You are on page 1of 11
Universiti Malaysia PAHANG FACULTY OF COMPUTER SYSTEMS & SOFTWARE ENGINEERING FINAL EXAMINATION COURSE : DATA COMMUNICATION & NETWORKING COURSE CODE q BCN 1053 LECTURER : MOHD FADLI BIN ZOLKIPLI MUHAMMED RAMIZA BIN RAMLI DATE c 2 MAY 2008 DURATION E 3 HOURS SESSION/SEMESTER = SESSION 2007/2008 SEMESTER IL PROGRAMME CODE : BCN/BCS INSTRUCTIONS TO CANDIDATES 1. This question paper consists of TWO (2) Parts. Answer ALL questions in Part A and Part B, 2. All answers to a new question should start on new page. 3. Full Mark for this exam is 50 MARKS. DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO This examination paper consists of ELEVEN (11) printed pages including front page. CONFIDENTIAL BCN/BCS/07081/BCN10S3 PART A: MULTIPLE CHOICES QUESTION [20 Marks} Instruction: This part contains 20 questions. Answer all questions. 1 ‘When connectionless protocols are implemented at the lower layers of the OST model, what is usually used to acknowledge that the data was received and to request the retransmission of missing data? P UDP Ethernet a connectionless acknowledgement an upper-layer, connection-oriented protocol or service mOODD Refer to the Figure 1. Each media link is labeled. What type of cable should be used to connect the different devices? Figure 1 ‘A. Connection 1 - rollover cable Connection 2 - straight-through cable Connection 3 - crossover cable B. Connection 1 - crossover cable Connection 2 - rollover cable Connection 3 - crossover cable C. Connection 1 - straight-through cable Connection 2 - crossover cable .Connection 3 - crossover cable D. Connection’ - straight-through cable Connection 2 - crossover cable Connection 3 - straight-through cable E. Connection 1 - crossover cable Connection 2 - straight-through cable Connection 3 - crossover cable 3. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? A. Application C. Session B. Presentation D. Transport E. Intemet CONFIDENTIAL, BCN/BCS/07081/BCN1053 4. APC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? A B. c. D. E. Use the ipconfig /all command at the host’s command prompt Use the ping 127.0.0.1 command at the command prompt. ‘Use the traceroute command at the command prompt to identify any failures on the path to the gateway. Use FTP to check for connectivity to remote sites. Download a troubleshooting too! from the PC manufacturer's website. 5. Refer to the Figure 2. The diagram represents the process of sending email between clients. Select the list below that correctly identifies the component or protocol used at each numbered stage of the diagram. mOOm> Figure 2 1.MUA 2.MDA 3.MTA 4.SMTP 5.MTA 6.POP 7.MDA 8.MUA 1.MUA 2.POP 3.MDA 4.SMTP 5.MTA 6.MDA 7.SMTP 8.MUA 1.MUA 2.POP 3.SMTP 4.MDA S.MTA 6.SMTP7.POP 8.MUA L.MDA 2.SMTP 3.MTA 4,SMIP 5S.MTA 6.MUA 7.POP 8MDA 1.MUA 2.SMTP 3.MTA 4.SMIP 5.MTA 6.MDA 7.POP 8MUA 6. A routing issue has oceurred in you internetwork. Which of the following type of devices should be examined to isolate this error? A B. c. access point D. router host E. switch hub pet a FS 3 CONFIDENTIAL, BCN/BCS/0708IVBCN1053 7. Examine the graphic in Figure 3 with current configurations. Host A in the Clerical offices failed and was replaced. Although a ping to 127.0.0.1 was successful, the replacement computer can not access the company network. What is the likely cause of the problem? 192.188.100.85/27 192.168.100.7527 ‘Admit: 192.168.100.66/27 Figure 3 A. IP address incorrectly entered D. network card failure B, network cables unplugged E. no problem C. subnet mask incorrectly entered 8. Refer to the Figure 4, A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A? 4 192.168.1.0 128 192.168.100.17 128 192.168.100.18 (28 Figure 4 A. IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2 B. IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17 C. IP address: 192,168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18 D. IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5 E. IP address: 192.168,100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1 CONFIDENTIAL BCN/BCS/0708IUBCN1053 9. 10. uM. Which password is automatically encrypted when it is created? A. vty D. enable secret B. aux E. enable password C. console Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line}# login The entries specify three Telnet lines for remote access. The entries specify four Telnet lines for remote access. The entries set the console and Telnet password to "c13c0". Telnet access will be denied because the Telnet configuration is incomplete. "e13c0" is not the compulsory password for using Telnet. pop nm Refer to the Figure 5. What fact can be determined from the information that is given? Router Router Figure 5 ‘A. This exchange is part of the three-way handshake, B. The source port indicates that a Telnet session has been initiated, C. The data is flowing from server to client. D. The data listed is associated with the transport layer. E. The source port does not support communication with the destination port that is listed. CONFIDENTIAL, BCN/BCS/070811/BCN1053 12, Refer to the Figure 6. Host A attempts to establish a TCP/IP session with host C. During this attempt, a frame was captured with the source MAC address 0050.7320.D632 and the destination MAC address 0030.8517.44C4. The packet inside the captured frame has an IP source address 192.168.7.5, and the destination IP address is 192,168.219.24. At which point in the network was this packet captured? 192.4687.5128 492,468.22.2 24 192.168.219.24.24 Device | __NIC MAC agi MAC FaQ/t MAC Fat MAG host A | 0007.4F74.AC0e ost B | 0007.C264.3421 (0006 5264, E03 00305596 DEBT | 0030 8506 DER el (0060,7320.0801 | 00807520,0632 _ | 0060.7520.8828 '0080,8517.44C3 | 0030.8517.4404 Figure 6 A. leaving host A D. leaving NYC B. leaving ATL E, leaving host C C. leaving Dallas 13. The Layer 4 header contains which type of information to aid in the delivery of data? A. service port number D. virtual connection B. host logical address identifier C. device physical address E. type of communication media CONFIDENTIAL, BCN/BCS/07081V/BCN1083 14, Refer to the Figure 7. A network administrator remotely accesses the CLI of RouterB from PCI using Telnet. Which statement is true about this connection? Figure 7 ‘A. The data is automatically encrypted. B. A Telnet server process is running on PCI C. The connection is made through a VTY session on the router. D. A GET request was sent to RouterB to retrieve data during this session. E, A Telnet server process is running on PC2 15. Refer to the Figure 8. On the basis of the IP configuration that is shown, what is the reason that Host A and Host B are unable to communicate outside the local network? Host A, Host B IP Address IP Address 172.16.4.48 127 172.164.5927 Gateway Address Gateway Address 472.164.6327 172.164.6327 Figure 8 ‘A. Host A was assigned a network address. B. Host B was assigned a multicast address. C. Host A and Host B belong to different networks. D. Host A and Host B using different operating system. E. The gateway address was assigned a broadcast address. CONFIDENTIAL, BCN/BCS/07081/BCN1053 16. Which range of port numbers are reserved for services that are commonly used by applications that run on servers? A. 010255 D. 49152 to 65535 B. Oto 1023 E. 2110 80 C, 1024 to 49151 17. During the encapsulation process, which identifiers are added at the transport, layer? two networks routing the packets two applications communicating the data two hosts at either end of the communication ‘two nodes on the local network exchanging the frame two routing algorithm on router mOOw> 18, Refer to the Figure 9. Host A is transmitting data to host B. What addresses will host A use to for the destination IP and MAC addresses in this communication? ypmow, giamors ee oe ae eBEE Figure 9 Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.62 Destination MAC: DDDD:DDDD:DDDD Destination IP: 172.22.0.75 Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.62 Destination MAC: BBBB:BBBB:BBBB Destination IP: 172.22.0.75 Destination MAC: EEEE:EEEE:EEEE Destination IP: 172.22.0.75 PoOmP 19. Which prompt represents the appropriate mode used for the copy running-config startup-config command ? A. Switch-6J> D. Switch-6J(config-if}# B. Switch-6J# E. Switch-6J(config-line)# C. Switch-6)(config)# CONFIDENTIAL BCN/BCS/0708IUBCN1053 20. Refer to the Figure 10, How many collision domains are there? Figure 10 A. Two D. Five B. Three E. Six C. Four CONFIDENTIAL, BCN/BCS/070SI/BCN1053 PART B: STRUCTURE QUESTIONS [30 Marks] Instruction: This part contains THREE (3) questions. Answer all questions. QUESTION 1 (10 Marks} ‘TCP network model use four layer reference models. Describe the responsibilities of each layer including an example of related protocol and the encapsulation process that happened, QUESTION 2 [10 Marks} Faculty of Computer System & Software Engineering, UMP has acquired a Class C address, 192.168.1.0. Faculty needs to create subnets to provide low level security and broadcast control on the LAN The LAN consists of the following, each of which will require its own subnet: Multimedia Lab with 28 nodes Software Lab with 22 nodes Network Lab with 30 nodes Lecturer with 12 nodes Administration with 8 nodes It is unnecessary to supply an address for the WAN connection as The Internet service provider provides it. Without using a Variable Length Subnet Masking (VLSM), calculate and answer the following question: How many subnets are needed for this network? ‘What is the subnet mask for this network in dotted decimal? How many usable hosts are there per subnet? List down the five usable subnet that can be use (start from subnet 0) What is the host range for subnet three? £. What is the broadcast address for the major network? 10 CONFIDENTIAL BCN/BCS/07081V/BCN1053 QUESTION 3 [10 Marks} Given a Class A network address of 10.0.0.0 / 24 answer the following questions. aes Pp How many bits were borrowed from the host portion of this address? ‘What is the subnet mask for this network in dotted decimal? ‘What is the subnet mask for this network in binary? How many usable sub-networks are there? How many usable hosts are there per subnet? What is the host range for usable subnet sixteen? What is the network address for usable subnet sixteen? What is the broadcast address for usable subnet sixteen? What is the broadcast address for the last usable subnet? ‘What is the broadcast address for the major network? END OF QUESTION PAPER Ml

You might also like