Professional Documents
Culture Documents
i) Which IPv4 address can be pinged to test the internal TCP/IP operation of a host?
a)192.168.1.1
b)0.0.0.0
c)255.255.255.255
d)127.0.0.1
ii) A host is accessing a Telnet server on a remote network. Which function is performed by
intermediary network devices during this conversation?
a) Regenerating data signals
b) acting as a client or a server
c) providing a channel over which messages travel
d) serving as the source or destination of the messages
iii) Which statement is true about DHCP operation?
a) When a device that is configured to use DHCP boots, the client broadcasts a DHCPDISCOVER
message to identify any available DHCP servers on the networK.
b) A client must wait for lease expiration before it sends another DHCPREOUEST message.
c) The DHCPDISCOVER message contains the IP address and sub net masK to be assigned, the IP
address of the DNS server, and the IP address of the default gateway.
d) If the client receives several DHCPOFFER messages from different servers, it sends a unicast
DHCPREOUEST message to the server from which it chooses to obtain the IP information.
iv) Which type of wireless security is easily compromised?
a)EAP
b)PSK
c)WEP
d)WPA
v) What types of addresses make up the majority of addresses within the /8 block 1Pv4 bit space?
a) Multicast addresses
b) private addresses
c) public addresses
d) experimental addresses
vi) Which protocol supports rapid delivery of streaming media?
a) Video over Internet Protocol
b)Real-Time Transport Protocol
c)Transmission Control Protocol
d)Secure File Transfer Protocol
1
vii) A network administrator notices that the throughput on the network appears lower than
expected when compared to the end-to-end network bandwidth. Which factor can explain this
difference?
a) the amount of traffic
b)the type of data encapsulation in use
c)the bandwidth of the connection to the ISP
d)the reliability of the network backbone
viii) Which group of IPv6 addresses cannot be allocated as a host source address?
a)FECO::/10
b)FEBF::/10
c)FF00::/8
d)FDFF::/7
ix) A host PC is attempting to lease an address through DHCP. What message is sent by the server
to the client know it is able to use the provided IP information?
a)DHCPDISCOVER
b)DHCPOFFER
c)DHCPPREQUEST
d)DHCPACK
x) Which statement describes the characteristic of fiber-optic cabling?
a) Fiber-optic cabling uses LEDs for single-mode cables and laser technology for multimode
cables.
b) Fiber-optic cabling does not conduct electricity.
c) Fiber-optic cabling has high signal loss.
d) Multimode fiber-optic cabling carries signals from multiple sending devices.
xi) Which two protocols function at the internet layer?
a)ARP
b)ICMP
c)BOOTP
d)PPP
xii) Which firewall technique blocks incoming packets unless they are responses to internal
requests?
a) URL filtering
b) port filtering
c) application filtering
d) stateful packet inspection
xiii) Which communication tool allows real-time collaboration?
a) Weblog
b) wiki
c) e-mail
d) instant messaging
xiv) Which of the following are primary functions of a router?.
a) packet switching
b)microsegmentation
c)flow control
d)domain name resolution
xv) At a minimum, which address is required on IPv6-enabled interfaces?
a)global unicast
b)link-local
c)site local
d)unique local
xvi) Which frame forwarding method receives the entire frame and performs a CRC check to
detect errors before forwarding the frame?
a) fragment-free switching
b) fast-forward switching
2
c)store-and-forward switching
d)cut-through switching
xvii) A company is expanding its business to other countries. All branch offices must remain
connected to corporate headquarters at all times. Which network technology is required to
support this requirement?
a)MAN
b)WLAN
c)WAN
d)LAN
xviii) Which statement best describes the operation of the File Transfer Protocol?
a) An FTP client uses a source port number of 21 and a randomly generated destination port
number during the establishment of control traffic with an FTP Server.
b) An FTP client uses a source port number of 20 and a randomly generated destination port
number during the establishment of data traffic with an FTP Server.
c) An FTP server uses a source port number of 20 and a randomly generated destination port
number during the establishment of control traffic with an FTP client.
d) An FTP server uses a source port number of 21 and a randomly generated destination port
number during the establishment of control traffic with an FTP client.
xix) Which IP addresses is private?
a)10.172.168.1
b)172.32.5.2
c)192.167.10.10
d)224.6.6.6
xx) What is the purpose of ICMP messages?
a)to inform routers about network topology changes
b) to ensure the delivery of an IP packet
c) to monitor the process of a domain name to IP address resolution
d) to provide feedback of IP packet transmissions
ii. “A Firewall is one of the most effective security tools available for protecting
internal network users from external threats. A firewall resides between two or
more networks and controls the traffic between them as well as helps prevent
unauthorized access.” Provide three (3) techniques that firewall products use for
determining what is permitted or denied access to a network. (3 marks )
iii. Explain the two (2) types of DOS attacks that. Security administrators need to be
aware of and ensure that their networks are protected. ( 3 marks )
ii) From the given computer configurations, find the network address for each and explain how
these computers can be connected to a switch to form a network. Show clearly how you get the
network address
CONFIGURATION PC0 PC1
IP ADDRESS 192.168.4.2 192.168.4.100
SUBNET MASK 255.255.255.0 255.255.255.0
DEFAULT GATEWAY 192.168.4.1 192.168.4.1
( 5 Marks)
iii) Explain the roles of each of the TCP/IP Model layers used to describe network
communications. ( 2 Marks )
6 . A network was formed by connecting devices as per the following logical topology. Study it and
answer the following questions.
4
a) Provide 3 reasons to explain if the PC with the above configurations has internet connectivity or
not? (3 Marks )
b) Explain why the default gateway and the dhcp server logical addresses are similar? Is it right?
(3 Marks )
c) Using 4 steps briefly explain how the Carrier Sense Multiple Access with Collision works . (4
marks )
7. An organization named KIBELA LTD developed a network topology as shown below to secure
their networks from attacks. Study it carefully and answer the questions that follow.
a. Explain the type of security configuration shown above and the types of attacks that it can
mitigate. ( 2 Marks )
b. If a host is to access both of the two servers simultaneously, what is the importance of
placing the WEB Server between the two routers and the FTP server as shown above?( 2
Marks )
c. “Modern WLANs incorporate various technologies to help secure the data on the WLAN:
incorrect configuration of any of these can prevent communication.” Explain three (3)
5
common settings that when configured incorrectly will hinder WLAN communications.
( 3 Marks )
d. A student on a PC opened a web browser and requests a web page from a web server. This
starts the process of sending the web page to the client from the destination server.
Explain how the protocol stack on a host operates when sending the request messages on
a network to the server and the process of receiving the web page. ( 3 Marks)