‘all questions, Provide short and précised Answers
NETWORKING (10MARKS)
1. (Life-Scenario) (Smarks)
‘You have been employed in an organization as their network administrator to build and
‘administer a very good network topology to enable fast and reliable connectivity in the
entire company. This company covers a total surface area of about 5000m’. The company
1@ achieve the!
has given you the opportunity to use any equipment available in order
gold, Within some buildings, there include heavy machineries which also need
connectivity to the system.
Answer the questions bellow with reference to the above scenario.
i. What do you understand by network topology and what two basic types of
. topologies exit?
ii, Which type of network devices and transmission medium will be used in such a
scenario above.
Where and why will the transmission medium and devices be used and why’?
iv. Which type of network have you just established in the above scenario?
, what must you do to seal you deal
y. After your implementation, as a good engine
with this organisation?
2. (Short Structural) (Smarks)
Each question carries Imark
i. Briefly explain what happens in CSMA/CD
ii, A router segments collision domain, Exp!
In the 3tier networking model, what is the function of the access iayer
How do switches learn MAC addresses?
iv
rence to the OSI model, what is the name of Layer 3 and what happens at
v. With r
that layer?(marks) | =
‘do you understand by an active direstory?(2marks)
What is a domain Controller? (1mark)
SECTION C: NETWORK SECURITY (10MARKS)
1. (Scenario-Security Measures) (Smarks)
The CEO of a multinational Tech company noticed his computer was running very slow
while working constantly on the intemet, he also noticed he eould not access most of the
resources in the company server. after Some days he latter noticed the same behavior on
all the computers in the company whenever they are connected. Upon some basic
troubleshooting, their IT technician noticed a security bridge in the system, viruses,
Trojan horses and worms in the system, The worst of all is that, some vital company
documents have been tempered with.
This attack also went to the extent of destabilizing
their database.
List and explain various security bridges that can course a computer to be slow.
What do you understand by security bridge?
What could be the r
on why the CEO could not access the local server?
+ iv, What is the first action to take when you notice a security bridge in the network
system
v. Which type of attack can cause the ma
functioning of the database?
2. Question 2 (Short Structural-Cryptography concepts) (Smarks)
Define the following with respect to cryptography
i. Cypher
ii. Cypher Text
iii. Key
iv. Decipher*
Neromsux ov camenouy
ter
MINISTER De UEAdGREOMENT sPERLEUR
ovuesion Vanon ate Gnas iom oe UeNaMiE
i ’ a
NATIONAL DIPLOMA EXAM (HN TT,
‘Natiowat Exam of Higher National py
olomNew program —2020 Session
Solsatnietion Network
anars Caco Nerworing, ns eeu
Duration 4 hours Sue
Anstruction, Write out the letter ofthe correct answer. Each question carries tmark
SECTION A: CISCO 1 (2Smarks)
Al: MQ (Smarks)
|. A network technician suspects that « particular network connection between two Cisco
switches is having a duplex mismateh, Which command would the technician use to see the
Layer 1 and Layer 2 details of a switch port?
4) show interfaces
) show running-
Economics of Grids, Clouds, Systems, and Services 7th International Workshop, GECON 2010, Ischia, Italy, August 31, 2010. Proceedings by Frank Dickmann, Maximilian Brodhun, Jürgen Falkner, Tobias A. K (z-lib.org)