FINAL examination COURSE DATA COMMUNICATION and NETWORKING 3 HOURS SESSION 2007 / 2008 SEMESTER II BCNIBCS COURSE CODE LECTURER DATE DURATION SESSION / SEMESTER PROGRAMME CODE INSTRUCTIONS TO CANDIDATES 1. This question paper consists of TWO (2) Parts. Answer ALL questions in part a and part B. All answers to a new question should start on
FINAL examination COURSE DATA COMMUNICATION and NETWORKING 3 HOURS SESSION 2007 / 2008 SEMESTER II BCNIBCS COURSE CODE LECTURER DATE DURATION SESSION / SEMESTER PROGRAMME CODE INSTRUCTIONS TO CANDIDATES 1. This question paper consists of TWO (2) Parts. Answer ALL questions in part a and part B. All answers to a new question should start on
FINAL examination COURSE DATA COMMUNICATION and NETWORKING 3 HOURS SESSION 2007 / 2008 SEMESTER II BCNIBCS COURSE CODE LECTURER DATE DURATION SESSION / SEMESTER PROGRAMME CODE INSTRUCTIONS TO CANDIDATES 1. This question paper consists of TWO (2) Parts. Answer ALL questions in part a and part B. All answers to a new question should start on
Universiti
Malaysia
PAHANG
FACULTY OF COMPUTER SYSTEMS & SOFTWARE ENGINEERING
FINAL EXAMINATION
COURSE : DATA COMMUNICATION &
NETWORKING
COURSE CODE q BCN 1053
LECTURER : MOHD FADLI BIN ZOLKIPLI
MUHAMMED RAMIZA BIN RAMLI
DATE c 2 MAY 2008
DURATION E 3 HOURS
SESSION/SEMESTER = SESSION 2007/2008 SEMESTER IL
PROGRAMME CODE : BCN/BCS
INSTRUCTIONS TO CANDIDATES
1. This question paper consists of TWO (2) Parts. Answer ALL questions in
Part A and Part B,
2. All answers to a new question should start on new page.
3. Full Mark for this exam is 50 MARKS.
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO
This examination paper consists of ELEVEN (11) printed pages including front page.CONFIDENTIAL BCN/BCS/07081/BCN10S3
PART A: MULTIPLE CHOICES QUESTION [20 Marks}
Instruction: This part contains 20 questions. Answer all questions.
1
‘When connectionless protocols are implemented at the lower layers of the OST
model, what is usually used to acknowledge that the data was received and to
request the retransmission of missing data?
P
UDP
Ethernet
a connectionless acknowledgement
an upper-layer, connection-oriented protocol or service
mOODD
Refer to the Figure 1. Each media link is labeled. What type of cable should be
used to connect the different devices?
Figure 1
‘A. Connection 1 - rollover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
B. Connection 1 - crossover cable
Connection 2 - rollover cable
Connection 3 - crossover cable
C. Connection 1 - straight-through cable
Connection 2 - crossover cable
.Connection 3 - crossover cable
D. Connection’ - straight-through cable
Connection 2 - crossover cable
Connection 3 - straight-through cable
E. Connection 1 - crossover cable
Connection 2 - straight-through cable
Connection 3 - crossover cable
3. Which OSI layer does IP rely on to determine whether packets have been lost and
to request retransmission?
A. Application C. Session
B. Presentation D. Transport
E. IntemetCONFIDENTIAL, BCN/BCS/07081/BCN1053
4. APC can not connect to any remote websites, ping its default gateway, or ping a
printer that is functioning properly on the local network segment. Which action
will verify that the TCP/IP stack is functioning correctly on this PC?
A
B.
c.
D.
E.
Use the ipconfig /all command at the host’s command prompt
Use the ping 127.0.0.1 command at the command prompt.
‘Use the traceroute command at the command prompt to identify any
failures on the path to the gateway.
Use FTP to check for connectivity to remote sites.
Download a troubleshooting too! from the PC manufacturer's website.
5. Refer to the Figure 2. The diagram represents the process of sending email
between clients. Select the list below that correctly identifies the component or
protocol used at each numbered stage of the diagram.
mOOm>
Figure 2
1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA
1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA
1.MUA 2.POP 3.SMTP 4.MDA S.MTA 6.SMTP7.POP 8.MUA
L.MDA 2.SMTP 3.MTA 4,SMIP 5S.MTA 6.MUA 7.POP 8MDA
1.MUA 2.SMTP 3.MTA 4.SMIP 5.MTA 6.MDA 7.POP 8MUA
6. A routing issue has oceurred in you internetwork. Which of the following type of
devices should be examined to isolate this error?
A
B.
c.
access point D. router
host E. switch
hub
pet a FS
3CONFIDENTIAL, BCN/BCS/0708IVBCN1053
7. Examine the graphic in Figure 3 with current configurations. Host A in the
Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was
successful, the replacement computer can not access the company network. What
is the likely cause of the problem?
192.188.100.85/27
192.168.100.7527
‘Admit: 192.168.100.66/27
Figure 3
A. IP address incorrectly entered D. network card failure
B, network cables unplugged E. no problem
C. subnet mask incorrectly entered
8. Refer to the Figure 4, A network technician is trying to determine the correct IP
address configuration for Host A. What is a valid configuration for Host A?
4 192.168.1.0 128
192.168.100.17 128
192.168.100.18 (28
Figure 4
A. IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default
Gateway: 192.16.1.2
B. IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default
Gateway: 192.168.100.17
C. IP address: 192,168.100.21; Subnet Mask: 255.255.255.248; Default
Gateway: 192.168.100.18
D. IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default
Gateway: 10.1.1.5
E. IP address: 192.168,100.30; Subnet Mask: 255.255.255.240; Default
Gateway: 192.168.1.1CONFIDENTIAL BCN/BCS/0708IUBCN1053
9.
10.
uM.
Which password is automatically encrypted when it is created?
A. vty D. enable secret
B. aux E. enable password
C. console
Due to a security violation, the router passwords must be changed. What
information can be learned from the following configuration entries?
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line}# login
The entries specify three Telnet lines for remote access.
The entries specify four Telnet lines for remote access.
The entries set the console and Telnet password to "c13c0".
Telnet access will be denied because the Telnet configuration is
incomplete.
"e13c0" is not the compulsory password for using Telnet.
pop
nm
Refer to the Figure 5. What fact can be determined from the information that is
given?
Router Router
Figure 5
‘A. This exchange is part of the three-way handshake,
B. The source port indicates that a Telnet session has been initiated,
C. The data is flowing from server to client.
D. The data listed is associated with the transport layer.
E. The source port does not support communication with the destination port
that is listed.CONFIDENTIAL, BCN/BCS/070811/BCN1053
12, Refer to the Figure 6. Host A attempts to establish a TCP/IP session with host C.
During this attempt, a frame was captured with the source MAC address
0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet
inside the captured frame has an IP source address 192.168.7.5, and the
destination IP address is 192,168.219.24. At which point in the network was this
packet captured?
192.4687.5128 492,468.22.2 24 192.168.219.24.24
Device | __NIC MAC agi MAC FaQ/t MAC Fat MAG
host A | 0007.4F74.AC0e
ost B | 0007.C264.3421
(0006 5264, E03
00305596 DEBT | 0030 8506 DER el
(0060,7320.0801 | 00807520,0632 _ | 0060.7520.8828
'0080,8517.44C3 | 0030.8517.4404
Figure 6
A. leaving host A D. leaving NYC
B. leaving ATL E, leaving host C
C. leaving Dallas
13. The Layer 4 header contains which type of information to aid in the delivery of
data?
A. service port number D. virtual connection
B. host logical address identifier
C. device physical address E. type of communication
mediaCONFIDENTIAL, BCN/BCS/07081V/BCN1083
14, Refer to the Figure 7. A network administrator remotely accesses the CLI of
RouterB from PCI using Telnet. Which statement is true about this connection?
Figure 7
‘A. The data is automatically encrypted.
B. A Telnet server process is running on PCI
C. The connection is made through a VTY session on the router.
D. A GET request was sent to RouterB to retrieve data during this session.
E, A Telnet server process is running on PC2
15. Refer to the Figure 8. On the basis of the IP configuration that is shown, what is
the reason that Host A and Host B are unable to communicate outside the local
network?
Host A, Host B
IP Address IP Address
172.16.4.48 127 172.164.5927
Gateway Address Gateway Address
472.164.6327 172.164.6327
Figure 8
‘A. Host A was assigned a network address.
B. Host B was assigned a multicast address.
C. Host A and Host B belong to different networks.
D. Host A and Host B using different operating system.
E. The gateway address was assigned a broadcast address.CONFIDENTIAL, BCN/BCS/07081/BCN1053
16. Which range of port numbers are reserved for services that are commonly used by
applications that run on servers?
A. 010255 D. 49152 to 65535
B. Oto 1023 E. 2110 80
C, 1024 to 49151
17. During the encapsulation process, which identifiers are added at the transport,
layer?
two networks routing the packets
two applications communicating the data
two hosts at either end of the communication
‘two nodes on the local network exchanging the frame
two routing algorithm on router
mOOw>
18, Refer to the Figure 9. Host A is transmitting data to host B. What addresses will
host A use to for the destination IP and MAC addresses in this communication?
ypmow, giamors
ee oe ae eBEE
Figure 9
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62
Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62
Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75
Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75
PoOmP
19. Which prompt represents the appropriate mode used for the copy running-config
startup-config command ?
A. Switch-6J> D. Switch-6J(config-if}#
B. Switch-6J# E. Switch-6J(config-line)#
C. Switch-6)(config)#CONFIDENTIAL BCN/BCS/0708IUBCN1053
20. Refer to the Figure 10, How many collision domains are there?
Figure 10
A. Two D. Five
B. Three E. Six
C. FourCONFIDENTIAL, BCN/BCS/070SI/BCN1053
PART B: STRUCTURE QUESTIONS [30 Marks]
Instruction: This part contains THREE (3) questions. Answer all questions.
QUESTION 1 (10 Marks}
‘TCP network model use four layer reference models. Describe the responsibilities of each
layer including an example of related protocol and the encapsulation process that
happened,
QUESTION 2 [10 Marks}
Faculty of Computer System & Software Engineering, UMP has acquired a Class C
address, 192.168.1.0. Faculty needs to create subnets to provide low level security and
broadcast control on the LAN
The LAN consists of the following, each of which will require its own subnet:
Multimedia Lab with 28 nodes
Software Lab with 22 nodes
Network Lab with 30 nodes
Lecturer with 12 nodes
Administration with 8 nodes
It is unnecessary to supply an address for the WAN connection as The Internet service
provider provides it. Without using a Variable Length Subnet Masking (VLSM),
calculate and answer the following question:
How many subnets are needed for this network?
‘What is the subnet mask for this network in dotted decimal?
How many usable hosts are there per subnet?
List down the five usable subnet that can be use (start from subnet 0)
What is the host range for subnet three?
£. What is the broadcast address for the major network?
10CONFIDENTIAL BCN/BCS/07081V/BCN1053
QUESTION 3 [10 Marks}
Given a Class A network address of 10.0.0.0 / 24 answer the following questions.
aes Pp
How many bits were borrowed from the host portion of this address?
‘What is the subnet mask for this network in dotted decimal?
‘What is the subnet mask for this network in binary?
How many usable sub-networks are there?
How many usable hosts are there per subnet?
What is the host range for usable subnet sixteen?
What is the network address for usable subnet sixteen?
What is the broadcast address for usable subnet sixteen?
What is the broadcast address for the last usable subnet?
‘What is the broadcast address for the major network?
END OF QUESTION PAPER
Ml