You are on page 1of 18
SULIT Pactra MALAYS|A——— BAHAGIAN PEPERIKSAAN DAN PENILAIAN JABATAN PENDIDIKAN POLITEKNIK KEMENTERIAN PENDIDIKAN MALAYSIA JABATAN. KEJURUTERAAN ELEKTRIK PEPERIKSAAN AKHIR. SES! DI EMBER 2014 EC301; COMPUTER NETWORKING FUNDAMENTALS TARIKH ; 07 APRIL 2015 MASA +830 -10.30 PAGI Kertas ini mengandungi ENAM BELAS (16) halaman bercetak, Bahagian A: Objektif (20 soalan) Bahagian B: Struktur (10 Soalan) Bahagian C: Bsei (2 soalan) Dokumen sokongan yang disertakan Kas. ion b / Tiada JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIARAHKAN (CLO Yang tertera hanya sebagai Tujukan) cLoI cl Lol © suit EC 301: COMPUTER NETWORKING FUNDAMENTALS SECTION A : 20 MARKS BAHAGIAN A : 20 MARKAH INSTRUCTION: This section consists of TWENTY (20) objective questions. Mark your answers in the OMR form provided. | ARAHAN : | Bahagian ini mengandingi DUA PULUH (20) soalan objeltif. Tandakan jawapan | anda di dalam borang OMR yang disediakan |1. What is the device designated to boost the signal when the signal loses its strength as it passes along a cable? Apakah alat yang digunakan untuk meningkatkan isyarat apabila kekuatan isyarat berkurangan semasa melalui kabel? A. “Router” B. Gateway / Pinta Laluan C. Bridge / Jambatan Jaringan D. Repeater / Pengulang F network over Which of the following is an advantage of using a clientiser | using a peer-to-peer network ? Yang manakah antara yang berikaut adalah kelebihan menggunakan ‘client/server network’ berbanding ‘peer-to-peer network’? A. A client/server network is simpler to set up. ‘Client/server network: lebih mudah untuk dipasang. B, A client/server network allows for easier expansion. ‘Client/server network’ membolehkan penambahan dengan mudah, C. — Actient/server network does not require a network operating system. ‘Client/server network’ tidak memerlukan sisiem operasi rangkaian, A client/server network is less expensive to set up. “Client/server network’ lebih mahal untuk dipasang. SULIT suLit IEC 301: COMPUTER NETWORKING FUNDAMENTALS chor [3 In topology. @ central hub is used to connect the network together. cl | Dalam topologi___, ‘central hub’ digumakan untuk menghubungkan | rangkaian. A, Bus/ Bas. B. — Ring/Gelung C. — Star/ Bintang | D. Hybrid / Hibrid cLOL c2 4 The is the physical path over which a message travels. ____ adalah tatuan fiikal untuk membolehkan perpindahan mese} j A. Protocol/ Protokol. ) B. — Signall Jsyarar, | C.— Channel/ Saluran. | D. Medial Medium. | cor |S. Which layer is responsible for packet sequencing, acknowledgments, and tort requests for retransmission? | Lapisan yang mana bertanggungjawab untuk susunan dalam paket, ‘maklumathalas, dan permintaan untuk penghantaran semula? | A. Physical / Fizikal. B. Data Link/ Data” C.— Transport/ Pengankutan. D. _ Network/ Rangkaian, SULIT a C30: ComPUTER NETWORKING. FUNDAMENTALS Why was the OSI mod developed? Mengapa mode} OS! dibangunkan? Standérds were neede, Piawa any 1Wo system: Nat Yang Sesuai dipertukey D. None of ihe above. | Seonues be ) "Iku tidak berkaitan, cor |) cr satu rangkaian A. Bridge / Jambetan Jaringan Bo “Huy | Co Switeh 7 Suis. | D, Repeater / Pengutang CLor The last three/ Tiga yang. lerakhir The first three Tiga yang The last 0 / Dua yang The fi ‘eraaval ferakhir It Wo! Dua yang teranval suuir LOS cl CLO3 cl EC 301: COMPUTER NETWORKING FUNDAMENTALS Which of the following is NOT a mode type data transmission? Yang manakah anava berikut BUKAN jenis ragam penghantaran data? A. Simplex transmission Penghantaran simpleks B. _ Half-simplex transmission Penghantaran separul-simpleks C.— Half-duplex transmission J Penghantaran separub-dupleks D. _ Full-duplex transmission Penghantaran dupleks penuh What is the technology that has been used to modify analog signals to make them suitable for carrying data over a communication path? sarat agar ianyaa Apakah teknologi yang diguunakan untuk mengubahsuat is sesuai untuk membawa data melalui taluan komuunikasi? Modem/ Modem 4- Coniraller/ Pengawwal + C.— Bandwidth/ Lebar Jalur D. Data modulation/ Pemodulatan data Which of the following is NOT a data transmis n media? Yang manokah di amtara berikut BUKAN media penghantaran data? A. Twisted pair cable 7 Kabel pasangan berpintal B, Television antenna Antenna televisyen SULIT SULIT EC 301: COMPUTER NETWORKING FUNDAMENTALS | I | C. Fiber optic eable ~7 Kabel gentian optik D. Coaxial cable Kabel sepaksi~ yi CLO3 | 12. Which statement is TRUE about point to point transmission? Pernyataan yang manakah BENAR tentang penghantaran tttk ke 1itik? & A. Data transmission involves only one transmitter and one receiver Penghantaran data melibatkan hanya satu penghartar dan satu penerina, B. Data transmission involves one transmitter and multiple receivers. Penghantaran data melibatkan satu penghanar dan pelbagai ipenerima. jon involves multiple transmitters and one receiver. Penghantaran data melibatkan pelbagai penghantar dan satu penerima, D. Data transmission involves multiples transmitter and receiver. Penghantaran data melibaikan pelbagai penghantar dan pelbagai | | i | | C. Data transmis i | CLO3 | 13. Where do ISPs get the public addresses that they assign to end user? cl ot ret Di mana ISP mendapatkan alamet awam yang mereka agihkan kepada pengguna? A. ISPs create the addresses themselves ISP mewujudkan alamat-alamat sendiri ISP mendapatkan alamat-alamat dari RFC. ISP obtains their addresses automatically. x ISP mendapatkan alamat-alamat secara automatik | i | | | B. _ISPsare assigned addresses through the RFC. -} | 1 D, —ISPs-obtains addresses block from registry organization. ISP mendapatakan alamet-alamat dari pendafiar organisasi 6 SULIT CLO3 cl CLO3 cl SULIT 44.) Select the TRUE statement regarding the : TRUE statement re EC 301: COMPUTER NETWORKING FUNDAMENTALS, ing and tracert commande Pilih kenyctaan yang BETUL mengenai arahan ping dan tracert AL Is, ‘racert shows each hop; while ping shows destination reply. Tracert menunjukkan setiap node; manakala ping memmjukkan maklumbalas destinasi ‘Tracert uses IP address; ping uses MAC address. Traceri menggunakan alamat IP:manakala ping menggumakan alamat MAC, Both ping and tracert can show result in a graphical display. Ping dan tracert boleh memmjukkan keputusan dalam paparan grafik Ping shows whether the transmission is successful; tracert does not. ) Ping menunjukkan samada penghantaran berjaya; manakala tracert “+ sida. What are the advantages of wireless over wired technology eless over wired techno Apakah kelebihan teknologi tanpa wayar berbanding teknologi dengan wayar ili D. More secure Lebih selamat Ease of adding additional device Mudah menambah alatan tambahan ) Longerrange —_/ Jarak yang lebih besar Anytime, anywhere connectivity ~/ Hubungan bila-bila masa, di mana sahaja i and iii iiand iii iiandiv iii and iv SULIT suLIT EC 301: COMPUTER NETWORKING FUNDAMENTALS CLO3 (ie) Choose the best statement about the importance of security in wireless network. cl ae Pilih pernyataan yang tepat tentang kepentingan keselamatan dalam rangkaian fanpa wayar A. Wireless networks are typically slower than wired networks. Rangkaian tanpa wayar selalunya lebih perlahan daripada rangkaian dengan wayar B. _ Televisions and other devices can interfere with wireless signals. Televisyendan alatan lain boleh menyebabkan ganzguan kepada isyarat tampa wayar | C. Wireless networks broadcast data over a medium that allows easy access, Rangkaian tanpa wayar menyebarkan data melalui perantaraan yang muda dicapai D. Environmental factors such as thunderstorms can affect wireless networks. Fakior persekitaran seperti rebut petir boleh menganggu rangkaian tanpa wayar CLO3_|17. What type of attacks best described the situation when a hacker contacts you cl by phone or email and attempts to acquire your passwords? Apakah jenis serangan untuk menggambarkan keadaan apabila penggodam menghubungi anda melalui telefon atau email dan cuba mendapatkan kata Taluan emda? ‘A. Bugging/ Pepijai B. _Phishing/ Phishing C.—Spamming’ Spamming D. Vishing/ Fishing | | SULIT CLO3 cl CLOS cl SULIT R NETWORKING FUNDAMENTALS 18. r A file is downloaded from the internet. After the user opens the downloaded file, the user's hard drive crashes and all information on the computer is lost. Swarr fail telah dinwai turun dari imernet, Selepas pengguna membuka fail yang dimuat turun tersebut, penacu keras pengguna mengalami kerosakan | dan semua makhumat pada komputer telah hitang. PEELE eee eerie eee eee eer eee eee eee] Based on statement above, what type of attack occurred? Berdasarkan penyataan di atas, apakah jenis serangan yang telah berlaku? A. Worn Cecacing B. Vieus Virus C. Spyware Spyware D. Trojan Horses. Trojem Horses 19, Security threats from network intruders ean come from both and external sourees. Ancamen keselamatan daripada penceroboh rangkaian boleh ditwndang dari dua sumber iaitu dan luaran A. Firewall Firewall B. intemal Dalian C. Resource Sumber D.__ Devices Peranti SULIT suLir EC 301: COMPUTER NETWORKING FUNDAMENTALS CLO3 | 20, You work as a senior technician in the IT department. A trainee approaches i ¥y displays ‘you with a question, He needs to know which command line ut indows XP computer, How the Media Access Control (MAC) address of a would you answer? Anda bekerja sebagai juruteknik kanan di Jabatan IT. Seorang pelatih A telah | menghampiri anda dengan satu persoalan. Pelatih A itu ingin mengetalui arahan wiliti bagi memaparkan Media Access Control (MAC) dengan menggunakan sistem pengoperasian komputer Windows XP. Bagaimana anda membantu pelatih A itu? @ ) A. ipconfig /release ipconfig /all | | C. ipconfig /renew D. acer: /all | 0 Suir |suuir EC 301: COMPUTER NETWORKING FUNDAMENTALS SECTION B : 30 MARKS BAHAGIAN B : 30 MARKAH INSTRUCTION: | This section consists of TEN (10) structured questions, Answer ALL questions. | ARAHAN: | Baliagian ini mengancngi SEPULUH (10) soalan berstruktur, Jawvab semua soalan lays Wea [ite CLOI | QUESTION ¥ guogmpicod (orld) ot : = BHM = 1 SONOpS List THREE (3) characteristic of a Wide Area Network (WAN). SOALAN 1 Sout | |_Senaraikan TIGA (3) cir-ciri Rangkaian Kawasan Meluas (WAN). z (3 marks] i [3 markah : >) cLol | QUESTION 2 ) ce Explain briefly the functions of the following Local Area Network (LAN) connectivity hardware, [ i. Repeater | fi Bridge iii, Router | | | soaLan2 | Teramgkan fungsi perkakasan sambungan Rangkaian Kawasan Tempatan (LAN) berikut ji. Repeater | i Bridge | it — Router \ [Marks] \ [3Markah} | | SULIT CLOI cl cLo2 cl jsunrr EC 301: COMPUTER NETWORKING FUNDAMENTALS { QUESTION 3 aathis Data Link Layer is the second layer in OSI Reference Model. List THREE (3) protocols of Data Link Layer. SOALAN 3 Lapisan Data Link adalah lapisan kedua dalam OSI Model Rujukan, Senaraikan TIGA (3) daripada protokol Lapisan ‘Data Link’ [3Marks} [3Markah] QUESTION 4 Define Public and Private IP Address, SOALAN 4 Takrifian ‘Public’ dan ‘Private’ alamat IP. [3Marks] [UMarkah] QUESTION § ‘Telecommunication links can broadly be classified into two categories, guided media and unguided media. State THREE (3) types of guided media, SOALAN 5 Hubungan telekommikasi secara umunnya diklasifikasikan kepada dua kategor! iaitu media herpandi dan media tidak berpandu Nyatakan TIGA (3) jenis media berpandu [3 marks} [3-markah] oegned suur per sMortpevt pret Yond ean = pat series phe | one | suurt EC 301: COMPUTER NETWORKING FUNDAMENTALS | cLon | QUESTION 6 c2 Referring to Diagram BG, identify the phenomena happened at A, B and C in signal propagation of wireless transmission SOALAN 6 Merujuk kepada Diagram B6, kenalpasti fenomana yang berlaku di A, B dan C datam penyebaran isyarat bagi penghantaran tanpa wayar. Diagram B6/ Rajah BG [3 marks} | [3 markah] | | cLo2 QUESTI | List THREE (3) types of the Internet Hosting Service provided Internet Service Provider. | SOALAN7 Senaraikan TIGA (3) jenis ‘Perkhidmatan Internet Hosting’ ditawarkan oleh syarikat Pembekal Perkhidmatan Internet (ISP). [3 marks} [3 markah] | CLO3 C3 cLo3 cl CLO3 C3 ( suner ECOL: COMPUTER NETWORKING FUNDAMENTALS | QUESTION 8 | llustrate scenavio for each network categories, | SOALANS | Beri gambaran senario untuk setiap jenis ategori rangkaian berikut i WPan | ii, WLAN ii, — WWAN i [3 marks} (3 markan} | { QUESTION 9 i THREE () types of threat that may arise when a hacker gains access to ametwork. |SOALAN 9 Senaraikan TIGA (3) jenis ancaman Jang mingkin berlaku apabila pengodam berjaya mendapal capaian ke rangkaian [3 marks) L markah} | QUESTION 10 | There are several different structured ‘roubleshooting techniques available. List THREE @) of them, | SOALAN 10 | Terdapat beberapa teknik penyelesaian ma salah bersiruktur yang sedia ada. Senaraikan | TIGA (3) daripada teknik itn i {3 marks] [3 markah} suLIT | suurr EC 301: COMPUTER NETWORKING FUNDAMENTALS, | SECTION C: 50 MARKS | BAHAGIAN C: 50 MARKAH | INSTRUCTION: ‘This section consists of TWO (2) essay questions, Answer ALL questions. | ARAHAN: | Bahai in mengandungi DUA (2) soalan ese. nwa SEMUA soalan. apaipieh QUESTION 1 ink jut a is SOALAN-1 wok gat a CLO3 | (a) Data transmission depends on the mode that is used. Explain the: “THREE (3) modes of a | WN transmission. | Penghantaran data bergantung kepada mod yang digunakan, Terangkan TIGA (3) mod | | £ [9 marks] {9 markah penghantarantersebut sews ee | yoo CLO3 i (b) List THREE (3) types ee in data pee and give differences between them. @e | | senaraikan TIGA (3) jens gangguan dalam penghamtaran data dan berikan perbezaaan | | amtara gangeuan itn | 19 marks] | [9 markah CLOB | (e) Explain the comparison between Shielded Twisted Paited (STP) and Unshielded Twisted @ j Pai UTP) the in terms of throughput, nose immunity, size and sealabity and cost. | Teramekan perbandingan di antara “Shielded Twisted Paired” (STP) dan “Unshielded | Twisted Paired (UTP) dari segi pemprosesam, imuniti hingar, sate, skala dan kos \ uP. see {rms ee ya Senne stale (7 markany ee p cable wre VAG 81 ae pom AP | yp gow 00 i ‘SULIT clo} cl cLOl a cLoi c cLoL C3 1 | | | | | | | | i i | | | SULIT EC 301: COMPUTER NETWORKING FUNDAMENTALS QUESTION 2 SOALAN 2 (a) Define the internet. Definisikan internet. Weme [3 marks] [3 markah (b) With an appropriate diagram, describe the relationships of ISP and internet. Berpandukan rajah yang sesuai, terangkan Iubungan antara ISP dan interne. (©) List FOUR (4) ISP in Malaysia. Senaraikan EMPAT (4) ISP di Malaysia. — ass. [4 marks] colo [4 markah (4) Company A want to setup a wireless network for their company. Given 2 wireless route! technician, you need to setup a network . 6 laptops and | modem. As a networ! that connects from ISP to the clients, Sketch the network connection and explain how to troubleshoot the network connection using ping and tracert command. Syarikat A mala memasang rangkaian tanpa wayar di pejabat mereka. Di beri, 2 bual router” tanpa wayar, 6 buah Komputer riba dan sebuah modem, Sebagai juruteknik rangkaian . anda di kehendaki mebueu pemasangan bermmula dari ISP ke pelanggan. Lakarkan gambarajah penyvambungan rangkaian dan terangkan bagaimana untuk ‘membuat pemeriksaan penyambungan rangkaian dengan menggunakan arahan ‘ping %, Won dan ‘irocert. & % B [6 marks} [6 markah) SOALAN TAMAT 16 SULIT

You might also like