Network Maintenance and Administration (CSCT6107)

Computer Science - COS

Semester: First Semester

Level: 500

Year: 2018

Page 1 of 2
SCHOOL: H.T.T.T.C DEPARTEMENT: CS LECTURER(S): Dr. Suh Charles Forbacha
COURSE CODE: CSCT6107 COURSE TITLE: Maintenance and Network Administration
OPTION: FCS 500
DATE: HALL: …….. TIME: 1 hr NATURE: EXAM 2018/19
INSTRUCTION: Please note that the mark that you achieve from this examination will count toward 70% of your final
mark for this module.
The following questions are multiple choice. So please select the correct answer from options a-d. NB: Please note that only
one of the answers (a-d) is correct.
Section A
1) A measure of how fast we can actually send data through a network is referred to as: 1 mark
(a) Performance
(b) Throughput
(c) Transmission time
(d) Propagation time
2) An approach which is reliant on a string of tracer-route like probe packets that would enable it to build a network map is called: 1
mark
(a) SNMP-based approaches
(b) Route analytics approaches
(c) Active probing based approach
(d) None of the above
3) A type of network in which all the nodes on a segment are connected to the same physical cable is called: 1 mark
(a) Ring network
(b) Mesh network
(c) Bus network
(d) Tree network
4) A layer 4 protocol that does not establish connections plus does not attempt to keep data packets in sequence as well as not watching
those that have existed for too long is known as: 1 mark
(a) Transmission Control Protocol
(b) User Datagram Protocol
(c) Internet Control Message Protocol
(d) Dynamic Configuration Protocol
5) A network protocol that takes an IP address in an IP datagram and translates it into the appropriate medium access control layer
address for delivery on a LAN is referred to as: 1 mark
(a) Internet Protocol
(b) Transmission Control Protocol
(c) Network Address Translation
(d) Address Resolution Protocol
REPUBLIC OF CAMEROON
Peace Work Fatherland
***********
THE UNIVERSITY OF BAMENDA
***********
HIGHER TECHNICAL TEACHER TRAINING
COLLEGE (H.T.T.T.C.) BAMBILI
***********
DIRECTORATE OF STUDIES
**********
P.O.BOX 39 BAMBILI
REPUBLIQUE DU CAMEROON
Paix Travail - Patrie
***********
UNIVERSITE DE BAMENDA
***********
ECOLE NORMALE SUPERIEURE
D’ENSEIGNEMENT TECHNIQUE
***********
DIRECTION DES ETUDES
**********
Tél: 33 05 10 69
www.schoolfaqs.net
Page 2 of 2
6) Computers that store network software and shared or private user files are known as: 1 mark
(a) Workstations
(b) Mainframes
(c) Servers
(d) Routers
7) The protocol used for the management of TCP/IP networks is: 1 mark
(a) Common Management Information Protocol
(b) Internet Control Message Protocol
(c) User Datagram Protocol
(d) Simple Network Management Protocol
8) computing devices that allow workstations to connect to the network plus make decisions about where to send a piece of data are
known as: 1 mark
(a) Nodes
(b) Hubs
(c) Routers
(d) switches
Section B
1) State and briefly explain the 3 approaches that are used in network mapping. 6 marks (2,2,2)
2) Briefly explain how network sniffers are used to analyze data that is being transmitter over the network and provide an example of a
diagnostic tool to support your discussion. 5 marks
3) Distinguish between a network operation system and a standard operation system and support your discussion with any 2 functions
that are carried out by each. 4 marks
4) State and briefly explain the four key elements of an SNMP. 8 marks
5) What are the propagation time and the transmission time for a 10-Mbyte message (an image) if the
bandwidth of the network is 1 Mbps? Assume that the distance between the sender and the
receiver is 12,000 km and that light travels at 2.4 x 10
8
m/s. 4 marks (2,2)
www.schoolfaqs.net