.33.68.0 D. 176.33.65.30 15. Which default subnet mask provides the most host bits? [CLO 2] A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255 16. Which of the following addresses is an example of a broadcast address on the network 123.10.0.0 with a subnet mask of 255.255.0.0? [CLO 2] A. 123.255.255.255 B. 123.10.255.255 C. 123.13.0.0 D. 123.1.1.1 IP address: 176.33.68.16 Subnet mask: 255.255.0.0
  • 6. CONFIDENTIAL FP303 COMPUTER NETWORK Page 6 of 15 17. Which statement describes a straight-through cable? [CLO 1] i. It maps a wire to the same pins on both ends of the cable ii. Two devices directly connected and using different pins to transmit and receive iii. Two devices directly connected and using same pins to transmit and receive iv. T568A on one end of the cable and T568B on the other end of the same cable A. i and ii B. i and iii C. ii and iii D. ii and iv 18. Based on the statement above, identify the type of connection cable. [CLO 1] A. Cross-over B. Cross-line C. Straight-through D. Roll Over 19. Based on the statement given above, which of the following type of media meet the requirements? [CLO 1] A. STP B. UTP C. Single-Mode Fiber D. Multimode Fiber  Router port to router port  Switch port to switch port  Switch port to hub port  Hub port to hub port A network administrator is required to use media in the network that can run up to 100 meters in cable length without using repeaters. The chosen media must be inexpensive and easily installed. The installation will be in a pre- existing building with limited cabling space.
  • 7. CONFIDENTIAL FP303 COMPUTER NETWORK Page 7 of 15 It is often used to connect a TV set to the signal source, be it a cable TV outlet, satellite TV, or conventional antenna. 20. Which of the following types of channels moves data relatively slow? [CLO 1] A. Wideband channel B. Voiceband channel C. Narrowband channel D. Broadband channel 21. Identify the function of Ping and Tracert commands. [CLO 1] A. Tracert shows each hop, while ping show a destination reply only B. Ping shows whether the transmission is unsuccessful; tracert does not C. Both ping and tracert can show results in a graphical display D. Tracert uses IP addresses; ping does not 22. Which of the following describes each router through which a packet travels when moving between source and destination networks? [CLO 1] A. NOC B. ISP C. Segment D. Hop 23. Which elements are required to successfully connect to the Internet? [CLO 1] A. File sharing enabled B. A network connection C. Server services enabled D. An address obtained directly from the RIR 24. Based on the statement above, which type of media would be the BEST to meet these requirements? [CLO 1] A. STP B. UTP C. Coaxial D. Fiber
  • 8. CONFIDENTIAL FP303 COMPUTER NETWORK Page 8 of 15 25. Identify the purpose of nslookup. [CLO 1] A. Display network connection B. Display route taken to destination C. Displays IP configuration information D. Directly queries the name server for information on a destination domain 26. The inner core of an optical fiber is ________________in composition. [CLO 1] A. glass or plastic B. copper C. bimetallic D. liquid 27. Determine the major factor that makes coaxial cable less susceptible to noise than twisted pair cable. [CLO 1] A. Inner conductor B. Diameter of cable C. Outer conductor D. Insulating material 28. Determine the factor of IEEE 802.11 wireless technology which is able to transmit further distances than Bluetooth technology. [CLO 2] A. Has higher power output B. Uses better encryption methods C. Transmits at much lower frequencies D. Transmits at much higher frequencies 29. Which of the following describes the importance of security in wireless networks? [CLO 2] A. Wireless networks are typically slower than wired networks. B. Televisions and other devices can interfere with wireless signals. C. Environment factors such as thunderstorm can affect wireless networks. D. Wireless networks broadcast data over a medium that allows easy access.
  • 9. CONFIDENTIAL FP303 COMPUTER NETWORK Page 9 of 15 30. Classify the access-point feature which allows a network administrator to define what type of data can enter the wireless network. [CLO 3] A. Traffic filtering B. Hacking block C. Authentication D. Encryption 31. Match the function of WEP and EAP in wireless network. [CLO 2] A. Encrypt and authenticate users on B. Filter traffic and select the operating frequency for C. Identify the wireless network and compress data on D. Create the smallest wireless network and limit the number of users on
  • 10. CONFIDENTIAL FP303 COMPUTER NETWORK Page 10 of 15 Figure 2: Linksys Interface 32. Refer to Figure 2. In the Wireless menu of a Linksys integrated router, which of the following configuration options allow the presence of the access point to be known to nearby clients? [CLO 2] A. Network Mode B. Network Name (SSID) C. Standard Channel D. SSID Broadcast 33. Which method of attack is used to try to guess passwords or to decipher an encryption code? [CLO 2] A. Phishing B. Brute force C. Data manipulation D. Distributed denial of service
  • 11. CONFIDENTIAL FP303 COMPUTER NETWORK Page 11 of 15 34. Identify the method of phishing attack. [CLO 2] A. by e-mail B. by telephone C. by VOIP D. through a person they know in common 35. The statement above refers to _________________________________ [CLO 3] A. adware B. pop-ups C. spyware D. pop-unders 36. Based on the statement above, determine the most likeable cause of the problem. [CLO 3] A. The hub is unplugged B. The web server is down C. The user’s workstation is not connected to the network D. The server is not routing protocols to your workstation Type of program installs and gathers personal information, including password and account information from a computer without the permission or knowledge of the user program install and gathers personal. You’ve been called in to troubleshoot a network in corporate intranet web server. The users are complaining that they can’t access corporate intranet web server. The users receive “Host Not found” error while accessing web server address. Several minutes later, another user reported the same problem. At the same time, users still send e-mail and transfer files to another server.
  • 12. CONFIDENTIAL FP303 COMPUTER NETWORK Page 12 of 15 37. Which of the following troubleshooting techniques are suitable for both home networks and large corporate networks? [CLO 3] i. Having a backup ISR ii. Running a network monitoring application iii. Documenting the troubleshooting processes iv. Keeping record of system upgrades and software versions A. i and ii B. ii and iii C. iii and iv D. i and iv 38. Identify the main factor that prevents the hosts to connect to network. [CLO 3] A. Operator error B. Cabling problems C. Equipment failure D. Addressing problems 39. Based on the situation given above, determine the correct action to troubleshoot this problem. [CLO 3] A. Attach a different keyboard B. Add the PC to your network to see if it can communicate with other PCs C. Attach the PC to the Internet to check its operating system website for patches D. Boot the PC and run anti-virus and anti-spyware application from an external drive. 40. Determine the next action that should be taken once a problem is resolved. [CLO 3] A. Consult an FAQ B. Escalate the problem C. Update the documentation D. Run remote access software A network administrator is troubleshooting a computer that is operating strangely. It boots slowly, programs will not load, and the keyboard responds very slowly.
  • 13. CONFIDENTIAL FP303 COMPUTER NETWORK Page 13 of 15 SECTION B SUBJECTIVE (50 marks) Instruction: This section consists of TWO (2) subjective questions. Answer ALL the questions in the answer booklet. QUESTION 1 Figure 3: Topology Y a) i. Refer to figure 3, name the type of network topology. [CLO 1] (1 marks) ii) Describe TWO (2) advantages and TWO (2) disadvantages of the network topology in question a) i. [CLO1] (4 marks) b) Describe the common transmission flaws affecting data signals below: [CLO 1] (6 marks) i) Noise ii) Attenuation iii) Latency
  • 14. CONFIDENTIAL FP303 COMPUTER NETWORK Page 14 of 15 c) i) Identify network devices operate in OSI model Layers [CLO 1] (3 marks) OSI model Layer Network device Network Layer Data Link Layer Physical Layer Scenario A ii) Draw the network design for this network using all information in scenario A above. [CLO 2] (4 marks) d) Describe the differences between straight-through cable and cross over cable [CLO 1] (3 marks) e) Describe the importance of Internet Protocols (IP). [CLO 1] (4 marks) Company ABC needs to build a simple network in new branch office with the following characteristics: i. 2 workstation ii. 1 switch iii. 1 server iv. IP address 192.168.1.1 until 192.168.3
  • 15. CONFIDENTIAL FP303 COMPUTER NETWORK Page 15 of 15 QUESTION 2 a) Describe the relationships of ISP and internet. [CLO 1] (2 marks) b) Wireless technologies i) Wireless systems are systems that do not use wires to send information but rather transmit it through the air. The growth of wireless systems creates several opportunities for attackers. Explain THREE (3) methods to avoid WLAN attacks. [CLO 3] (6 marks) ii) Describe TWO (2) basic modes of WLAN installations. [CLO 2] (2 marks) c) You’ve been asked to help troubleshoot a problem that is occurring in your polytechnic’s computer lab. Students are complaining about viruses that are infecting the thumb drives they bring to computer lab. How can you help solve this situation? [CLO 3] (6 marks) d) Explain social engineering and phishing in networking [CLO 2] (3 marks) e) Classify THREE (3) physical problems in network and explain how to solve each problem. . [CLO 3] (6 marks)