You are on page 1of 14
CONFIDENTIAL MAY 2013 / SET A/ TNW2023 / TNW2043 KBTM™M KOLES POLY-TECH MARA FINAL EXAMINATION COMPUTER NETWORK / INTRODUCTION TO COMPUTER NETWORK COURSE CODE : TNW2023 / TNW2043 DURATION B 3 HOURS INSTRUCTION TO CANDIDATES : 1. This question consists of TWO(2) parts: PART A (20 Questions) PART B (4 Questions) 2, Answer ALL questions in the Answer Booklet provided. 3. Do not bring any material into the examination hall unless permission is given by the invigilator. 4. Please write your answer using a ball-point pen IC. NO. ID. NO. LECTURER SECTION DO NOT OPEN THE QUESTION PAPER UNTIL YOU ARE TOLD TO DO SO The question paper consists of 14 printed pages CONFIDENTIAL CONFIDENTIAL, MAY 2013 / SET A / TNW2023 / TNW2043 PART A 1. LAN Is distinguished from other kinds of networks by three characteristics. Which of them is NOT LAN characteristic? A. Size B. Cable C. Topology D. Transmission Technology 2. A of network which covers more than 10 kilometer but less than 100 km radius is most probably categorized as which type of network? A. WAN B. MAN C. LAN D. PAN 3. Ensures that the correct recipient receives and processes the data that is sent, That statement refer to _ A. Arbitration B. Addressing C. Error Detection D. Identification of the encapsulated data 2 CONFIDENTIAL CONFIDENTIAL, MAY 2013 / SET A / TNW2023 / TNW2043 4. The Statement below refer to | known as layer 3 network device | Known as layer 2 network device because it functions on network | because it functions on data link layer of layer of OSI ost A. Router and Hub » Bridge and Router . Bridge and Switch D. Router and Bridge 5. What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model? A. Internet B. Application C. Host-to-Host D. Network Access 6. It occurs primarily in Token Ring environments. The sender decides the path that its data should follow. This statement refers to ‘A. Transparent bridging B. Translational bridging C. Source-route bridging D. Source-route Translational bridging 3 CONFIDENTIAL, CONFIDENTIAL MAY 2013 / SET A / TNW2023 / TNW2043 7. Study the following diagram; Diagram 1 : Router, switch and hub What is the collision and broadcast domain respectively? 10, A B. c., D. Tand1 7and2 10 and 11 10 and 12 ‘Which of the following is an example of DTE? A B. ©. D. Modem, Routers File server Interface cards ‘What network topology is defined by IEEE 802.4 standard? A B. @ D. uc Token Bus Token Ring 100BaseFX What does MSAU stand for? A 8. c. D. More Access Unit Multipath Access Unit Messaging Access Unit Muttistation Access Unit 4 CONFIDENTIAL, CONFIDENTIAL, MAY 2013 / SET A / TNW2023 / TNW2043 11. Which of the following is NOT 100VG-AnyLAN cable types? ‘A. Fiber Optic B. 4-pair Category 3 UTP ©. 1-pair Category 3 UTP D. 2-pair Category 4 or 5 UTP 12. Which of the following protocol uses token passing for media access? A. FDDI B. 10Base2 C. Wireless D. 100BaseT 13. What is the length of an ATM cell? A. 32 bytes B. 48 bytes C. 64 bytes D. 53 bytes 14. What is the coverage range for IEEE 802.119? A. Bott B. 75ft ©. toon D. 175 15. Wireless technologies are differentiated by the following EXCEPT A. Protocol B. Distance C. Spectrum Type D. Connection type 5 CONFIDENTIAL, CONFIDENTIAL MAY 2013 / SET A / TNW2023 / TNW2043 16. 17. 18. 19, There are two protocols for IPSec. Which of the following is one of it? A. LAG B. ESP c. PPP D. LeTP Under what category of WAN technologies does Frame Relay belongs to? A. Leased lines B. Cell-switched C. Circuit-switched D. Packet-switched ‘What is the correct channel specification for BRI? A. 2B channel + 2D channel B. 2B channel + 1 D channel C. 23.B channel +1 D channel D. 23 Bchannel +2 D channel . The ISDN reference point that define interface between NT1 and NT 2 is known as: SO DP c40>D 6 CONFIDENTIAL CONFIDENTIAL, MAY 2013 / SET A / TNW2023 / TNW2043 20. It provides higher downlink speed compared to upli A. Very High DSL (VDSL) B. Symmetric DSL (SDSL) C. Intermediate DSL (IDSL) D. Asymmetric DSL (ADSL) (Total : 20 Marks) 7 CONFIDENTIAL, CONFIDENTIAL MAY 2013 / SET A / TNW2023 / TNW2043 PARTB QUESTION 1 a. List any TWO(2) types of computer devices and give TWO(2) examples each of it (2 marks) b. What is the function of Application layer? (2 marks) ¢. List THREE(3) names of LAN MAC address. (3 marks) d. State any THREE(3) functions of bridges. (8 marks) 8 CONFIDENTIAL, CONFIDENTIAL, MAY 2013 / SET A / TNW2023 / TNW2043 e. Find the broadcast domain and collision domain for the following network diagram. Diagram 2: Router that connect 2 switch Device Broadcast Domain Collision Domain ‘| RIB 7 _ swi ee _ (@ marks) Device Switch 1 - | (@ marks) 9 CONFIDENTIAL, CONFIDENTIAL, MAY 2013 / SET A / TNW2023 / TNW2043 {. Whats the access method for IEEE 802.42 (1 marks) 9. Briefly explain about routed protocol and give ONE(1) example of routed protocol. (3 marks) (Total : 20 marks) 10 CONFIDENTIAL, CONFIDENTIAL MAY 2013 / SET A/ TNW2023 / TNW2043 QUESTION 2 @. Explain about the gigabit Ethernet. List TWO(2) names of IEEE standard for gigabit Ethernet, (4 marks) b. List any THREE(3) types of devices defined in FDDI. (3 marks) c. Differentiate between SAS and DAS. (4 marks) d. List FOUR(4) FD! specification, (4 marks) @. Illustrate the relationship between VPI and VCI (3 marks) {. Differentiate between LAN Emulation Client and LAN Emulating Server (2 marks) (Total : 20 marks) 4 CONFIDENTIAL, CONFIDENTIAL MAY 2013 / SET A / TNW2023 / TNW2043 QUESTION 3 a. Briefly explain about LAN Emulation, ( marks) b. Identify TWO(2) base station implemented in 802.11. (2 marks) ¢. List and explain THREE(3) types of tunnelling protocols. (6 marks) d. Give TWO(2) types of Layer 2 Tunnelling Protocol (L2TP) (2marks) ©. What is IPSec? List TWO(2) central protocols of IPSec. (3 marks) Briefly explain about frame relay technology. (4 marks) (Total : 20 marks) 12 CONFIDENTIAL CONFIDENTIAL, MAY 2013 / SET A / TNW2023 / TNW2043 QUESTION 4 a. State and explain any TWO(2) operational states in Switched Virtual Circuit (4 marks) b. List FOUR(4) types of ISDN reference point. (4 marks) ©. Beside a computer and a telephone line, what are the THREE (3) other devices that are required to setup ADSL at home? (3 marks) 4. Explain spiiter. (2 marks) ©. List FOUR(4) example of Network attacks that you know. (4 marks) 13 CONFIDENTIAL CONFIDENTIAL MAY 2013 / SET A / TNW2023 / TNW2043 1. State the type of network attack for the following diagram below and list TWO(2) method to prevent it. (3 marks) maticious traffic YEE raticious Router GEIS control over at 4M bonatian Diagram 4: Network threat (Total : 20 marks) (TOTAL : 100 MARKS) END OF PAPER 14 CONFIDENTIAL,

You might also like