Professional Documents
Culture Documents
MARKING GUIDES
SECTOR: ICT
TRADE: NETWORKING
RTQF LEVEL: 4
DURATION: 3 HOURS
DATE: TIME:
INSTRUCTIONS TO CANDIDATES:
Materials allowed:
1. VLSM:
2. CIDR:
Answer:
Answer:
Route summarization:
Known as route aggregation, is the process of advertising a continuous set of
addresses as a single address with a less-specific, shorter subnet mask.
ANSWER:
Answer:
A. ROM security
B. Rogin & banners /1mark
C. Physical security /1mark
D. Password /1mark
ANSWER:
B, C and D
1. T,
2. F,
3. T,
4. T
Reference: LU4: Troubleshoot router
LO4.1: Identify and correct common problems associated with IP addressing
and host configurations
325 | P a g e curriculum level 4 YEAR 2014
Question 9. What are the troubleshooting steps for the route? (3marks)
ANSWER:
Answer:
ANSWER:
ANSWER:
Class C
(PERFORM ROUTING) Page 5 of 18 – Marking Guides
Reference: LU3: Configure and verify Routing Protocols
LO3.1: Apply Class full routing protocols,320 | P a g e curriculum level 4
YEAR 2014
Question 13. Which command line utilities that can be used to check:(4marks)
a. TCP/IP configurations
b. Test the connectivity
ANSWER:
a. Ipconfig /2 marks
b. Ping /2 marks
Question 14. Choose three (3) private IP Addresses from the following:
(3marks)
A. 10.1.1.1
B. 172.32.5.2
C. 192.167.10.10
D. 172.16.4.4
E. 192.168.5.5
F. 224.6.6.6
ANSWER: A, D and E
a. To which class of IP Address does the above IP Address and its Default
Mask belong to?
ANSWER:
1. The process steps:
• Rearrange from lowest to highest
192.168.1.0/24, 192.168.0.0/24, 192.168.3.0/24 192.168.2.0/24.
192.168.0.0/24
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
2. Drop IP address and convert lowest and highest ID to binary.
192.168.0.0: 11000000 10101000 00000000 00000000
192.168.3.0: 11000000 10101000 00000011 00000000
3, 4 and 5 Find matching bits of where bits stop matching and drow line
to right of where bits stop matching then Bring down all matching bits to
begin forming SupernetID or Route Aggregation.
Using Line or brackets }
192.168.0.0: 11000000 10101000 000000}00 00000000
192.168.3.0: 11000000 10101000 000000}11 00000000
SupernetID: 11000000 10101000 000000} those bits are matching the
other’s
6. Convert supernetID binary back to decimal
SupernetID:192.168.0.0
7. Count number of matching bits for supernet subnet mask(S/M)
Subnet mask will be 255.255.252.0 and the CIDR Supernet:192.168.0.0/22
ANSWER:
/2marks
Question 19. A network comprises of two routers, each router has switch
connected to it and each switch has one pc connected to it, Label network ID,
interfaces and host ID.
ANSWER:
Router01>enable
Router01 (config-router)#exit
Router01 (config)#exit
Router01>enable
Router02(config)#exit
ANSWER:
Question 21. List two (2) examples of network access devices. (2marks)
Answer:
Network access devices
Ex: Switch and Access point
315 | P a g e
Subnets use different subnet All subnets use same subnet mask.
masks.
It supports only classless routing It supports both classfull and classless routing
protocols. protocols.
Answer:
The console port is the management port which is used by administrators to log
into a router directly without using a network connection. You require a
terminal emulator application like HyperTerminal or putty to connect to router.
Question 24. List at least three (3) Router Hardware Components. (3marks)
1. CPU
2. ROM
3. RAM
4. NVRAM
5. Flash Memory
6. Interfaces
7. Buses
8. Power Supply
ANSWER:
A. An overlapping IP address occurs when an IP address is
assigned to more than one device on a network. This can
happen if you have identical subnets in different locations
monitored by different DHCP servers on the same network.
/1mark
B. The message "Invalid IP Address" indicates a problem with your
computer's network setup. Without a valid IP address, your
computer cannot use the network. /1mark
C. Bad mask? If the network you are currently on is a class C, the
subnet mask would be 255.255.255.0 and info in that packet
looks to be destined for a mask of 255.255. 255.252. Therefore,
it cannot communicate with that packet and flags is “bad”.
/1mark
D. Network interface does not become active I used system-
config-network-guide to config & enable Ethernet interface.
Problem is, when the system starts, the Ethernet
does not become enabled. /1mark
E. The Attempted or Failed means that we were not able to
successfully send a message to the delivery provider. /1mark
Question 26: Refer to the figure below, write down necessary cisco command to be
used by configuring RIPV1 to assure packet routing from one router to another.
ANSWER:
Router01>enable
Router01 (config-router)#exit
Router01 (config)#exit
Router01>enable
Router0(config-router)#network 172.17.0.0
Router0(config)#exit
Router02(config-router)#network 172.20.0.0
Question 27. Give and explain different types of router memory. (4marks)
Question 28: Explain the following terms and give one (1) example for each.
a. Unicast:
b. Multicast:
c. Broadcast: (3marks)
Example:
Browsing a website. Web server is the sender and your computer is the
receiver
Downloading a file from FTP Server FTP Server is the sender and your
computer is receiver
Example: Switches by design will forward the broadcast traffic and routers by
design will drop the broadcast traffic
Answer:
ANSWER:
This is the main or the first mode that one can access on a router. It is limited
to few verification and troubleshooting commands. By default, authentication is
not required but as best practice we will configure security so as to ensure
protection of our routers.
On accessing the router, you will notice the prompt that ends with this symbol
“>” after the router’s name. By default the name of the router is usually
“Router“. This prompt is shown below.
Router>
In this mode, we can view basic information using the “show” command.
This is the second mode in the IOS CLI. In this mode, we can view various
troubleshooting and verification commands such as “show and debug“. By
default, this mode is also not secured, as best practice we will also secure this
mode using a password.
This mode is denoted by the HASH (#) symbol proceeded by the name of the
router. To enter this mode, we issue the command “enable” from the user exec
mode.
NOTE: To move from the user exec mode to the privileged mode the command –
“enable” should be entered from the user exec mode.
The “disable” command is used to exit the privileged exec mode and return to
the user exec mode.
Router (config)#
NOTE: To enter this mode from the privileged exec mode we enter the
command: “Configure terminal”
There are other specific configuration modes on the router. These are entered in
the global configuration mode and are used to configure various functions and
options on the router such as the interfaces, routing options, console lines
among others. The specific configuration mode commands will be discussed
progressively throughout the course.