Candidates Written Assessment

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

©2023 TVET CDACC

ICT TECHNICIAN LEVEL 5


IT/OS/ICT/BC/01/5 A
Perform computer networking
Jan 2024

TVET CURRICULUM DEVELOPMENT, ASSESSMENT AND CERTIFICATION


COUNCIL (TVET CDACC)

WRITTEN ASSESSMENT
Time : 3 hours
INSTRUCTIONS TO CANDIDATES
1. This paper has three sections A, B and C.
2. You are provided with a separate answer booklet.
3. Marks for each question are as indicated.
4. Do not write on the question paper.

This paper consists of 7 printed pages


Candidates should check the question paper to ascertain that all pages
are printed as indicated and that no questions are missing

Page 1 of 11
©2023 TVET CDACC

SECTION A: (20 Marks)


Answer all questions in this section.
Each question carries one Mark.
Question 1:
Which networking component is responsible for forwarding data packets between devices on the
same local network?
a) Router
b) Switch
c) Hub
d) Modem
Answer: b) Switch

Question 2:
What is the primary function of a DNS (Domain Name System) server in a computer network?
a) Assigning IP addresses to devices
b) Managing network security
c) Resolving domain names to IP addresses
d) Regulating data traffic
Answer: c) Resolving domain names to IP addresses

Question 3:
Which layer of the OSI model is responsible for the logical addressing and routing of data
between different networks?
a) Physical layer
b) Data Link layer
c) Network layer
d) Transport layer
Answer: c) Network layer

Question 4:
What is the purpose of a firewall in a computer network?
a) Facilitating communication between devices
b) Preventing unauthorized access and controlling network traffic
c) Amplifying the strength of the network signal
d) Converting digital signals to analog signals
Answer: b) Preventing unauthorized access and controlling network traffic

Question 5: What is a characteristic of a star topology in computer networking?


A) All devices are connected in a linear fashion. B) Each device is connected to a central hub or
switch. C) Devices are interconnected in a closed loop. D) There is a single central server that
controls all communication.
Page 2 of 11
©2023 TVET CDACC

Answer: B) Each device is connected to a central hub or switch.

Question 6: In a bus topology, how is data transmitted between devices?


A) Directly between any two devices. B) Through a central hub or switch. C) Only in one
direction along the bus. D) In a random and non-deterministic manner.
Answer: C) Only in one direction along the bus.

Question 7: What is a key advantage of a ring topology in computer networking?


A) Easy to install and configure. B) Robust and fault-tolerant. C) Centralized control of network
traffic. D) Each device has a dedicated point-to-point connection.

Answer: B) Robust and fault-tolerant.

Question 8: Which networking topology is known for its scalability and redundancy?
A) Bus Topology B) Star Topology C) Mesh Topology D) Ring Topology

Answer: C) Mesh Topology.

Question9: What is the primary function of a router in a computer network?


a. Amplifying signals
b. Connecting devices within a local area network
c. Forwarding data between different networks
d. Managing power distribution

Answer: c. Forwarding data between different networks

Question10: Which of the following devices operates at the Data Link layer of the OSI model?
a. Router
b. Hub
c. Switch
d. Bridge

Answer: . Switch

Question11: What is the purpose of a firewall in a computer network? a. Enhancing network


speed
b. Filtering and controlling network traffic
c. Connecting different network segments
d. Managing IP address assignments

Answer: b. Filtering and controlling network traffic

Page 3 of 11
©2023 TVET CDACC

Question12: Which networking device is used to connect multiple computers within the same
local area network (LAN) and operates at the Network layer of the OSI model? a. Hub
b. Switch
c. Router
d. Bridge

Answer: c. Router

Question13: What is the primary function of a hub in a network? a. Filtering network traffic
b. Forwarding data based on MAC addresses
c. Connecting multiple devices in a LAN
d. Routing data between different networks

Answer: c. Connecting multiple devices in a LAN

Question 14: Which of the following cables is commonly used for connecting a computer to a
router or switch in a local area network (LAN)?
A) Coaxial Cable B) Fiber Optic Cable C) Twisted Pair Cable D) USB Cable

Answer: C) Twisted Pair Cable

Question 15: What type of cable is known for its high bandwidth and immunity to
electromagnetic interference, making it suitable for transmitting data over long distances in
telecommunications networks?
A) Coaxial Cable B) Twisted Pair Cable C) Fiber Optic Cable D) HDMI Cable

Answer: C) Fiber Optic Cable

Question 16: In a home network setup, which cable is commonly used to connect a cable
modem to a computer for high-speed internet access?

A) Twisted Pair Cable B) Coaxial Cable C) USB Cable D) Fiber Optic Cable

Answer: B) Coaxial Cable

Question17: What is the purpose of a switch in a network?


a. Connecting different networks
b. Filtering and forwarding data based on MAC addresses
c. Controlling access to a network
d. Connecting devices wirelessly

Answer: b. Filtering and forwarding data based on MAC addresses

Page 4 of 11
©2023 TVET CDACC

Question18: In a wireless network, which device is responsible for managing the distribution of
IP addresses to connected devices?
a. Modem
b. Access Point
c. Router
d. Switch

Answer: b. Access Point

Question19: What is the primary role of a bridge in networking?


a. Connecting devices in different LANs
b. Filtering traffic based on IP addresses
c. Extending the range of a wireless network
d. Connecting devices within the same LAN

Answer: d. Connecting devices within the same LAN

Question 20: Which networking device is commonly used to divide a large broadcast domain
into smaller ones?
a. Router
b. Hub
c. Switch
d. Bridge

Answer: c. Switch

SECTION B: (40 Marks)


Answer all questions in this section.
1. List Four types of networking topologies

i. Bus Topology
ii. Ring Topology
iii. Star Topology
iv. Mesh Topology
(4 Marks)

2. State four computer etworking threats


i. Malware
ii. Phishing
iii. Denial of Service (DoS) attacks
iv. Man-in-the-Middle (MitM) attacks
(4 Marks)
Page 5 of 11
©2023 TVET CDACC

4. Mention any four characteristics of internet connection media


i. Fiber optic cables
ii. Coaxial cables
iii. Twisted pair cables (UTP/STP)
iv. Satellite communication

(4 Marks)
5. List any four types subnet masks
i. Class A Subnet Mask
ii. Class B Subnet Mask
iii. Class C Subnet Mask
iv. Class D Subnet Mask
(4 Marks)

6. List four reasons for testing components in a computer network


i. dentify Faults
ii. Ensure Compatibility.
iii. Validate Performance
iv. Security Verification
(4Marks)

7. List four factors that affect the performance of network


i. Bandwidth:
ii. Latency:
iii. Network Congestion:
iv. Hardware Performance:
. (4 Marks)

8. List four terms used in computer networking


i. DHCP
ii. DNS
iii. OSI model
iv. VLAN

(4 Marks)

9. List four types of wireless transmission mediaRadio waves


i. Microwaves
ii. Infrared waves
iii. Satellite signals
iv. Bluetooth
(4marks)
Page 6 of 11
©2023 TVET CDACC

10. List four uses of computer networks


i. Communication
ii. File sharing
iii. Resource sharing
iv. Remote access
(4 Marks)
11. List four steps you would take to optimize network performance in a high traffic
environment

i. Load balancing
ii. Content delivery network (CDN) implementation
iii. Compression techniques
iv. Caching mechanisms

SECTION C: (40 Marks)


Answer any two questions in this section.
12. (a) Explain the types of transmission media
1.Twisted Pair Cable:
Description: Consists of pairs of insulated copper wires twisted together.

2.Coaxial Cable:
Description: Central copper conductor surrounded by insulating material, a metallic
shield, and an outer insulating layer.
3.Fiber-Optic Cable:
Description: Transmits data as pulses of light through a glass or plastic fiber.
4.Wireless Transmission:
Description: Uses radio waves or infrared signals to transmit data without physical
cables.
5. Microwave Transmission:
Description: Uses high-frequency radio waves to transmit data between two fixed locations.
.
6.Satellite Transmission:
Description: Uses communication satellites in orbit to relay signals between ground stations.
7 . Power Line Communication (PLC):
Page 7 of 11
©2023 TVET CDACC

a. Description: Uses existing electrical power lines for data transmission.


.
(14 Marks)
(b) Explain any three network types
1. Local Area Network (LAN)
• A Local Area Network (LAN) is a network that is limited to a small geographic area,
such as within a single building, office, or campus.
• LANs are commonly used for connecting computers and devices within an organization
to facilitate resource sharing, like files, printers, and internet access.
• They typically use high data transfer rates and are often implemented using Ethernet
technology. LANs can be both wired (using cables like Ethernet) or wireless (using technologies
like Wi-Fi).
2. Wide Area Network (WAN)
• A Wide Area Network (WAN) covers a broader geographical area, often spanning across
cities, countries, or even continents.
• WANs are used to connect multiple LANs and allow for the exchange of data over long
distances. The Internet is the largest example of a WAN, connecting computers and networks
globally.
• WANs use various technologies, including leased lines, satellite links, and internet
connections, to enable communication between geographically dispersed locations.
3. Metropolitan Area Network (MAN)
• A Metropolitan Area Network (MAN) falls between LANs and WANs in terms of
geographic scope, typically covering a city or a large campus.
• MANs are designed to connect multiple LANs within a specific metropolitan area,
providing high-speed communication and resource sharing over a larger distance than a LAN.
• Fiber-optic cables and wireless technologies are often used to implement MANs. They
are useful in scenarios where a single organization has multiple locations within a city, and they
need a network infrastructure to interconnect these locations efficiently.

(6 Marks)
13. (a) Briefly explain any five TCP/IP protocols suite (10 Marks)
1. Internet Protocol (IP):
• IP Addressing: Provides a unique numerical address to each device on a network,
allowing for proper routing and identification of devices.
• Routing: Determines the most efficient path for data to travel from the source to the
destination across a network.
2. Transmission Control Protocol (TCP):
• Connection-oriented: Establishes a reliable connection between two devices before data
transfer begins.
• Error checking and correction: Ensures that data is transmitted accurately and in the
correct order.
• Flow control: Manages the rate of data exchange between sender and receiver to prevent
congestion.
Page 8 of 11
©2023 TVET CDACC

3. User Datagram Protocol (UDP):


• Connectionless: Does not establish a dedicated connection before transmitting data.
• Low overhead: Faster but less reliable than TCP, suitable for applications where some
data loss is acceptable (e.g., real-time streaming, voice and video calls).
4. Internet Control Message Protocol (ICMP):
• Network management and error reporting: Used by network devices to communicate
error messages or provide information about network conditions.
5. Address Resolution Protocol (ARP):
• Maps IP addresses to MAC addresses: Resolves IP addresses to physical MAC addresses
on a local network.
6. Domain Name System (DNS):
• Name to IP address resolution: Translates human-readable domain names into IP
addresses, facilitating easier identification of resources on the Internet.
7. Hypertext Transfer Protocol (HTTP) and HTTPS (HTTP Secure):
• Web communication protocols: Used for transferring hypertext (web pages) between a
web server and a web browser.
8. File Transfer Protocol (FTP):
• File transfer: Facilitates the transfer of files between computers on a network.
9. Simple Mail Transfer Protocol (SMTP) and Post Office Protocol (POP) / Internet
Message Access Protocol (IMAP):
• Email communication protocols: SMTP is used for sending emails, while POP and IMAP
are used for retrieving emails from a server.

(b) Outline five benefits of networking


1. Resource Sharing:
• Networking allows for efficient sharing of resources such as files, printers, and
applications among connected devices. This reduces the need for duplicate hardware and
software, optimizing resource utilization and lowering costs.
2. Communication:
• Networking facilitates seamless communication between individuals and organizations.
Email, instant messaging, video conferencing, and other communication tools become more
accessible, fostering collaboration and enabling timely exchange of information.
3. Centralized Data Management:
• Centralized data storage on a network server provides a more organized and secure
approach to managing information. This ensures that data is consistently backed up, easily
accessible, and can be centrally managed for security and integrity.
4. Cost Efficiency:
• Networking often leads to cost savings through resource consolidation. Shared resources,
centralized management, and reduced redundancy contribute to a more economical use of
hardware and software, resulting in lower overall IT expenses.
5. Remote Access and Mobility:

Page 9 of 11
©2023 TVET CDACC

• Networking enables remote access to resources, allowing users to connect to the network
from different locations. This supports flexible work arrangements, enhances productivity, and
accommodates the increasing trend of mobile and remote work.
(10 Marks)
b)

21. (a) Describe any five ways of performing network testing


22. Ping and Traceroute:
a. Ping: This is a basic network testing tool that sends an Internet Control Message Protocol
(ICMP) Echo Request to a target host and waits for an Echo Reply. It measures the round-trip
time for the packet to reach the destination and return. High latency or packet loss can indicate
network issues.
b. Traceroute: Traceroute helps identify the route taken by packets from the source to the
destination. It shows the IP addresses of the routers along the path and helps identify any delays
or failures at specific hops.
23. Bandwidth Testing:
a. Tools like Iperf or Speedtest measure the available bandwidth between two points on a
network. This type of testing helps identify the network's capacity and potential bottlenecks. It's
useful for optimizing network performance and identifying areas where improvements are
needed.
24. Load Testing:
a. Load testing involves simulating heavy traffic or high user loads on a network to assess
its performance under stress. Tools like Apache JMeter or LoadRunner can generate simulated
traffic and measure how well the network infrastructure and services handle the increased load.
This type of testing helps identify potential bottlenecks and weaknesses in the network.
25. Security Testing:
a. Security testing is essential to identify vulnerabilities in a network. This includes
penetration testing, vulnerability scanning, and other security assessments. Tools like Nmap,
Wireshark, and Nessus can be used to detect open ports, potential security risks, and
misconfigurations within the network.
26. Packet Analysis:
a. Packet analyzers like Wireshark capture and analyze individual packets traveling across a
network. This helps in diagnosing network issues, identifying abnormal behavior, and
understanding the flow of data. Packet analysis is crucial for troubleshooting, monitoring, and
optimizing network performance.
27. Protocol-specific Testing:
a. Depending on the network's nature, specific protocol testing may be required. For
example, testing the Quality of Service (QoS) for VoIP (Voice over Internet Protocol) involves
assessing factors like latency, jitter, and packet loss to ensure a smooth communication
experience.

(10Marks)
(b) explain any five components used in computer networking
Page 10 of 11
©2023 TVET CDACC

1. Network Interface Card (NIC):


• A NIC is a hardware component that allows a device, such as a computer or a printer, to
connect to a network and communicate with other devices. It is responsible for converting data
from the computer into a format suitable for transmission over the network and vice versa.
2. Router:
• Routers are devices that connect different networks together. They operate at the network
layer (Layer 3) of the OSI model and are responsible for forwarding data packets between
different networks. Routers play a crucial role in determining the most efficient path for data to
travel from the source to the destination.
3. Switch:
• A switch is a networking device that operates at the data link layer (Layer 2) of the OSI
model. It is used to connect devices within the same local area network (LAN). Unlike hubs,
switches are more intelligent and can forward data only to the specific device for which the data
is intended, improving network efficiency.
4. Hub:
• Hubs are simple networking devices that operate at the physical layer (Layer 1) of the
OSI model. They are used to connect multiple devices in a LAN, but unlike switches, hubs
broadcast data to all connected devices, causing more network traffic and potentially reducing
efficiency.
5. Firewall:
• A firewall is a software or hardware component that provides security by controlling and
monitoring incoming and outgoing network traffic based on predetermined security rules.
Firewalls are crucial for protecting a network from unauthorized access, cyberattacks, and the
spread of malware. They can be implemented at various points in a network, including at the
perimeter between a private network and the internet.

(10 Marks)

THIS IS THE LAST PRINTED PAGE.

Page 11 of 11

You might also like