You are on page 1of 18

TVET TERM III COMPREHENSIVE ASSESSMENT,

SCHOOL YEAR 2021/2022

MARKING GUIDES
SECTOR: ICT

TRADE: NETWORKING

RTQF LEVEL: 4

MODULE CODE AND TITLE: NWEPR401 PERFORM ROUTING

DURATION: 3 HOURS

DATE: TIME:

INSTRUCTIONS TO CANDIDATES:

THIS EXAM PAPER IS COMPOSED OF THREE SECTIONS OF COMPULSORY


QUESTIONS:

(15) questions in section A 50 marks


(9) questions in section B 30 marks
(6) questions in section C 20 marks

Materials allowed:

(PERFORM ROUTING) Page 1 of 18 – Marking Guides


SECTION A: ATTEMPT ALL QUESTIONS /50 MARKS

Question 1: Classify types of routing protocols. (5marks)


Answer:

Static Routes: /2marks


Static routing is a form of routing that occurs when a router uses a manually
configured routing entry, rather than information from dynamic routing traffic.
Default Routes: is where the packet is forwarded to when no specific route can
be determined for a given Internet Protocol (IP) destination address. /2mark
Dynamic Routing: is a technique in which a router learns about routing
information without an administrator's help and adds the best route to its
routing table. /1mark

Reference: LU1: Introduce routing and packet forwarding


LO1.1: Describe routing Concepts. Curriculum level 4 page 308, year 2014

Question 2: Write in full words the following: (2marks)

1. VLSM:

2. CIDR:
Answer:

VLSM: Variable length subnet mask /1mark

CIDR: classless inter-domain routing /1 mark


Reference: LU1: Introduce routing and packet forwarding
LO1.2: Configure Static and default route curriculum level 4 YEAR
2014

Question 3: Define Route summarization (3marks)

Answer:

Route summarization:
Known as route aggregation, is the process of advertising a continuous set of
addresses as a single address with a less-specific, shorter subnet mask.

Reference: LU3: Configure and verify Routing Protocols


LO3.2: Apply VLSM and Classless Inter-Domain Router (CIDR)

Question 4. Explain EIGRP (3marks)

ANSWER:

(PERFORM ROUTING) Page 2 of 18 – Marking Guides


Enhanced Interior Gateway Routing Protocol is an advanced distance-vector routing
protocol that is used on a computer network for automating routing decisions and
configuration

Reference: LU3: Configure and verify Routing Protocols


LO3.3: Apply Classless routing protocols

310 | P a g e curriculum level 4 YEAR 2014

Question 5. What is advantage of HSRP? (3marks)

Answer:

Is a routing protocol that provides backup to a router in the event of failure.

Reference: LU1: Introduce routing and packet forwarding


LO1.3: Apply Hot standby router protocol (HSRP)

Question 6. Select the correct answer among the following:

Router access security is: (3marks)

A. ROM security
B. Rogin & banners /1mark
C. Physical security /1mark
D. Password /1mark

ANSWER:

B, C and D

Reference: LU1: Introduce routing and packet forwarding


LO1.4: Implement router security. curriculum level 4 YEAR 2014

Question 7. Answer by true(T) or false(F) (4marks)

1. A site survey is the examination of a location or spot in order to obtain


data or information /1 Mark
2. A site survey can be performed at any time, but the goals and value of a
survey will vary depending on when it was conduct. /1 Mark
3. An active survey allows the user to map an existing deployment’s effective
network coverage /1Mark
4. A passive survey allows the user to understand all the AP and channel
usage at a location so that you can adjust the network to perform
optimally. /1Mark

(PERFORM ROUTING) Page 3 of 18 – Marking Guides


ANSWER:

1. T,
2. F,
3. T,
4. T
Reference: LU4: Troubleshoot router
LO4.1: Identify and correct common problems associated with IP addressing
and host configurations
325 | P a g e curriculum level 4 YEAR 2014

Question 8. List the problems that cause malfunctions of router. (3marks)


Answer:

a. Routing issues /1mark


b. High CPU utilization /1mark
c. Interface down /1mark

Reference: LU4: Troubleshoot router


LO4.1: Identify and correct common problems associated with IP addressing
and host configurations

325 | P a g e curriculum level 4 YEAR 2014

Question 9. What are the troubleshooting steps for the route? (3marks)

ANSWER:

a. Verification of cable connectivity /1Mark


b. Verification for the power supply /1Mark
c. Verification of router LEDs status /1Mark

Reference: LU4: Troubleshoot router

LO4.1: Identify and correct common problems associated with IP


addressing and host configurations

325 | P a g e curriculum level 4 YEAR 2014

Question 10. Differentiate multilayer switch from router. (5marks)

Answer:

(PERFORM ROUTING) Page 4 of 18 – Marking Guides


 A multilayer switch is a network device that has the ability to operate at
higher layers of the OSI reference model, unlike the Data Link Layer
(DLL) traditionally used by switches. A multilayer switch can perform the
functions of a switch as well as that of a router at incredibly fast speeds
/2Marks
 Router is a device or, in some cases, software on a computer, that
determines the best way for a packet to be forwarded to its destination.
(2marks)

Reference: LU2: Conduct site survey


LO2.2: Identify components, devices, tools, connectors and media

315 | P a g e Curriculum level 4 YEAR 2014

Question 11. Show the difference between Authentication, Confidentiality and


auditing. (3marks)

ANSWER:

A. Authentication: Authentication is the act of proving an assertion,


such as the identity of a computer system user. Or is the process
or action of verifying the identity of a user or process. /1Mark
B. Confidentiality: Data confidentiality is about protecting data
against unintentional, unlawful, or unauthorized access,
disclosure, or theft. Confidentiality has to do with the privacy of
information, including authorizations to view, share, and use it.
/1Mark
C. Auditing: Network auditing is the process of mapping and
inventorying your network in terms of hardware and software.
Fairly complex task involves manually
identifying network elements. In some cases, network-
auditing tools can provide automation support to identify the
devices and services connected to the network. /1Mark
Reference: LU2: Conduct site survey
LO2.3: Identify Security requirements

315 | P a g e Curriculum level 4 YEAR 2014

Question 12. Identify a network class represents by this IP address:


192.168.100.0/27. (3marks)

ANSWER:

Class C
(PERFORM ROUTING) Page 5 of 18 – Marking Guides
Reference: LU3: Configure and verify Routing Protocols
LO3.1: Apply Class full routing protocols,320 | P a g e curriculum level 4
YEAR 2014

Question 13. Which command line utilities that can be used to check:(4marks)

a. TCP/IP configurations
b. Test the connectivity

ANSWER:

a. Ipconfig /2 marks
b. Ping /2 marks

Reference: LU4: Troubleshoot router

LO 4.2: Apply Troubleshooting of device configuration and network


connectivity,P a g e curriculum level 4 YEAR 2014

Question 14. Choose three (3) private IP Addresses from the following:
(3marks)
A. 10.1.1.1
B. 172.32.5.2
C. 192.167.10.10
D. 172.16.4.4
E. 192.168.5.5
F. 224.6.6.6
ANSWER: A, D and E

Reference: LU3: Configure and verify Routing Protocols


LO3.1: Apply Classfull routing protocols,320 | P a g e curriculum level 4
YEAR 2014

Question 15. Choose the correct answer:


What is the purpose of the routing process? (3marks)
a. to encapsulate data that is used to communicate across a network
b. to convert a URL name into an IP address
c. to provide secure Internet file transfer
d. to forward traffic on the basis of MAC addresses
e. To select the paths that are used to direct traffic to destination
networks
ANSWER:

(PERFORM ROUTING) Page 6 of 18 – Marking Guides


e) To select the paths that are used to direct traffic to destination
networks.

Reference: LU3: Configure and verify Routing Protocols


LO3.1: Apply Classfull routing protocols,320 | P a g e curriculum level 4
YEAR 2014

SECTION B: ATTEMPT ALL QUESTIONS /30 MARKS


Question 16. Look at this IP Address 192.168.10.0/25 and solve the following
questions: (4marks)

a. To which class of IP Address does the above IP Address and its Default
Mask belong to?

b. How many subnets found in the above network?


c. How many valid hosts can this network accommodate?
d. Calculate the First valid host and Last valid host for each subnet and
their broadcast.
Answer:
a. Class C 255.255.255.128 /1mark
b. How many subnets found in the above network?
By using the formulas: 2N=21=2 /1mark
c. How many valid hosts can this network accommodate?
By using the formulas: 2H-2=27-2=128-2=126 /1mark
d. Calculate the First valid host and Last valid host for each subnet
Fast valid host: 192.168.10.1 /1mark
Last valid host: 192.168.10.126 Broadcast 192.168.10.127
/1 mark

Fast valid host: 192.168.10.129


Last valid host: 192.168.10.245 Broadcast 192.168.10.255
Using table
Network ID Host range Broadcast
192.168.10.0 192.168.10.1-192.168.10.126 192.168.10.127
192.168.10.128 192.168.10.129- 192.168.10.255
192.168.10.254

Reference: LU3: Configure and verify Routing Protocols


LO3.1: Apply Classfull routing protocols,320 | P a g e curriculum level 4
YEAR 2014

Question 17. We have four IP subnets on four LAN interfaces of router:


192.168.1.0/24, 192.168.0.0/24, 192.168.3.0/24 and 192.168.2.0/24.

(PERFORM ROUTING) Page 7 of 18 – Marking Guides


We want to summarize these networks into a single route so that we can
advertise across the WAN, which reduces the number of routes in the remote
routers. As a network administrator, find their SUPERNETID and SUPERNET
MASK. (4marks)

ANSWER:
1. The process steps:
• Rearrange from lowest to highest
192.168.1.0/24, 192.168.0.0/24, 192.168.3.0/24 192.168.2.0/24.
192.168.0.0/24
192.168.1.0/24
192.168.2.0/24
192.168.3.0/24
2. Drop IP address and convert lowest and highest ID to binary.
 192.168.0.0: 11000000 10101000 00000000 00000000
 192.168.3.0: 11000000 10101000 00000011 00000000

 3, 4 and 5 Find matching bits of where bits stop matching and drow line
to right of where bits stop matching then Bring down all matching bits to
begin forming SupernetID or Route Aggregation.
 Using Line or brackets }
192.168.0.0: 11000000 10101000 000000}00 00000000
192.168.3.0: 11000000 10101000 000000}11 00000000
SupernetID: 11000000 10101000 000000} those bits are matching the
other’s
6. Convert supernetID binary back to decimal
SupernetID:192.168.0.0
7. Count number of matching bits for supernet subnet mask(S/M)
Subnet mask will be 255.255.252.0 and the CIDR Supernet:192.168.0.0/22

Supernet ID: 192.168.0.0 /2marks


Supernet S/M: 255.255.252.0 /2marks
and the CIDR Supernet:192.168.0.0/22

Reference: LU3: Configure and verify Routing Protocols


LO3.2: Apply VLSM and Classless Inter-Domain Router (CIDR)

322 | P a g curriculum level 4 YEAR 2014

Question 18. Differentiate authentication from authorization. (4marks)

ANSWER:

(PERFORM ROUTING) Page 8 of 18 – Marking Guides


Authentication: Authentication is the act of confirming the truth of an
attribute of a single piece of data claimed true by an entity. It is a process in
which the credentials provided are compared to those on file in a database of
authorized users’ information on an authentication server. /2marks
Authorization: It is the process of an administrator granting rights and the
process of checking user account permissions for access to resources.

/2marks

Reference: LU2: Conduct site survey


LO2.4: Design and interpret Building blueprint,Curriculum level 4 YEAR
2014

Question 19. A network comprises of two routers, each router has switch
connected to it and each switch has one pc connected to it, Label network ID,
interfaces and host ID.

Write down each needed Cisco command to be used by configuring EIGRP to


assure packet routing from one router to another. (4marks)

ANSWER:

 Router01>enable

Router01 (config)#router eigrp 1

Router01 (config-router)#network 172.16.0.0 /1mark

Router01 (config-router)#network 172.17.0.0 /1mark

Router01 (config-router)#exit
Router01 (config)#exit

 Router01>enable

(PERFORM ROUTING) Page 9 of 18 – Marking Guides


Router01 (config)#router eigrp 1

Router02(config-router)#network 172.18.0.0 /1mark

Router02(config-router)#network 172.19.0.0 /1mark


Router02(config-router)#exit

Router02(config)#exit

Reference: LU3: Configure and verify Routing Protocols


LO3.3: Apply Classless routing protocols, curriculum level 4 YEAR 2014

Question 20. Differentiate updating from upgrading. (2marks)

ANSWER:

1. Update is to make and keep something up to date or a better version of


the older one, often to solve problems.
Upgrade is to raise something to a higher standard by adding or
replacing few components.

Reference: LU2: Conduct site survey


LO2.2: Identify components, devices, tools, connectors and media

316 | P a g e curriculum level 4 YEAR 2014

Question 21. List two (2) examples of network access devices. (2marks)
Answer:
 Network access devices
Ex: Switch and Access point

LU2: Conduct site survey


LO2.2: Identify components, devices, tools, connectors and media

315 | P a g e

Question 22. Differentiate VLSM and FLSM. (4marks)


Answer:
VLSM FLSM
VLSM (Variable Length Subnet FLSM (Fixed Length Subnet Masks) Subnetting
Masks) Subnetting

Subnets are variable in size. All subnets are equal in size.

(PERFORM ROUTING) Page 10 of 18 – Marking Guides


Subnets have variable number of All subnets have equal number of hosts.
hosts.

Subnets use different subnet All subnets use same subnet mask.
masks.

It is complex in configuration and It is easy in configuration and administration.


administration.

It wastes minimum IP addresses. It wastes a lot of IP addresses.

It is also known as classless It is also known as classfull Subnetting.


Subnetting.

It supports only classless routing It supports both classfull and classless routing
protocols. protocols.

Reference: LU1: Introduce routing and packet forwarding


LO1.2: Configure Static and default route

309 | P a g e curriculum level 4 YEAR 2014

Question 23. Determine the different ways to manage a router. (3marks)

Answer:

A. Non- network /2marks

Console port: by connecting the router’s console port to a workstation through


a console cable

The console port is the management port which is used by administrators to log
into a router directly without using a network connection. You require a
terminal emulator application like HyperTerminal or putty to connect to router.

Auxiliary port: by using a remote computer through a modem that calls


another modem connected to the router with a cable using the auxiliary port on
the router.

(PERFORM ROUTING) Page 11 of 18 – Marking Guides


Auxiliary port (AUX Port) allows a direct, non-network connection to the router,
from a remote location.

B. Over the network/ 1Mark


The routers can be managed over the network by using standard TCP/IP
protocols like Telnet, SSH, HTTP or HTTPS.
 Telnet: a Telnet client and server application ships with Cisco’s IOS
software
 SSH: SSH is a more secure way to configure routers, since the SSH
communication is encrypted.
 HTTP or HTTPS: Cisco IOS also has a HTTP server to managed web
based communication with the router.

Reference: LU4: Troubleshoot router

LO4.3: Apply troubleshooting of router hardware and software operation

328 | P a g e curriculum level 4 YEAR 2014

Question 24. List at least three (3) Router Hardware Components. (3marks)

1. CPU
2. ROM
3. RAM
4. NVRAM
5. Flash Memory
6. Interfaces
7. Buses
8. Power Supply

Reference: LU4: Troubleshoot router

LO4.3: Apply troubleshooting of router hardware and software operation

328 | P a g e curriculum level 4 YEAR 2014

(PERFORM ROUTING) Page 12 of 18 – Marking Guides


SECTION C: ATTEMPT ALL QUESTIONS /20 MARKS
Question 25. Question 25. UMUNYINYA Bar has routing problems in its
network configuration, the problems are: Overlapping IP Address, invalid IP
address, bad mask, network interface does not become active and the
message are Attempted or Failed’. The Head of NETWORKING Department in
UMUNYINYA Bar requested you as an IT Technician to explain those above-
mentioned problems. (5marks)

ANSWER:
A. An overlapping IP address occurs when an IP address is
assigned to more than one device on a network. This can
happen if you have identical subnets in different locations
monitored by different DHCP servers on the same network.
/1mark
B. The message "Invalid IP Address" indicates a problem with your
computer's network setup. Without a valid IP address, your
computer cannot use the network. /1mark
C. Bad mask? If the network you are currently on is a class C, the
subnet mask would be 255.255.255.0 and info in that packet
looks to be destined for a mask of 255.255. 255.252. Therefore,
it cannot communicate with that packet and flags is “bad”.
/1mark
D. Network interface does not become active I used system-
config-network-guide to config & enable Ethernet interface.
Problem is, when the system starts, the Ethernet
does not become enabled. /1mark
E. The Attempted or Failed means that we were not able to
successfully send a message to the delivery provider. /1mark

Reference: LU3: Configure and verify Routing Protocols


LO3.1: Apply Classfull routing protocols,320 | P a g e curriculum level 4
YEAR 2014

Question 26: Refer to the figure below, write down necessary cisco command to be
used by configuring RIPV1 to assure packet routing from one router to another.

(PERFORM ROUTING) Page 13 of 18 – Marking Guides


(3marks)

ANSWER:

 Router01>enable

Router01 (config)#router RIP

Router01 (config-router)#network 172.17.0.0

Router01 (config-router)#network 172.16.0.0

Router01 (config-router)#exit
Router01 (config)#exit

 Router01>enable

Router0(config)#router router RIP

Router0(config-router)#network 172.17.0.0

(PERFORM ROUTING) Page 14 of 18 – Marking Guides


Router0(config-router)#network 172.18.0.0

Router0 (config-router)#network 172.19.0.0


Router0(config-router)#exit

Router0(config)#exit

Router02 (config)#router RIP

Router02 (config-router)#network 172.19.0.0

Router02(config-router)#network 172.20.0.0

Reference: LU3: Configure and verify Routing Protocols


LO3.3: Apply Classless routing protocols

323P a g e curriculum level 4 YEAR 2014

Question 27. Give and explain different types of router memory. (4marks)

The different types of router memory are:


Answer:
ROM, Flash Memory, NVRAM, and RAM
a) ROM: instructions for POST, Bootstrap program, Mini-IOS is stored here
also is permanently not temporally /1mark
b) Flash Memory: IOS is stored here / 1mark
c) NVRAM: start up configuration file startup-config is stored here
/ 1mark
d) RAM: running configuration file running-config is stored here
/ 1mark

Reference: LU4: Troubleshoot router

LO 4.2: Apply Troubleshooting of device configuration and network


connectivity ,327 | P a g e curriculum level 4 YEAR 2014

Question 28: Explain the following terms and give one (1) example for each.

a. Unicast:
b. Multicast:
c. Broadcast: (3marks)

(PERFORM ROUTING) Page 15 of 18 – Marking Guides


ANSWER:

a) Unicast: It is one to one communication or is a type of communication,


where there is only one sender and one receiver. /1mark

Example:

 Browsing a website. Web server is the sender and your computer is the
receiver

 Downloading a file from FTP Server FTP Server is the sender and your
computer is receiver

b) Multicast: is group communication where data transmission is addressed to


a group of destination computers simultaneously. Multicast can be one-to-
many or many-to-many distribution.
Examples: Group admin (whatSapp) can send sms to the selected persons.
c) Broadcast: In broadcast, there is only one sender and a data is sent only
once. But the broadcast data is delivered to all connected devices

Example: Switches by design will forward the broadcast traffic and routers by
design will drop the broadcast traffic

Reference: LU3: Configure and verify Routing Protocols


LO3.1: Apply Classfull routing protocols
320 | P a g e curriculum level 4 YEAR 2014

Question 29. Sketch diagram to show how MAN is designed. (2marks)

Answer:

(PERFORM ROUTING) Page 16 of 18 – Marking Guides


Reference: LU3: Configure and verify Routing Protocols
LO3.3: Apply Classless routing protocols

323 Page curriculum level 4 YEAR 2014

Question 30. List and explain IOS Configuration mode. (3marks)

ANSWER:

1. User executive mode /

This is the main or the first mode that one can access on a router. It is limited
to few verification and troubleshooting commands. By default, authentication is
not required but as best practice we will configure security so as to ensure
protection of our routers.

On accessing the router, you will notice the prompt that ends with this symbol
“>” after the router’s name. By default the name of the router is usually
“Router“. This prompt is shown below.

Router>

In this mode, we can view basic information using the “show” command.

2. Privileged executive mode /

This is the second mode in the IOS CLI. In this mode, we can view various
troubleshooting and verification commands such as “show and debug“. By
default, this mode is also not secured, as best practice we will also secure this
mode using a password.

This mode is denoted by the HASH (#) symbol proceeded by the name of the
router. To enter this mode, we issue the command “enable” from the user exec
mode.

(PERFORM ROUTING) Page 17 of 18 – Marking Guides


Router#

NOTE: To move from the user exec mode to the privileged mode the command –
“enable” should be entered from the user exec mode.

The “disable” command is used to exit the privileged exec mode and return to
the user exec mode.

3. Global configuration mode /

The main configuration on a router is executed in this mode. Parameters such


as the router’s name, ip domain lookup, banners among others can be
configured. In this mode, we can also gain access to other specific configuration
parameters such as interface configuration.

The global configuration mode is shown by the prompt: (config)# as shown


below:

Router (config)#

NOTE: To enter this mode from the privileged exec mode we enter the
command: “Configure terminal”

To exit we to the privileged mode we enter the command: “exit”

4. Specific configuration mode. /

There are other specific configuration modes on the router. These are entered in
the global configuration mode and are used to configure various functions and
options on the router such as the interfaces, routing options, console lines
among others. The specific configuration mode commands will be discussed
progressively throughout the course.

Reference: LU4: Troubleshoot router


LO4.3: Apply troubleshooting of router hardware and software operation
325 P a g e curriculum level 4 YEAR 2014

END OF MARKING GUIDES!

(PERFORM ROUTING) Page 18 of 18 – Marking Guides

You might also like