COMPUTER NETWORKING AUGUST 2022 PAST PAPER

MONDAY: 1 August 2022. Morning paper. Time Allowed: 3 hours.

This paper has two sections. SECTION I has twenty (20) short response questions. SECTION II has three practical questions of sixty (60) marks. All questions are compulsory. Marks allocated to each question are shown at the end of the question.

SECTION I

1. What is the name of an electronic device that allows communication between computers connected through Local Area Network using Internet Protocol (IP)? (2 marks)

2. ___________is a device that creates a wireless local area network, or WLAN, usually in an office or large building? (2 marks)

3. What is the name given to a cable Mr. Liam can use to connect Fast Ethernet port on a PC to a switch port in Local
Area Network? (2 marks)

4. ___________carry very large amounts of data in backbone networks and are used extensively by telephone
companies. (2 marks)

5. What is the name given to a network carrier transmission protocol that is attributed to the following features?
(2 marks)

Effective after a collision

Used in wired networks

Reduces Recovery time

6. ____________ is a network topology in which each network component is physically connected to a central node such as a router, hub or switch. (2 marks)

7. What is the name given to all computers connected to a network that participate directly in network communication? (2 marks)

8. ______________is a type of network topology that lets you see which end devices are connected to which intermediary devices such as routers and the type of media used. (2 marks)

9. Give the name of the cable shown in the diagram below.  (2 marks)

10. The layer of the OSI Model that defines services to segments and reassembles data for individual communication
between end devices is known as___________. (2 marks)

11. Miss Rahma is sending request to a web server to access her gmail account. From her perspective as the client, what would be the correct order of the protocol stack that is used to prepare the request for transmission? (2 marks)

12. Identify the number of valid host addresses available on IPv4 subnet that is configured with /28 mask. (2 marks)

13. __________message type is used by an HTTP client to request data from a preferred web server. (2 marks)

14. _____________________ is a set of rules that govern how devices exchange data across networks. (2 marks)

15. A newly hired Network technician has been tasked to ensure the wireless hosts from one of the conference hall
request an IPv4 address dynamically. What protocol would be used to process the request? (2 marks)

16. _______________is an information technology (IT) infrastructure that allows two/more computer systems to
connect and share resources without a separate server. (2 marks)

17. Which protocol downloads a copy of email messages leaving the original on the server? (2 marks)

18. ______________ is used to configure and identify the hardware in a system such as the hard drive, floppy drive, optical drive, CPU, and memory. (2 marks)

19. When two end devices communicate with each other in the network, which identifier is used at the layer two of the OSI model to uniquely identify an Ethernet device? (2 marks)

20. Contention-based access on a Wireless Local Area Network (WLAN) is managed by which method? (2 marks)

SECTION II

21. The TIA/EIA has specified unshielded twisted pair (UTP) cabling standards for use in LAN cabling environments.
TIA/EIA 568-A and 568-B stipulates the commercial cabling standards for LAN installations; these are the standards most commonly used in LAN cabling for organizations and they determine which color wire is used on
each pin.

Required:
Use the table below to answer questions 1, 2 and 3 below.

1. Identify the pair number for each pin number. (8 marks)

2.Identify the wire color for each pin number. (8 marks)

3.Name the status for 10 and 100 base-T signal for every pin number. (4 marks)

(Total: 20 marks)

22. Use appropriate simulator to configure the topology as shown below

1. Configure IP Address as shown in the topology. (4 marks)

2. From PC-B capture a screenshot displaying the TCP/IP network configuration values. (2 marks)

3. Capture screen showing connectivity between the two computers. (4 marks)

4. From PC-A use appropriate command utility to trace the path to PC-B. (2 marks)

5. From PC-B use appropriate command utility to display routing table. (4 marks)

6. Capture a screenshot showing the mapping between domain name and IP address of the two PCs. (4 marks)

Upload the screenshots you have captured.

(Total: 20 marks)

23. Using appropriate simulator configure the topology as shown below.

1. Enter global configuration mode and assign the switch hostname. (2 marks)

2. Secure privileged EXEC mode access using password kasneb. (4 marks)

3. Display a login banner as follows. (4 marks)
*********************************************************************
ACCESS TO THE SWITCH WITHOUT EXPRESS PERMISSION IS NOT ALLOWED
*********************************************************************
1. Configure SW1 IP address for the switch . (4 marks)

2. Prevent unwanted DNS Lookup. (4 marks)

3. Test connectivity between the switch and the PC. (2 marks)

Upload screenshots to demonstrate how you have performed the above task.

(Total: 20 marks)

(Visited 453 times, 1 visits today)
Share this:

Written by