Click to follow our Afritutor YouTube Channel, subscribe and click notifications and get updates on new learning videos


<=Back

<=CDACC ICT Technician Level 5 : Perform Computer Networking past paper July 2023

State the medium that is used to carry data in a computer network that is exposed to electrical interferences (1 Mark)
A. Unshielded twisted pair
B. Optical fiber
C. Coaxial cable
D. Microwaves

    Viewed:  71  times
For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!

  Share in:
        

Question Answer:





Questions List:

1. _______ is the maximum header size of an IP packet. (1 Mark) A. 32 bytes B. 64 bytes C. 30 bytes D. 60 bytes
2. Bridge works in ________ layer of the OSI model (1 Mark) A. Application layer B. Transport layer C. Network layer D. Datalink layer
3. How many layers are in the TCP/IP model (1 Mark) A. 4 layers B. 5 layers C. 6 layers D. 7 layers
4. The Internet is an example of ______. (1 Mark) A. Cell switched network B. Circuit switched network C. Packet switched network D. Operating system resource
5. _____________ is defined as sub-netting. (1 Mark) A. Dividing one large network into several smaller ones B. Dividing network into network classes C. Speeding up the speed of network D. Controlling network
6. Repeater operates in _______ of the OSI model (1 Mark) A. Physical layer B. Data link layer C. Network layer D. Transport layer
7. Highlight the tool that is used to capture and analyze network traffic (1 Mark) A. Ping B. Traceroute C. Netstat D. Wireshark
8. MAC Address is comprised of ________ bits. (1 Mark) A. 16 B. 32 C. 48 D. 64
9. Which type of testing helps to identify vulnerabilities in network security (1 Mark) A. Penetration testing B. Bandwidth testing C. Packet analysis D. Port scanning
10. The network service that allows multiple devices in a LAN network to share a single public IP address is referred to (1 Mark) A. NAT (Network Address Translation) B. VLAN (Virtual Local Area Network) C. DNS (Domain Name System) D. DHCP (Dynamic Host Configuration Protocol)
11. What is the method used to broadcast two packets on a medium at a time. (1 Mark) A. Collision B. Synchronous C. Asynchronous D. Multicast
12. State the medium that is used to carry data in a computer network that is exposed to electrical interferences (1 Mark) A. Unshielded twisted pair B. Optical fiber C. Coaxial cable D. Microwaves
13. Which network topology requires more cabling as the number of devices increases? (1 Mark) A. Bus topology B. Ring topology C. Star topology D. Mesh topology
14. The loopback IP address for IPv4 is ___________. (1 Mark) A. 127.0.0.1 B. 192.168.1.1 C. 10.0.0.1 D. 172.16.0.1
15. The outer layer of a coaxial cable is typically made of ________. (1 Mark) A. Copper B. Aluminum C. Plastic D. Glass
16. How many pins does RJ-45 contain? (1 Mark) A. Two B. Four C. Eight D. Ten
17. Given an IP address of 192.168.1.10 and a subnet mask of 255.255.255.240, ______ is the broadcast address for the subnet. (1 Mark) A. 192.168.1.255 B. 192.168.1.128 C. 192.168.1.100 D. 192.168.1.0
18. _____ topology requires a central controller in the network. (1 Mark) A. Star B. Mesh C. Ring D. Bus
19. DNS is the abbreviation of __________. (1 Mark) A. Dynamic Name System B. Dynamic Network System C. Domain Name System D. Domain Network Service
20. The tool used for security testing and identifying vulnerabilities in web applications is called (1 Mark) A. Burp Suite B. TestNG C. LoadRunner D. JIRA
21. Outline FOUR factors that affect the performance of a computer network. (4 Marks)
22. A firewall plays an important role in network security. Highlight FOUR types of firewalls. (4 Marks)
23. State THREE factors that are required to consider when designing a transmission medium. (3 Marks)
24. State FOUR benefits of a networked environment. (4 Marks)
25. Highlight FOUR types of Virtual Private Network (VPN). (4 Marks)
26. Identify FOUR properties that a secure network should possess. (4 Marks)
27. Define the following terms as used in networking: a) Bit error rate. (2 Marks) b) Attenuation. (2 Marks) c) Unicast address. (2 Marks)
28. Outline FOUR tools used during a network installation. (4 Marks)
29. Distinguish between bandwidth and latency as applied in computer networking. (4 Marks)
30. Enumerate at least THREE elements of a computer network. (3 Marks)
31. OSI model is used to standardize the communication functions of a networked environment. Describe the SEVEN layers of the OSI model. (14 Marks)
32. Isaac, a trainer of perform computer networking, was teaching his class on protocols. In the course of the class, he talked about Transfer Control Protocol (TCP) and User Datagram Protocol (UDP). Outline THREE characteristics of the two protocols. (6 Marks)
33. Ken was employed to install a computer network for company ABC. After the installation, he was required to carry out user training. Explain FIVE reasons for carrying out training after network installation. (10 Marks)
34. Mr. James was employed as a network administrator in KPLC company that was upgrading their network systems. Describe FIVE ways he could use to prevent network intrusion in the company. (10 Marks)
35. The county government of Busia is intending to install a computer network to the newly constructed Governor’s office. Explain FIVE network devices they could use to have the office networked. (10 Marks)
36. List FOUR characteristics of a Wide Area Network (WAN). (4 Marks)
37. With the aid of a diagram, illustrate each of the following physical computer network topologies. i. Mesh. (3 Marks) ii. Ring. (3 Marks)


About Us

Contact us

Terms of use | Privacy policy

Follow Us:               

All Rights Reserved © 2024; pscustudies.com