You are on page 1of 6

UNIVERSITY OF DAR ES SALAAM COMPUTING CENTRE

END OF SEMESTER ONE EXAMINATION 2015


DIPLOMA IN COMPUTING AND INFORMATION TECHNOLOGY
(NTA LEVEL 5) EXAMINATIONS
CIT 05103 INTRODUCTION TO NETWORKS
TIME: 3 HOURS DATE: JAN 14,
2016
Instructions
(a) This examination consists of sections “A” and “B”.
(b) Section “A” comprises One (1) multiple choice question, one (1) short answer question;
candidates are required to answer ALL.
(c) Section “B” consists of Four (4) candidates are required to answer any THREE questions.
(d) Section “A” weighs 30 marks while in section B, weighs 30 marks
______________________________________________________________________________________________

Section A: Attempt all Questions from this Section

1. Select the correct answers to the following questions. @ 0.5 marks.

i) Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?
a)192.168.1.1
b)0.0.0.0
c)255.255.255.255
d)127.0.0.1
ii) A host is accessing a Telnet server on a remote network. Which function is performed by
intermediary network devices during this conversation?
a) Regenerating data signals
b) acting as a client or a server
c) providing a channel over which messages travel
d) serving as the source or destination of the messages
iii) Which statement is true about DHCP operation?
a) When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER
message to identify any available DHCP servers on the networK.
b) A client must wait for lease expiration before it sends another DHCPREOUEST message.
c) The DHCPDISCOVER message contains the IP address and sub net masK to be assigned, the IP
address of the DNS server, and the IP address of the default gateway.
d) If the client receives several DHCPOFFER messages from different servers, it sends a unicast
DHCPREOUEST message to the server from which it chooses to obtain the IP information.
iv) Which type of wireless security is easily compromised?
a)EAP
b)PSK
c)WEP
d)WPA
v) What types of addresses make up the majority of addresses within the /8 block 1Pv4 bit space?
a) Multicast addresses
b) private addresses
c) public addresses
d) experimental addresses
vi) Which protocol supports rapid delivery of streaming media?
a) Video over Internet Protocol
b)Real-Time Transport Protocol
c)Transmission Control Protocol
d)Secure File Transfer Protocol

1
vii) A network administrator notices that the throughput on the network appears lower than
expected when compared to the end-to-end network bandwidth. Which factor can explain this
difference?
a) the amount of traffic
b)the type of data encapsulation in use
c)the bandwidth of the connection to the ISP
d)the reliability of the network backbone
viii) Which group of IPv6 addresses cannot be allocated as a host source address?
a)FECO::/10
b)FEBF::/10
c)FF00::/8
d)FDFF::/7
ix) A host PC is attempting to lease an address through DHCP. What message is sent by the server
to the client know it is able to use the provided IP information?
a)DHCPDISCOVER
b)DHCPOFFER
c)DHCPPREQUEST
d)DHCPACK
x) Which statement describes the characteristic of fiber-optic cabling?
a) Fiber-optic cabling uses LEDs for single-mode cables and laser technology for multimode
cables.
b) Fiber-optic cabling does not conduct electricity.
c) Fiber-optic cabling has high signal loss.
d) Multimode fiber-optic cabling carries signals from multiple sending devices.
xi) Which two protocols function at the internet layer?
a)ARP
b)ICMP
c)BOOTP
d)PPP
xii) Which firewall technique blocks incoming packets unless they are responses to internal
requests?
a) URL filtering
b) port filtering
c) application filtering
d) stateful packet inspection
xiii) Which communication tool allows real-time collaboration?
a) Weblog
b) wiki
c) e-mail
d) instant messaging
xiv) Which of the following are primary functions of a router?.
a) packet switching
b)microsegmentation
c)flow control
d)domain name resolution
xv) At a minimum, which address is required on IPv6-enabled interfaces?
a)global unicast
b)link-local
c)site local
d)unique local
xvi) Which frame forwarding method receives the entire frame and performs a CRC check to
detect errors before forwarding the frame?
a) fragment-free switching
b) fast-forward switching
2
c)store-and-forward switching
d)cut-through switching
xvii) A company is expanding its business to other countries. All branch offices must remain
connected to corporate headquarters at all times. Which network technology is required to
support this requirement?
a)MAN
b)WLAN
c)WAN
d)LAN
xviii) Which statement best describes the operation of the File Transfer Protocol?
a) An FTP client uses a source port number of 21 and a randomly generated destination port
number during the establishment of control traffic with an FTP Server.
b) An FTP client uses a source port number of 20 and a randomly generated destination port
number during the establishment of data traffic with an FTP Server.
c) An FTP server uses a source port number of 20 and a randomly generated destination port
number during the establishment of control traffic with an FTP client.
d) An FTP server uses a source port number of 21 and a randomly generated destination port
number during the establishment of control traffic with an FTP client.
xix) Which IP addresses is private?
a)10.172.168.1
b)172.32.5.2
c)192.167.10.10
d)224.6.6.6
xx) What is the purpose of ICMP messages?
a)to inform routers about network topology changes
b) to ensure the delivery of an IP packet
c) to monitor the process of a domain name to IP address resolution
d) to provide feedback of IP packet transmissions

2. Match the correct item from list A against list B


LIST A LIST B
a)Overloading a web server to reduce its performance i)Virtualization
preventing legitimate users from accessing it
b)Changing the grade received for a university course ii) ant- virus
from a C to an A in the student records database
c)Obtaining personal information to impersonate iii) Data manipulation
another and obtain credit
d)Software installed on an end user workstation or iv) Identity theft
server to detect and remove viruses, worms and
Trojan horses from files and email
e)Software installed on an end user workstation to v)anti spyware
detect and remove spyware and adware
f)Software installed on an end user workstation or vi)spam filter
server to identity and remove unwanted emails
g)Software applied to an OS or application to correct vii)Disruption of service
a known security vulnerability or add functionality
h)The ISP must store and support the many service viii)Patches and updates
that they provide their customers, such as DHCP
,email ,web server
i)The ISP has users using DSL technology ix)Servers
j) Enables multiple copies of an OS to be run on a x) DSLAM
single set of hardware.
( 10 Marks )
3. i) Briefly describe the layers and their function in Cisco’s hierarchical design of a network.
( 7 marks )
ii) Mention three UTP cable type and their uses? (3 marks)
3
Section B: Attempt any THREE questions from this section

4. Provide the correct answers to the following questions;

i. “Connectivity problems occur on wireless networks, wired networks and networks


that use both. When troubleshooting a network with both wired and wireless
connections, it is often best to troubleshoot using a divide-and -conquer technique
to isolate the problem to either the wired or wireless network.” Provide four (4) step
processes to determine if a problem is with the wired or the wireless network.( 4
marks)

ii. “A Firewall is one of the most effective security tools available for protecting
internal network users from external threats. A firewall resides between two or
more networks and controls the traffic between them as well as helps prevent
unauthorized access.” Provide three (3) techniques that firewall products use for
determining what is permitted or denied access to a network. (3 marks )
iii. Explain the two (2) types of DOS attacks that. Security administrators need to be
aware of and ensure that their networks are protected. ( 3 marks )

5. i)Briefly write down essays on the following requirements


“One factor that affects how well a message is received and understood is timing. People
use timing to determine when to speak, how fast or slow to talk, and how long to wait for a
response. These are the rules of engagement.” Explain three (3) rules of engagement with
respect to network communication.
( 3 Marks )

ii) From the given computer configurations, find the network address for each and explain how
these computers can be connected to a switch to form a network. Show clearly how you get the
network address
CONFIGURATION PC0 PC1
IP ADDRESS 192.168.4.2 192.168.4.100
SUBNET MASK 255.255.255.0 255.255.255.0
DEFAULT GATEWAY 192.168.4.1 192.168.4.1
( 5 Marks)

iii) Explain the roles of each of the TCP/IP Model layers used to describe network
communications. ( 2 Marks )

6 . A network was formed by connecting devices as per the following logical topology. Study it and
answer the following questions.

4
a) Provide 3 reasons to explain if the PC with the above configurations has internet connectivity or
not? (3 Marks )
b) Explain why the default gateway and the dhcp server logical addresses are similar? Is it right?
(3 Marks )
c) Using 4 steps briefly explain how the Carrier Sense Multiple Access with Collision works . (4
marks )

7. An organization named KIBELA LTD developed a network topology as shown below to secure
their networks from attacks. Study it carefully and answer the questions that follow.

a. Explain the type of security configuration shown above and the types of attacks that it can
mitigate. ( 2 Marks )
b. If a host is to access both of the two servers simultaneously, what is the importance of
placing the WEB Server between the two routers and the FTP server as shown above?( 2
Marks )
c. “Modern WLANs incorporate various technologies to help secure the data on the WLAN:
incorrect configuration of any of these can prevent communication.” Explain three (3)

5
common settings that when configured incorrectly will hinder WLAN communications.
( 3 Marks )

d. A student on a PC opened a web browser and requests a web page from a web server. This
starts the process of sending the web page to the client from the destination server.
Explain how the protocol stack on a host operates when sending the request messages on
a network to the server and the process of receiving the web page. ( 3 Marks)

You might also like