Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
68 views
20 pages
CSF3402 s64390 Withanswers
sdfvfvvsdf dvxcvxcvxcvxcvx
Uploaded by
MUHAMMAD RAFZAN ARMAN
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CSF3402_s64390_withAnswers For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
68 views
20 pages
CSF3402 s64390 Withanswers
sdfvfvvsdf dvxcvxcvxcvxcvx
Uploaded by
MUHAMMAD RAFZAN ARMAN
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CSF3402_s64390_withAnswers For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save CSF3402_s64390_withAnswers For Later
You are on page 1
/ 20
Search
Fullscreen
cr: oF 50 BY CSF3402 CONFIDENTIAL SULIT UMT UNIVERSITI MALAYSIA TERENGGANU FINAL EXAMINATION PEPERIKSAAN AKHIR SEMESTER II 2019/2020 SESSION (DEGREE PROGRAMME) SEMESTER II SESI 2019/2020 (SARJANA MUDA) COURSE 1 NETWORKING KURSUS RANGKAIAN COURSE CODE 1 CSF3402 KOD KURSUS DATE 3 22 JUN 2020 (MONDAY) TARIKH 22 JUN 2020 (ISNIN) VENUE 1 ONLINE TEMPAT ‘TIME + 3.00 PM — 5.00 PM (2 HOURS) MASA 3.00 — 5,00 PETANG (2. JAM) MATRIC NO. NO. MATRIK PROGRAMME NAMA PROGRAM SEAT NO. NO. MEJIA UCTIC [DATES ARAHAN KEPADA CALON i, Answer all questions. ‘Sila jawab semua soalan. ii, All answers must be written in e-Learning platform. Semua jawapan hendakiah ditulis dalam platform e-Pembelajaran. DO NOT OPEN THE QUESTION PAPER UNTIL INSTRUCTED JANGAN BUKA KERTAS SOALAN INI SEHINGGA DIBERITAHU THIS QUESTION PAPER CONSISTS OF NINETEEN (19) PRINTED PAGES KERTAS SOALAN INI MENGANDUNGI SEMBILAN BELAS (19) MUKA SURAT BERCETAKCSF3402 CONFIDENTIAL SULIT PART A / BAHAGIAN A (75 Marks/ 75 Markah) Please choose the most appropriate answer for each question in this part. Sila pili Jawapan yang paling tepat bagi setiap soalan dalam bahagian ini, 1. Which device performs the function of determining the path that messages should take through internetworks? (1 Mark) Peranti mana yang menjalankan fungsi menentukan jalan yang harus dilalul oleh mesey ‘melalui rangkalan internet? (1 Markah) Router Penghala B. Firewall Tembok keselamatan C. Web server Pelayar web D. Modem ‘Modem 2. Which statement describes a network that supports Quality of Sevices (QoS)? (1 mark) Pernyataan yang manakah menerangkan rangkaian yang menyokong mutu perkhidmatan (QoS)? (1 markah) A. Data sent over the network is not altered in transmission, Data yang dihantar melalui rangkaian tidak diubah dalam penghantaran. B. The fewest possible devices are affected by a failure, Sebilangan kecil peranti mungkin terjejas oleh kegagalan, C. The network provides predictable levels of service to different types of traffic, Rangkaian ini menyediakan tahap perkhidmatan yang dapat diramalkan untuk pelbagai jenis lalu lintas. D. The network should be able to expand to keep up with user demand, Rangkaian harus dapat berkembang untuk memenuhi permintaan pengguna. 3. Which term describes the state of a network when the demand on the network resources exceeds the available capacity? (1 mark) Istilah manakah yang menggambarkan keadaan rangkaian apabita permintaan sumber daya rangkaian melebihi kapasiti yang ada? (1 markah) A. Optimization Pengoptimuman (8 Jeongestion Kesesakan C. Convergence Penumpuan D. Synchronization Penyegerakan 4. Which Internet connection options do not require that physical cables be run to the building? (1 mark) Pihan sambungan Internet mana yang tidak memeriukan kabel fizikal dijalankan ke bangunan? (1 markah) 2ngCSF3402 CONFIDENTIAL SULIT A, )Celluiar C. Digital Subscriber Line (DSL) Talian Pelanggan Digital D. Dedicated Leased Line Talian Pajak Dedikasi 5. Which method that used to remotely accessing the Command Line Interface (CLI) over internet connection? (1 mark) ‘Kaedah mana yang digunakan untuk mengakses antara muka baris perintah (CLI) ‘melalui sambungan internet dari jauh? (1 markah) ‘A. Secure Shell Cangkerang Selamat a B. Console port 4 Port Konsol 6. What are two characteristics of Random Access Memory (RAM) on a Cisco device? (2 mark) Apakah dua ciri Memori Capaian Rawak (RAM) pada peranti Cisco? (2 markah) ‘A. RAM provides nonvolatile storage ‘RAM menyediakan simpanan tidak mudah berubah B. The configuration that is actively running on the device is stored in RAM. Konfigurasi yang dijalankan secara aktif pada peranti disimpan dalam RAM, C. The contents of RAM are lost during a power cycle, Isi kandungan RAM hilang semasa kitaran kuasa, D. RAM is a component in Cisco switches but not in Cisco routers. ‘RAM adalah komponen dalam suis Cisco tetapi tidak pada penghala Cisco 7. What isa result of using the service password-encryption command on a Cisco network device? (1 mark) Apakah hasil penggunaan perintah penyulitan kata laluan perkhidmatan pada peranti rangkalan Cisco? (1 markah) ‘A. JThe command encrypts the banner message. Perintah enkripsi pada mesej sepanduk, B. The command encrypts the enable mode password. Perintah enkripsi yang mengaktifkan mod kata laluan. C. Annetwork administrator who later logs into the device will be required to enter an administrator password in order to gain access to the Cisco device. Pentadbir rangkalan yang kemudian log masuk ke peranti akan diminta memasukkan kata laluan pentaabir untuk mendapatkan akses ke peranti Cisco. D. All passwords in the configuration are not shown in clear text when viewing the configuration. Semua kata laluan dalam konfigurast tidak altunjukkan dalam teks yang jelas semasa melinat konfigurasi. 3/19CSF3402 CONFIDENTIAL SULIT 8, What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? (1 marks) Apa yang cuba ditentukan oleh pengguna semasa mengeluarkan arahan ping 10.1.1.1 pada PC? (1 markah) A B. D. If the TCP/IP stack is functioning on the PC without putting traffic on the wire Jika timbunan TCP / IP berfungsi pada PC tanpa meletakkan trafik pada wayar ‘The path that traffic will take to reach the destination Laluan yang akan diambillalu lintas untuk sampai ke destinasi If there is connectivity with the destination device Sekiranya terdapat hubungan dengan peranti tujuan To know what type of device is at the destination Untuk mengetahui jenis peranti yang berada ai tempat tujuan a 9. What method can be used by two computers to ensure that packets are not dropped : because too much data is being sent too quickly? (2 mark) Kaedah apa yang dapat digunakan oleh dua komputer untuk memastikan paket tidak dijatuhkan kerana terlalu banyak data dlhantar terlalu cepat? (2 markah) A G Encapsulation Pengkapsulan ‘Access method ‘aedah akses low control [Kawalan aliran / Response timeout Tamat masa tindak balas 10. Which statement is correct about network protocols? (1 marks) Pemyataan yang manakah betul mengenai protokol rangkaian? (1 markah) Q A Network protocol define how messages are exchanged between the source and the destination. Protokol rangkalan menentukan bagaimana mesej ditukar antara sumber dan tujuan. Network protocols define the type of hardware that is used and how it is mounted in racks. Protokol rangkaian menentukan jenis perkakasan yang digunakan dan bagaimana ia dipasang di rak. Network protocol function in the network access layer of Transport Control Protocol/Internet Protocol (TCP/IP). Fungsi protokol rangkaian dalam lapisan akses rangkaian Protokol Kawalan Pengangkutan / Protokol Internet (TCP / IP). Network protocol only required for exchange of messages between devices on remote networks. Protokol rangkaian hanya diperlukan untuk pertukaran mesej antara peranti df rangkalan jauh. 4/19CSF3402 CONFIDENTIAL 11 12. SULIT A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? (2 marks) Pelanggan web menghantar permintaan untuk laman web ke pelayan web. Dari perspektif pelanggan, apakah susunan protokol yang betul yang digunakan untuk ‘menyiapkan permintaan penghantaran? (2 markah) A. Hypertext Transfer Protocol (HTTP), Internet Protocol (IP),Transport Control Protocol (TCP), Ethernet Protoko! Pindah Hiverteks (HTTP), Protokol Internet (IP), Protokol Kawalan Pengangkutan (TCP), Ethernet B. Hypertext Transfer Protocol (HTTP), Transport Control Protocol (TCP), Internet Protocol (IP), Ethernet Protoko! Pindah Hiperteks (HTTP), Protokol Kawalan Pengangkutan (TCP), Protokol Internet (IP), Ethernet C. Ethernet, Internet Protocol (IP),Transport Control Protocol (TCP), Hypertext Transfer Protocol (HTTP) Ethernet, Protokol Internet (IP), Protokol Kawalan Pengangkutan (TCP), Protokol Pindah Hiperteks (HTTP) D. Ethernet, Transport Control Protocol (TCP), Internet Protocol (IP), Hypertext Transfer Protocol (HTTP) Ethernet, Protokol Kawalan Pengangkutan (TCP), Protokol Internet (IP), Protokol Pindah Hiperteks (HTTP) ‘At which layer of the Open System Interconnection (OSI) model would a logical address be added during encapsulation? (2 marks) Pada lapisan model Sistem Terbuka Saling Sambung (OSI) yang manakah alamat logik akan ditambahkan semasa pengkapsulan? (2 markah) A. Physical layer Lapisan fizikal B, Data link layer Lapisan Pepaut Data ( C.)) Network layer Lapisan rangkaian D. Transport layer 13. Lapisan pengangkutan Which of the following statement describes a characteristic of Medium Access Control (MAC) addresses? (1 mark) ‘Manakah antara pernyataan berikut yang menerangkan ciri Kawalan Capaian Bahantara (MAC) (1 markah) A. Only routable within the private network Hanya dapat dilancarkan dalam rangkaian peribadi ‘They must be globally unique Mesti unik dl seluruh dunia C. Added as part of a Layer 3 Packet Data Unit (PDU) Ditambahkan sebagai sebahagian daripada Unit Data Paket (POU) Lapisan 3 D. Have a 32-bit binary value. ‘Mempunyai nilai binari 32-bit. 5/19CSF3402 CONFIDENTIAL ‘SULIT 14. What technique is used with Unshielded Twisted-Pair (UTP) cable to help protect against signal interference from crosstalk? (2 mark) Teknik apakah yang aigunekan dengan kabel Pasangan Terpiuh Tak Bertebat (UTP) untuk membantu melindungi daripada gangguan isyarat dari cakap silang? (2 markah) ‘A. Wrapping a foil shield around the wire pairs ‘Membungkus pelindung kerajang ai sekitar pasangan wayar B. Encasing the cables within a flexible plastic sheath ‘Merangkumi kabel di dalam sarung plastik yang fleksibel . Twisting the wires together into pairs ‘Memusingkan wayar menjadi berpasangan D. Terminating the cable with special grounded connectors ‘Menamatkan kabel dengan penyambung dibumikan khas 15. A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The new cabling was installed in the ceiling close to fluorescent lights and electrical equipment. Which two factors may interfere with the copper cabling and result in signal distortion and data corruption? (2 mark) Pentadbir rangkaian menyedari bahawa sebilangan kabel Ethernet yang baru dipasang membawa isyarat data yang rosak dan herotan. Kabel baru dlpasang di siling berdekatan dengan lampu pendarfluor dan peralatan elektrik. Dua faktor mana yang boleh mengganggu pemasangan kabel tembaga dan mengakibatkan penyelewengan isyarat dan kerosakan data? (2 markah) ‘A. Radio Frequency Interference (RFI) Gengguan radio frekuensi (RFI) B. Electromagnetic Interference (EMI) Gangguan electromagnet (EMI) C. Crosstalk Cakap slang D. Extended length of cabling Kabel yang panjang 16. A network administrator is designing the layout of a new wireless network. Which area of concern should be accounted for when building a wireless network? (2 mark) Pentadbir rangkaian merancang susun atur rangkaian tanpa wayar yang baru. Bidang erhatian mana yang harus aipertimbangkan ketika membina rangkaian tanpa wayar? (2 markah) A, ) Coverage area Kawasan liputan B. Interference Gangguan C. Extensive cabling Kabel yang panjang D. Packet collision Perlanggaran paket 17. Which destination address is used in an Address Resolution Protocol (ARP) request frame? (1 mark) 6/19csF3402 CONFIDENTIAL SULIT ‘Alamat tujuan mana yang digunakan dalam kerangka permintaan Protokol Peleralan 1at (ARP)?.(1 markah) ( FFFF.FFFF.FFFF.FFFF 255.255.255.255 Cc. 0.0.0.0 D. — 127.0.0.1 18. Which of the following statements describe features or functions of the logical link control (LLC) sublayer in Ethernet standards? (1 mark) Manakah antara pernyataan berikut yang menerangkan ciri atau fungsi sublayer ‘kawalan pautan logik (LLC) dalam standard Ethernet? (1 markah) A. Logical link control is specified in the IEEE 802:3 standard. Kavalan pautan logik dinyatakan dalam standard IEEE 802.3. B. The LLC sublayer adds a header and a trailer to the data, Sublapisan LLC menambah pengepala dan pengakhir pada data, C. The LLC sublayer is responsible for the placement and retrieval of frames on and off the media, Sublapisan LLC bertanggungjawab untuk penempatan dan pengambilan bingkai di dalam dan di luar media. D. The data link layer uses LLC to communicate with the upper layers of the protocol suite. Lapisan pautan data menggunakan LLC untuk berkomunikasi dengan lapisan atas protokol, 19, Which of the following is not the characteristic of Medium Access Control (MAC) address? (1 mark) Antara berikut, yang manakeh bukan cit alamat Kawalan Capaian Bahantara (MAC)? (1 markah) ‘A. Known as logical address because assigned logically Dikenali sebagai alamat logik kerana aiberkan secara logik 8. Address does not change Alamat tidak berubah C. Similar to the nama of person ‘Sama dengan nama orang D. Known as physical address because physically assigned to the host Network Interface Card (NIC) Dikenali sebagal alamat fizikal kerana diberiken secara fizikal ke Kad Antaramuka Rangkaian (NIC) 20, What is the purpose of the preamble in an Ethernet frame? (1 mark) Apa tujuan pendahuluan dalam bingkai Ethernet? (1 markah) A. Used as a padding for data Digunakan sebagai padding untuk data B, Used to identify the source address Digunakan untuk menentukan alamat sumber 7/192 cSF3402 CONFIDENTIAL SULIT C. Used to identify the destination address Digunaken untuk menentukan alamat tujuan Used for timing synchronization Digunakan untuk penyegerakan masa 21. What is the purpose of the startup configuration file on a Cisco router? (1 mark) Apakah tujuan fail konfigurasi permulaan pada penghala Cisco? (1 markah) A. To facilitate the basic operation of the hardware components of a device Untuk memudahkan operasi asas komponen perkakasan peranti B. To contain the configuration commands that the router JOS is currently using Untuk mengandungi perintah konfigurasi yang sedang digunakan oleh router IOS C. To provide a limited backup version of the IOS, in case the router cannot load the full featured 10S Untuk menyediakan versi sandaran terhad IOS, sekiranya router tidak dapat memuat IOS yang lengkap D. To contain the commands that are used to initially configure a router on startup Mengandungi perintah yang digunakan untuk mengkonfigurasi penghala pada awainya 22. Which field in the 1Pv4 header is used to prevent a packet from traversing a network endlessly? (1 Marks) ‘Medan manakah di pengepala IPv4 yang digunakan untuk mencegah paket melintasi rangkaian tanpa henti? (1 markah) A. Sequence Number Nombor urutan B. Acknowledgment Number Nombor pengakuan Time-to-Live ‘Masa untuk hidup D._ Differentiated Services Perkhidmatan berbeza 23. What is one advantage that the IPv6 simplified header offers over IPv4? (2 marks) Apakah satu kelebihan yang ditawarkan oleh pengepala ringkas IPV6 berbanding IPv4? (2 markah) A. Smaller-sized header Pengepala bersaiz lebih kecil B. yéfficient packet handling Pengendalian paket yang cekap C. Little requirement for processing checksums ‘Sedikit keperluan untuk memproses checksum D. Smaller-sized source and destination IP addresses Alamat IP sumber dan destinasi bersaiz lebih kecil 24. Which command is used to set up secure access to a router through a connection to the console interface? (1 mark) Perintah arahan yang manakah digunakan untuk mengatur akses selamat ke penghala ‘melalui sambungan ke antaramuka konsol? (1 markah) 8/19cSF3402 CONFIDENTIAL SULIT A. line vty 04 dine vty 04 B. ine console 0 | fine console 0 (GJ enable secret cisco enable secret cisco D._ interface fastethernet 0/0 interface fastethernet 0/0 25. Which characteristic of the network layer in the Open System Interconnection (OSI) model allows carrying packets for multiple types of communications among many hosts? (1 marks) Giri lapisan rangkaian yang manakah dalam model Sistem Terbuka Saling Sambung (OST) yang membolehkan membawa paket untuk pelbagal jenis Komunikasi di antara banyak host? (1 markah) A. The ability to operate without regard to the data that is carried in each packet ‘Keupayaan untuk beroperasi tanpa mengambil kira data yang dibawa dalam setiap paket B. The de-encapsulation of headers from lower layers Penyahkapsulan tajuk dari lapisan bawah C..The selection of paths for and direct packets toward the destination Pemilinan faluan untuk dan mengarahkan paket ke destinasi D, The ability'to manage the data transport between processes running on hosts Keupayaan untuk menguruskan pengangkutan data antara proses yang berjalan pada hos 26.When a connectionless protocol is in use at a lower layer of the Open System Interconnection (OSI) model, how is missing data detected and retransmitted if necessary? (2 mark) Apabila protokol tanpa sambungan digunakan pada lapisan bawah model Sistem Terbuka Silang Sambung (OSI), bagaimanakah data yang hilang dikesan dan dikantar semula jika perlu? (2 markah) ‘A. Connectionless acknowledgements are used to request retransmission. Pengakuan tanpa sambungan digunakan untuk meminta penghantaran semula. B. Upper-layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host. Protokol berorientasikan sambungan lapisan atas mengenalpasti data yang diterima dan dapat meminta penghantaran semula dari protokol tingkat atas pada host yang mengirim. C. Network layer Internet Protocol (IP) protocols manage the communication sessions if connection-oriented transport services are not available. Protokol Internet (IP) lapisan rangkaian menguruskan sesi komunikasi sekiranya erkhidmatan pengangkutan berorientasikan sambungan tidak tersedia. D. The best-effort delivery process guarantees that all packets that are sent are received Proses penghantaran usaha terbaik menjamin bahawa semua paket yang dihantar diterima 27. Which two parts are components of an IPv4 address? (2 marks) 9/19cSF3402 CONFIDENTIAL SULIT ‘Dua bahagian yang manakah merupakan komponen alamat IPv4? (2 markah) Network portion Bahagian rangkaian B. Physical portion Bahagian fizikal C. Subnet portion Bahagian subrangkaian D, Host portion ‘Bahagian hos 28. What is the purpose of Internet Control Message Protocol (ICMP) messages? (1 marks) Apakah tujvan mesej Protokol Mesej Kawalan Internet (ICMP)? (1 markah) A. To inform routers about network topology changes Untuk memberitahu penghala mengenai perubahan topolog! rangkalan B. To provide feedback of IP packet transmissions Untuk memberikan maklum balas penghantaran paket IP C. Toensure the delivery of an IP packet Untuk memastikan penghantaran paket IP D. To monitor the process of a domain name to IP address resolution Untuk memantau proses nama domain ke resolusi alamat IP [cH7, PLO3, CLO1, C1] 29. Which of the following is the IPv4 to IPv6 transition techniques that manage the interconnection of IPv6 domains? (1 mark) Antara berikut, yang manakah teknik peralihan IPv4 ke IPv6 yang menguruskan hubungan antara domain IPV6 (1 markah) A. Multiplexing Pemultipleksan B, Encapsulation Pengkapsulan © Trunking Penyaluran D. \Tunneling Terowong 30. Which of these addresses is the shortest abbreviation for the IP address: +0000 : OOAB : 0057? (2 marks) Manakah dari alamat berikut yang merupakan singkatan terpendek untuk alamat IP: FFE: 1044: 0000: 0000: OOAB: 0000: 0000: 0057? (2 markah) A. FFE: 1044: AB:: 57 B, c 0: AB:: 57 D. 0: OOAB :: 0057 31. What type of address is automatically assigned to an interface when IPV6 is enabled on that interface? (1 marks) 19/19CSF3402 CONFIDENTIAL SULIT Jenis alamat apa yang diberikan secara automatik ke antara muka apabila IPV6 diaktitkan pada antara muka itu? (1 markah) ‘A. global unicast unistar global B. loopback gelung balk (© inciea ‘pautan tempatan D. unique local unik tempatan 32. An administrator wants to configure hosts to automatically assign IPV6 addresses to themselves by the use of Router Advertisement messages, but also to obtain the DNS server address from a DHCPv6 server. Which address assignment method should be configured? (2 marks) Pentadbir ingin mengkonfigurast hos untuk menetapkan alamat IPV6 kepada mereka secara automatik dengan menggunakan mesej Iklan Penghala, tetepi juga untuk mendapatkan alamat pelayan DNS dari pelayan DHCPV6. Kaedah penetapan alamat mana yang harus dikonfigurasi? (2 markah) A. Stateless Address Autoconfiguration (SLAAC) Konfigurasi auto Alamat Tanpa Keadaan (SLAAC) (_ 8: Stateless DHCPv6 DHCPY6 tanpa keadaan C. Stateful DHCPv6 DHCPV6 berkeadaan D. RAand EUI-64 RA dan EUI-64 33. What is the reasons a network administrator might want to create subnets? (1 marks) Apakah alasan yang mungkin dibuat oleh pentadbir rangkaian untuk membuat subrangkaian? (1 markah) A. Simplifies network design ‘Memudahkan reka bentuk rangkaian ) Improves network performance ‘Meningkatkan prestasi rangkaian ©. Reduction in number of routers needed Pengurangan bilangan penghala yang dperlukan D. Reduction in number of switches needed Pengurangan bilangan suis yang alpertukan 34, of the following is the prefix for the host address 2001:DB8:BC15:A:12AB::1/64? (2 marks) Antara berikut adalah awalan untuk alamat hos 2001: DB8: BCI: A: 12AB :: 1/64? (2 ‘markah) 2001:DB8:BC15 B. 72001:DB8:BC15:A 2001:DB8:BC15:A:1 D. 2001:DB8:BC15:A:12 11/19CSF3402 CONFIDENTIAL SULIT 35. How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0? (2 marks) Berapa banyak alamat hos yang tersedia di rangkalan 172.16.128.0 dengan topeng subrangkaian 255,255,252.0? (2 markah) A. 512 B. 1022 c. 1056 D. 2046 36, How many bits must be borrowed from the host portion of an address to accommodate @ router with five connected networks? (2 marks) Berapa banyak bit yang mesti aipinjam dari bahagian hos alamat untuk menampung penghala dengan lima rangkaian yang disambungkan? (2 markah) oO A. Two Dua B. Three Tiga c Four Empat D. Five Lima 37. A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth? (2 marks) Peranti hos perly menghantar fail video yang besar ke seluruh rangkaian sambil memberikan komunikasi data kepada pengguna Iain. Ciri mana yang akan membolehkan aliran komunikasi yang berlainan berlaku pada masa yang sama, tanpa ‘mempunyai satu alan data yang menggunakan semua jalur lebar yang tersedia? (2 markah) ‘A. Window size Saiz tingkap B. Multiplexing Pemultipleksan C. Port number ‘Number pot D. Acknowledgement Penghargaan 38. Which of the following is the characteristic of User Datagram Protocol (UDP) sessions? (1 mark) ‘Manakah antara berikut merupekan ciri ses! Protokol Datagram Pengguna (UDP)? (1 markah) A. Transmitted data segments are tracked. Segmen data yang dihantar dikesan. 12/19CSF3402 CONFIDENTIAL SULIT B. Destination devices reassemble messages and pass them to an application. Peranti destinasi memasang semula mesej dan menyampaikannya ke aplikasi. CC. Received data is unacknowledged. Data yang diterima tidak diakui, D. Unacknowiedged data packets are retransmitted, Paket data yang tidak diakul dihantar semuta. 39. Which two characteristics are associated with User Datagram Protocol (UDP) sessions? (2 marks) Dua ciri yang manakah dikaitkan dengan sesi Protokol Datagram Pengguna (UDP) (2 markah) ‘A. Unacknowledged data packets are retransmitted. Paket data yang tidak diakui dihantar semula. B. Transmitted data segments are tracked, Segmen data yang dihantar dapat dikesan, C. Received data is unacknowledged. Data yang diterima tidak diakui. D. Destination devices receive traffic with minimal delay. Peranti destinasi menerima lalu lintas dengan kelewatan minimum. 40. When User Datagram Protocol (UDP) is preferred compared to Transmission Control Protocol (TCP)? (2 marks) Bilakah Protokol Datagram Pengguna (UDP) akan dipilih berbanding Protokol Kawalan Penghantaran (TCP)? (2 markah) A. When an application can tolerate some loss of data during transmission Apabila aplikasi dapat menahan beberapa kehilangan data semasa penghantaran B. When a client sends a segment to a server Apabila pelanggan menghantar segmen ke pelayan C. When all the data must be fully received before any part of it is considered useful Apabila semua data mest diterima sepenuhnya sebelum mana-mana bahagiannya dianggep berguna D. When segments must arrive in a very specific sequence to be processed successfully Apabila segmen mesti tiba dalam urutan yang sangat spesifik untuk diproses dengan jayanya 41. Which layer in the Transmission Control Protocol / Internet Protocol (TCP/IP) model is used for formatting, compressing, and encrypting data? (1 mark) Lapisan yang manakah dalam mode! Protoko! Kawalan Penghantaran/ Protokol Internet (TCP/IP) yang digunakan untuk format, memampatkan, dan menyulltkan data? (1 markah) A. Application layer Lapisan aplikasi B, Presentation layer Lapisan pembentangan C. Session layer Lapisan sesi D. Transport layer 13/19cSF3402 CONFIDENTIAL SULIT Lapisan pengangkutan 42. Which statement is true about File Transfer Protocol (FTP)? (1 marks) Pernyataan yang manakah betul mengenai Protokol Pindahan Fail (FTP)? (2 markah) ‘A. The client can choose if FTP is going to establish one or two connections with the server. Pelanggan boleh memilih apakah FIP akan memyjudkan satu atau dua sambungan dengan pelayan. B. FIP is a peer-to-peer application. FIP adalah aplikasi rakan sebaya. C._ FTP does not provide reliability during data transmission. FIP tidak memberikan kebolehpercayaan semasa penghantaran data. D. The client can download data from or upload data to the server. Pelanggan boleh memuat turun data dari atau memuat naik data ke pelayan. 43. What part of the Uniform Resource Locator (URL), http://www.cisco.com/index.htm!, represents the top-level Domain Name Server (DNS) domain? (2 marks) Bahagian mana dari Pencari Sumber Seragam (URL), http://orerw.cisco.com/index.html, mewakili domain Pelayan Nama Domain (DNS) peringkat teratas? (2 markah) A. com B. http c www D. index 44. Which application layer protocol uses message types such as GET, PUT, and POST? (2 marks) Protokol lapisan aplikasi mana yang menggunakan jenis mesej seperti GET, PUT, dan POST? (2 markah) ‘A. Domain Name Server (DNS) Pelayan Nama Domain B. Dynamic Host Configuration Protocol (DHCP) Protokol Konfigurasi Hos Dinamik C. Simple Mall Transfer Protocol (SMTP) Protokol Pindahan Mail Ringkas D. _ HyperText Transfer Protocol (HTTP) Protokol Pindahan Hiperteks 45. Two students are working on @ network design project. One student is doing the drawing, while the other student is writing the proposal. The drawing is finished and the student wants to share the folder that contains the drawing so that the other student can access the file and copy it to 2 USB drive. Which networking model is being used? (2 marks) Dua orang pelajar sedang mengusahakan projek reka bentuk rangkaian. Seorang pelajar sedang membuat lukisan, sementara pelajar yang lain sedang menulis kertas cadangan. Lukisan selesal dan pelajar ingin berkongsi fail yang mengandungi gambar supaya pelajar lain dapat mengakses fail dan menyalinnya ke pemacu USB. Model rangkaian manakah yang digunakan? (2 markah) 14/19CSF3402 CONFIDENTIAL 46. 47. 48. A B. SULIT A. Glient-based Berasaskan pelanggan B, _Point-to-point Titik ke titik C. Peer-to-peer Rakan sebaya D. — Master-slave Tuan-hamba A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concemed with when choosing the new devices? (2 marks) Juruteknik rangkalan yang baru diupah diberi tugas untuk memesan perkakasan baru untuk perniagaan kecil dengan ramalan pertumbuhan yang besar. Faktor utama manakah yang harus diberi perhatian oleh juruteknik semasa memilih peranti baru? (2 markah) ‘A. Devices with a fixed number and type of interfaces. Peranti dengan bilangan tetap dan jenis antara muka B. Devices that have support for network monitoring Peranti yang mempunyai sokongan untuk pemantauan rangkaian CC. Redundant devices Peranti berlebihan D. Devices with support for modularity Peranti dengan sokongan untuk modulariti Which network design consideration would be more important to a large corporation than to a smali business? (1 mark) Pertimbangan reka bentuk rangkaian yang manakah lebih penting bagi syarikat besar daripada perniagaan kecil? (1 markah) A. Redundancy Berlebihan B. Internet router Penghala Internet C. Firewall Tembok keselamatan D. Low port density switch ‘Suis ketumpatan pot rendah Which two actions can be taken to prevent a successful network attack on an email server account? (2 marks) Dua tindakan yang manakah dapat diambil untuk mencegah serangan rangkaian yang berjaya pada akaun pelayan e-mel? (2 markah) Never send the password through the network in a clear text. Jangan sekali-kali menghantar kata laluan melalui rangkaian dalam teks yang jelas Limit the number of unsuccessful attempts to log in to the server. Hadkan bilangan percubaan yang tidak berjaya untuk log masuk ke pelayan. 15/19CSF3402 CONFIDENTIAL SULIT C. Never use passwords that need the Shift key. Jangan sekali-kali menggunakan kata laluan yang memerlukan kekunci Shift. D. Use servers from different vendors. Gunakan pelayan dari pelbagal vendor. 49. Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? (2 marks) Beberapa penghala dan suis dalam almari pendawaian tidak berfungsi setelah unit penyaman udara gagal. Apakah jenis ancaman yang dinyatakan oleh situasi ini? (2 markah) ‘A. Environmental Persekitaran B, Electrical Elektrik C. Configuration Konfigurasi D. Maintenance Penyeleggaraan 50. Which type of network threat is intended to prevent authorized users from accessing resources? (2 marks) ‘Manakah jenis ancaman rangkaian mana yang dimaksudkan untuk mencegah pengguna yang diberikan kebenaran mengakses sumber? (2 markah) A. Access attacks Serangan akses B. Denial of Services (DoS) attack ‘Serangan penolakan perkhidmatan C. Reconnaissance attacks Serangan pengintaian D. Trust exploitation Exkploitasi kepercayaan 16/19CSF3402 CONFIDENTIAL SULIT PART B/ BAHAGIAN B (25 Marks/ 25 Markah) Please answer all question. Sila jawab semua soalan. Cisco routers require configuration before they can be operated. By referring to Figure 3, use Command Line Interface (CLI) and express the steps required to perform the following: (10 marks) Penghala Cisco memerlukan konfigurasi sebelum mereka boleh dikendalikan. Dengan merujuk kepada Rajah 3, gunakan Antaramuka Baris Perintah (CLI) dan nyatakan Jangkat-langkah yang diperlukan untuk melakukan perkara berikut: (10 markah) a. to configure router Ri (3 marks) untuk mengkonfigurasi penghala R1 (3 markah) b. to configure secure access to the console line with dass password (4 marks) untuk mengkonfigurasi capaian yang selamat ke garisan konsol dengan kata Jaluan class (4 markah) c. _ to configure secure privileged mode access with cisco password (2 marks) untuk mengkonfigurasi capaian mod privileged yang selamat dengan kata laluan cisco. (2 markah) d. to save the configuration file (1 mark) untuk menyimpan fail konfigurasi (1 markah) 17/19CSF3402 CONFIDENTIAL SULIT 2. The use of IP addresses, either IPV4 or IPv6 is the primary means of enabling devices to late one another and establish end-to-end communication on the Internet. By referring to Table 1, determine all the information below for the network address 148.75.0.0/26. (15 marks) Penggunaan alamat IP, sama ada IPv4 atau IPV6 adalah cara utama untuk membolehkan peranti mencari antara satu sama lain dan mewujudkan komunikasi hhujung ke hujung di Intemet. Dengan merujuk kepada Jadual 1, tentukan semua ‘maklumat di bawah bagi alamat rangkaian 148.75.0.0/26. (15 markah) Table 1/ Jadual 1: IPv4 Address Classes ‘Address [1* octet [1 octet | Network (N) | Default Number of ic range bits (bold | and Host (H) | subnet possible 'asS | (decimal) |bitsdo | parts of mask networks not address (decimal _| and hosts change) and binary) | per network A 1-127 00000000 | N.H.H.H | 255. | 128 nets 1111111 B 128-191 | 10000000-| N.N.H.H | 255.255.0.0 | 16384 nets 10111111 c 192-223 (41000000 | N.N.N.H | 255.255.255.0 | 2,097,250 | : nets, | 11011111 D 224-239 | 44100000 | NA (multicast) 11101111 E 240-255 | 44110000 | NA : (experimtal) | 11111111 a. Prefix length (1 mark) Panjang prefix (1 markah) b. Address class (2 marks) Kelas alamat (2 markah) c. Default subnet mask (2 marks) Tapisan subrangkaian asal (2 markah) d. Custom subnet mask (2 marks) Tapisan subrangkaian adat (2 markah) e. Total number host address (2 marks) Jumlah alamat hos nombor (2 markah) 18/19CSF3402 CONFIDENTIAL SULIT f. Number of usable host address (2 marks) Bilangan alamat hos yang boleh digunakan (2 markah) g. Number of bits borrowed (2 marks) Bilangan bit yang dipinjam (2 markah) h. Total number of subnets (2 marks) Jumiah bilangan subset (2 markah) End of Question Paper Kertas Soalan Tamat 19/19
You might also like
WLAN Notes
PDF
No ratings yet
WLAN Notes
14 pages
TCP/IP Model Presentation
PDF
100% (1)
TCP/IP Model Presentation
11 pages
ITT420 - Exercise 1
PDF
No ratings yet
ITT420 - Exercise 1
5 pages
Network Administration and Management: Prepared By: Inocencio, Rose M
PDF
100% (1)
Network Administration and Management: Prepared By: Inocencio, Rose M
92 pages
1.0 Computer Network Security Deployment Requirements
PDF
No ratings yet
1.0 Computer Network Security Deployment Requirements
12 pages
TASK 2 - Latihan Ip Address
PDF
No ratings yet
TASK 2 - Latihan Ip Address
12 pages
9.2.1.3 Lab - Designing and Implementing A Subnetted IPv4 Addressing Scheme
PDF
0% (2)
9.2.1.3 Lab - Designing and Implementing A Subnetted IPv4 Addressing Scheme
7 pages
Dec3023 Computer Networking Fundamentals
PDF
No ratings yet
Dec3023 Computer Networking Fundamentals
11 pages
Skillbased Assessment Julai 2021 v2
PDF
No ratings yet
Skillbased Assessment Julai 2021 v2
9 pages
Network Layer
PDF
No ratings yet
Network Layer
20 pages
Practical No.1: SPMP Document of "Hospital Management System"
PDF
67% (3)
Practical No.1: SPMP Document of "Hospital Management System"
8 pages
Jaypee Institute of Information Technology: Computer Networks (10B11Ci611) Btech 6 SEM 2016 Tutorial-2
PDF
No ratings yet
Jaypee Institute of Information Technology: Computer Networks (10B11Ci611) Btech 6 SEM 2016 Tutorial-2
9 pages
Questions Sample
PDF
100% (3)
Questions Sample
14 pages
Pengiraan Ip Address Muhamad Alfeqri Shah Bin Shahuri
PDF
No ratings yet
Pengiraan Ip Address Muhamad Alfeqri Shah Bin Shahuri
15 pages
Subnetting Basics: Four Subnetting Steps & Practice Problems
PDF
No ratings yet
Subnetting Basics: Four Subnetting Steps & Practice Problems
28 pages
In Group14 Assignment
PDF
No ratings yet
In Group14 Assignment
40 pages
Chapter 3 - IT Essentials - PC Hardware & Software
PDF
100% (3)
Chapter 3 - IT Essentials - PC Hardware & Software
6 pages
Cara Mengaktifkan IPV6 Di Switch
PDF
No ratings yet
Cara Mengaktifkan IPV6 Di Switch
19 pages
Microsoft Windows Server Network Infrastructure
PDF
100% (1)
Microsoft Windows Server Network Infrastructure
2 pages
Final Exam IS433
PDF
No ratings yet
Final Exam IS433
5 pages
CN MCQs
PDF
No ratings yet
CN MCQs
381 pages
Data Communication & Networking BCN1053
PDF
No ratings yet
Data Communication & Networking BCN1053
11 pages
50 MCQ For CN Lab11 PDF
PDF
No ratings yet
50 MCQ For CN Lab11 PDF
6 pages
Selected Solution of Questions From A1
PDF
50% (2)
Selected Solution of Questions From A1
11 pages
Data Communication & Networking (Nota Ringkas)
PDF
100% (1)
Data Communication & Networking (Nota Ringkas)
15 pages
Nuage Networks 7850 NSG-E200-300 Series Data Sheet EN
PDF
0% (1)
Nuage Networks 7850 NSG-E200-300 Series Data Sheet EN
7 pages
2marks & 16 Marks
PDF
No ratings yet
2marks & 16 Marks
4 pages
Fundamentals of Computer Networks Quiz - 1 - With Answers
PDF
No ratings yet
Fundamentals of Computer Networks Quiz - 1 - With Answers
5 pages
LAN Simulation Using CISCO Packet Tracer
PDF
No ratings yet
LAN Simulation Using CISCO Packet Tracer
10 pages
MCQs
PDF
No ratings yet
MCQs
15 pages
Dep30083 PW5 Nat
PDF
No ratings yet
Dep30083 PW5 Nat
11 pages
Networking 2020
PDF
No ratings yet
Networking 2020
20 pages
CCNA 1 Chapter 1 v5
PDF
No ratings yet
CCNA 1 Chapter 1 v5
13 pages
Final Year Project Proposal
PDF
No ratings yet
Final Year Project Proposal
1 page
HCI Chapter 1
PDF
No ratings yet
HCI Chapter 1
23 pages
Soal CCNA Chapter 1-4
PDF
No ratings yet
Soal CCNA Chapter 1-4
18 pages
1.2.4.12 Lab - Social Engineering Tugas
PDF
No ratings yet
1.2.4.12 Lab - Social Engineering Tugas
3 pages
Question - Practical Test - Sesi 1 2022 - 2023 MUHD 2047
PDF
No ratings yet
Question - Practical Test - Sesi 1 2022 - 2023 MUHD 2047
7 pages
HYPERLAN
PDF
No ratings yet
HYPERLAN
19 pages
Network Management
PDF
No ratings yet
Network Management
39 pages
A. Modem Card B. Controller Card C. Video Card D. Sound Card
PDF
No ratings yet
A. Modem Card B. Controller Card C. Video Card D. Sound Card
50 pages
DEP30083 PW3 DHCP AND DNS SERVER - Edit
PDF
No ratings yet
DEP30083 PW3 DHCP AND DNS SERVER - Edit
16 pages
Activity 2.6 - Subnetting Scenario2 (Packet Tracer)
PDF
No ratings yet
Activity 2.6 - Subnetting Scenario2 (Packet Tracer)
4 pages
Computer Networks - Chapter 5 - Data Link Layer
PDF
No ratings yet
Computer Networks - Chapter 5 - Data Link Layer
9 pages
02-ProtocolArchitecture - William Stallings
PDF
No ratings yet
02-ProtocolArchitecture - William Stallings
47 pages
CCNA 4 (v5.0.3 + v6.0) Practice Final Exam Answers Full PDF
PDF
No ratings yet
CCNA 4 (v5.0.3 + v6.0) Practice Final Exam Answers Full PDF
28 pages
CCNA Exploration 1: Network Fundamentals - Chapter 7 Exam: The Geographic Scope of The Network
PDF
No ratings yet
CCNA Exploration 1: Network Fundamentals - Chapter 7 Exam: The Geographic Scope of The Network
5 pages
Ekt 335
PDF
No ratings yet
Ekt 335
16 pages
Network Scenario 2
PDF
No ratings yet
Network Scenario 2
2 pages
CCNA Model Exam Question
PDF
No ratings yet
CCNA Model Exam Question
24 pages
Latihan TJKN
PDF
No ratings yet
Latihan TJKN
7 pages
Project Synopsis On LAN Connection
PDF
No ratings yet
Project Synopsis On LAN Connection
15 pages
Timestamp Score Password Soal: Nama Lengkap
PDF
No ratings yet
Timestamp Score Password Soal: Nama Lengkap
53 pages
Different Layers of Osi Model
PDF
No ratings yet
Different Layers of Osi Model
13 pages
Modul Ulang Kaji Bagi Kursus Dfc20293 - A
PDF
No ratings yet
Modul Ulang Kaji Bagi Kursus Dfc20293 - A
20 pages
Networking Mid-Semester Exam Marking Scheme - 2004-5 Semester 1
PDF
No ratings yet
Networking Mid-Semester Exam Marking Scheme - 2004-5 Semester 1
7 pages
Contoh Soalan
PDF
No ratings yet
Contoh Soalan
4 pages
FCN Sample
PDF
No ratings yet
FCN Sample
5 pages
Modul Ulang Kaji Bagi Kursus Dfc20293 - Q
PDF
No ratings yet
Modul Ulang Kaji Bagi Kursus Dfc20293 - Q
18 pages
Computer Networks Test 2: Number of Questions: 35 Section Marks: 30
PDF
No ratings yet
Computer Networks Test 2: Number of Questions: 35 Section Marks: 30
5 pages