You are on page 1of 3

REPUBLIQUE DU CAMEROUN REPUBLIC OF CAMEROON

Paix- Travail-Patrie Peace- Work-Fatherland


………… …………
MINISTERE DE L’ENSEIGNEMENT SUPERIEUR MINISTRY OF HIGHER EDUCATION
……………...... ……………......
COMMISSION NATIONALE D’ORGANISATION DE NATIONAL COMMISSION FOR THE ORGANISATION OF
L’EXAMEN DU HND THE HIGHER NATIONAL DIPLOMA (HND) EXAM
…………………… ……………………

Paper: CASE STUDY Sample 2


Paper Code: NWS18
Specialties: NWS
Credit: 12
Duration: 5hrs

INSTRUCTION: Answer all questions. Provide short and précised Answers

SECTION A: Networking (10marks)

Question1 (5marks)

Each question carries 1mark

i. Which network topology is best to achieve redundancy in a network? (1mrk)


ii. Which protocol is used in such a topology in ’i’ above? (1mrk)
iii. Network protocols depend on metrics for packet delivery. What do you understand by
metrics? (1mrk)
iv. which route mode does this refer to? Router(config-router)# (1mrk)
v. When configuring a switch, why do we assign a password on the line vty? (1mrk)

Question 2(Short Structural) (5marks)

Each question carries 1mark

i. Briefly explain what happens in CSMA/CD (1mrk)


ii. As a network administrator, how can you connect remotely in order to configure a
network device? (1mrk)
iii. In the 3tier networking model, what is the function of the access layer. (1mrk)
Page 1 on 3
iv. What is data at Layer 2 called? (1mrk)
v. Which command takes you to this mode? R1(config-if)# (1mrk)

SECTION B: Networking Administration (20marks)

1. Compare and contrast point-to-point connectivity and server-client connectivity. (3mrks)


2. What do you understand by Server core and server GUI? (2mrks)
3. Which type of server will you recommend for industrial use and why? (2mrks)
4. State and explain the three (3) categories of application server. (6mrks)
5. Briefly describe the step by step procedure for creating a domain and joining clients to
that domain. (4mrks)
6. What do you understand by an active directory? (2mrks)
7. What is a domain Controller? (1mrk)

SECTION C: Networking Security (10marks)

Question 1 (Short Structural-Cryptography concepts) 5marks


i. State and describe the four categories of active attack 3mrks
ii. Explain the concept of symmetric and public key algorithm 2mrks

Question 2 (Scenario-Security Measures) 5marks

The CEO of a multinational Tech company noticed his computer was running very slow while
working constantly on the internet, he also noticed he could not access most of the resources in
the company server. After some days he latter noticed the same behavior on all the computers
in the company whenever they are connected. Upon some basic troubleshooting, their IT
technician noticed a security bridge in the system, viruses, Trojan horses and worms in the

Page 2 on 3
system. The worst of all is that, some vital company documents have been tempered with. This
attack also went to the extent of destabilizing their database.

i. List and explain various security bridges that can course a computer to be slow. (1mrk)
ii. What do you understand by Security Bridge? (1mrk)
iii. What could be the reason why the CEO could not access the local server? (1mrk)
iv. What is the first action to take when you notice a security bridge in the network system.
(1mrk)
v. Which type of attack can cause the malfunctioning of the database? (1mrk)

Page 3 on 3

You might also like