Professional Documents
Culture Documents
MARKING GUIDES
SECTOR: ICT
TRADE: NETWORKING
RTQF LEVEL: 4
DURATION: 3 HOURS
DATE: TIME:
INSTRUCTIONS TO CANDIDATES:
Materials allowed:
Marking Scheme:
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams. /2marks)
Reference: (LU1, Conduct Site Survey, LO1, Study of the network structure and
the environment, Curriculum level 4 Networking, page 239, year 2014)
1. Server
4. Transmission medium
Marking Scheme:
1. Server: Servers are computers that hold shared files, programs, and the
network operating system. Servers provide access to network resources to
all the users of the network.1mark
2. Network Interface Card: The NIC prepares (formats) and sends data,
receives data, and controls data flow between the computer and the
network. 1mark
3. Network operating system: The network operating system is a program
that runs on computers and servers, and allows the computers to
communicate over the network. 1mark
4. Transmission medium: Transmission media are the facilities used to
interconnect computers in a network, such as twisted-pair wire, coaxial cable,
Reference: (LU1, Conduct Site Survey, LO1, Study of the network structure and
the environment, Curriculum level 4 Networking, page 239, year 2014)
Marking scheme
a. T 1mark
b. T 1mark
Reference: (LU1, Conduct Site Survey, LO1, Study of the network structure and
the environment, Curriculum level 4 Networking, page 239, year 2014)
Question 4. List down the common network problems found in the network.
/5 marks
Marking Scheme:
1. Large print jobs on the server that will spool and take a lot of resources.
This usually occurs when using a network printer attached to a server. 1mark
Reference: (LU1, Conduct Site Survey, LO1, Study of the network structure and
the environment, Curriculum level 4 Networking, page 239, year 2014)
Marking Scheme:
There are two main types of transmission media: guided and unguided.
Reference: (LU1, Conduct Site Survey, LO1, Study of the network structure and
the environment, Curriculum level 4 Networking, page 240, year 2014)
Marking Scheme:
While
Reference: (LU1, Conduct Site Survey, LO1, Study of the network structure and
the environment, Curriculum level 4 Networking, page 240, year 2014)
Question 7. What are the alternatives for solving network problems? /2marks
Marking Scheme:
1. Disable the power management settings in Windows that allow the computer
to turn off the monitor or hard drives to save power. /1mark
2. Viruses, spyware and adware can also be the cause. Run scans with fully
updated viral and spyware software. /1mark
Marking Scheme:
Authorization is the process of validating that the authenticated user has been
granted permission to access the requested resources. /2 marks
Question 10. Name four (4) pillars of information assurance (IA). /4 marks
Integrity 1 mark
Availability 1 mark
Confidentiality 1 mark
Marking Scheme:
2. Support workers do not tell other people what is in a client’s file unless they
have permission from the client 1 mark
3. Information about clients is not told to people who do not need to know 1 mark
4. Clients’ medical details are not discussed without their consent 1 mark
5. Adult clients have the right to keep any information about them confidential,
which includes that information being kept from family and friends. 1 mark
Question 12. What are the types of information that are considered as
confidential? /4 marks
Marking scheme
/4 marks
Marking Scheme:
/1 mark
authorization is the process of validating that the authenticated user has been
granted permission to access the requested resources. 1 mark
Question 14. With one (1) example for each, explain two (2) network
connectivity verification tools. /4 marks
Marking Scheme
Ping:
Ping is a tool that sends test packets through the network to a
destination of your choice and measures the response time. The ping
command is a Command Prompt command used to test the ability of
the source computer to reach a specified destination computer. The
Trace route
A trace route: is a function, which traces the path from one network to
another. It allows us to diagnose the source of many problems. 1 mark
Reference: (LU1, Conduct Site Survey, LO2, Verify network status, Curriculum
level 4 Networking, page 242, year 2014)
Marking Scheme:
Reference: (LU1, Conduct Site Survey, LO2, Verify network status, Curriculum
level 4 Networking, page 242, year 2014)
Marking Scheme:
In order for your network to work properly, every piece of the network must
Marking Scheme
4. Lower repair costs, because there will be fewer secondary failures (when
parts fail in service they often damage other parts) 1 mark
Question 18. List network components that may fail for performing their tasks
while they are functioning. /4 marks
Marking Scheme
1 mark
Devices such as hubs, switches, bridges and routers that are used to control
the network. 1 mark
Marking Scheme
Reference: (LU2, Conduct Site Survey, LO1, Study of the network structure and
the environment, Curriculum level 4 Networking, page 244, year 2014)
Question 20. Which precautions maybe taken for preventing and solving the
problems maybe occurred on the network? /5marks
Marking scheme
Marking scheme
Question 22. Explain four (4) main common network problems /4marks
Marking scheme
1. Cable Problem: Cables that connect different parts of a network can be cut
or shorted. A short can happen when the wire conductor comes in contact with
another conductive surface, changing the path of the signal. Cable testers can
be used to test for many types of cable problems such as: Cut cable, incorrect
cable connections, Cable shorts, Interference level, Connector Problem. /1 mark
/1 mark
Question 23. How do you know you have successfully completed problem
identification? /3 marks
Marking Scheme
Marking Scheme
Marking Scheme
Check the physical connections. Check that the Link light red or green light
next to the RJ-45 port. /1 mark
Verify that you can log on, when you’re sure the physical connections are
good, you should attempt to log on to each of your network computers using a
valid domain user account. 1 mark
Check the network configuration, Click the Start button, type cmd and press
Enter. Then, enter the command ipconfig /all and press Enter. 1 mark
a. The printer
b. IP address
d. User
Marking Scheme
A, B, and D are incorrect because they are not items that you would check
first. You may verify the IP address, but you check that the network cable is
plugged in first.
Reference: (LU2, Conduct Site Survey, LO2, Study of the network structure and
the environment, Curriculum level 4 Networking, page 246, year 2014
Question 27. Select and compare five (5) network testing tools. /5 marks
Marking scheme:
2. Netalyzr /1mark
If you’re looking for a network-debugging tool, this is a good choice. This tool
lets user test internet connections to identify problems and output in the form
of the detailed report show security/performance issues.
3. FortiTester /1mark
This is a very powerful tool, which lets users measure the performance of
network devices.
This is very handy and simple tool, which lets the user find out if ports are
open, or not. This allows testing multiple ports through a specific IP address.
Question 28. Organize the components of the report on the work done.
/4 marks
Marking Scheme
Reference: (LU3, Documents the work done, LO1, Document on network status,
Curriculum level 4 Networking, page 248, year 2014)
Question 29. Show the elements should appear in any network documentation.
/4 marks
Marking Scheme
Physical topology diagram: This should show all the network devices
and how they are physically connected to each other. 1 mark
Logical topology diagram: This should show how everything is
connected to each other. Protocols that are used, VLAN information etc.
1 mark
Interconnections: It’s useful to have a diagram that shows which
interfaces of one network device are connected to the interface of another
network device. 1 mark
Inventory: You should have an inventory of all network equipment,
vendor lists, product numbers; software versions, software license
information and each network device should have an organization tag
assess number. 1 mark
IP Addresses: You should have a diagram that covers all the IP addresses
in use on the network and on which interfaces they are configured.
Configuration management: Before changing a configuration we should
save the current running-configuration so it’s easy to restore to a previous
(working) version. It’s even better to keep an archive of older
configurations for future use.
Design documents: Documents that were created during the original
design of the network should be kept so you can always check why
certain design decisions were made. It’s also a good idea to work with
step-by-step guidelines for troubleshooting or using templates for certain
configurations that all network engineers agree.
Reference: (LU3, Document the work done, LO2, Report on the work done,
Curriculum level 4 Networking, page 248, year 2014
Marking Scheme
Below that, on the left, place the recipient's name (if known) and
address. 0.5 mark
Open the letter with a formal business greeting. ... 0.5 mark
Dear Sir or Madam, (if you don't know the recipient's name) 0.5
mark
Reference: (LU3, Document on the work done, LO3, Write technical journal and
recommendation Curriculum level 4 Networking, page 250, year 2014)