You are on page 1of 31
‘all questions, Provide short and précised Answers NETWORKING (10MARKS) 1. (Life-Scenario) (Smarks) ‘You have been employed in an organization as their network administrator to build and ‘administer a very good network topology to enable fast and reliable connectivity in the entire company. This company covers a total surface area of about 5000m’. The company 1@ achieve the! has given you the opportunity to use any equipment available in order gold, Within some buildings, there include heavy machineries which also need connectivity to the system. Answer the questions bellow with reference to the above scenario. i. What do you understand by network topology and what two basic types of . topologies exit? ii, Which type of network devices and transmission medium will be used in such a scenario above. Where and why will the transmission medium and devices be used and why’? iv. Which type of network have you just established in the above scenario? , what must you do to seal you deal y. After your implementation, as a good engine with this organisation? 2. (Short Structural) (Smarks) Each question carries Imark i. Briefly explain what happens in CSMA/CD ii, A router segments collision domain, Exp! In the 3tier networking model, what is the function of the access iayer How do switches learn MAC addresses? iv rence to the OSI model, what is the name of Layer 3 and what happens at v. With r that layer? (marks) | = ‘do you understand by an active direstory?(2marks) What is a domain Controller? (1mark) SECTION C: NETWORK SECURITY (10MARKS) 1. (Scenario-Security Measures) (Smarks) The CEO of a multinational Tech company noticed his computer was running very slow while working constantly on the intemet, he also noticed he eould not access most of the resources in the company server. after Some days he latter noticed the same behavior on all the computers in the company whenever they are connected. Upon some basic troubleshooting, their IT technician noticed a security bridge in the system, viruses, Trojan horses and worms in the system, The worst of all is that, some vital company documents have been tempered with. This attack also went to the extent of destabilizing their database. List and explain various security bridges that can course a computer to be slow. What do you understand by security bridge? What could be the r on why the CEO could not access the local server? + iv, What is the first action to take when you notice a security bridge in the network system v. Which type of attack can cause the ma functioning of the database? 2. Question 2 (Short Structural-Cryptography concepts) (Smarks) Define the following with respect to cryptography i. Cypher ii. Cypher Text iii. Key iv. Decipher * Neromsux ov camenouy ter MINISTER De UEAdGREOMENT sPERLEUR ovuesion Vanon ate Gnas iom oe UeNaMiE i ’ a NATIONAL DIPLOMA EXAM (HN TT, ‘Natiowat Exam of Higher National py olomNew program —2020 Session Solsatnietion Network anars Caco Nerworing, ns eeu Duration 4 hours Sue Anstruction, Write out the letter ofthe correct answer. Each question carries tmark SECTION A: CISCO 1 (2Smarks) Al: MQ (Smarks) |. A network technician suspects that « particular network connection between two Cisco switches is having a duplex mismateh, Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port? 4) show interfaces ) show running-

You might also like