Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

KOLEJ UNIVERSITI TUNKU ABDUL RAHMAN

FACULTY OF COMPUTING AND INFORMATION TECHNOLOGY

ACADEMIC YEAR 2021/2022

OCTOBER EXAMINATION

INFORMATION TECHNOLOGY BMIT3094


ADVANCED COMPUTER NETWORK

THURSDAY, 7 OCTOBER 2021 TIME: 2.00 PM – 5.00 PM (3 HOURS)

BACHELOR OF INFORMATION TECHNOLOGY (HONOURS) IN INFORMATION SECURITY


BACHELOR OF INFORMATION TECHNOLOGY (HONOURS) IN INTERNET TECHNOLOGY
BACHELOR OF INFORMATION TECHNOLOGY (HONOURS) IN SOFTWARE SYSTEMS
DEVELOPMENT

Instructions to Candidates:

Answer ALL questions in the requested format or template provided.

● This is an open book final online assessment. You MUST answer the assessment questions on
your own without any assistance from other persons.
● You must submit your answers within the following time frame allowed for this online
assessment:
o The deadline for the submission of your answers is half an hour from the end time of this
online assessment.
● Penalty as below WILL BE IMPOSED on students who submit their answers late as follows:
o The final marks of this online assessment will be reduced by 10 marks for answer scripts
that are submitted within 30 minutes after the deadline for the submission of answers for
this online assessment.
o The final marks of this online assessment will be downgraded to zero (0) mark for any
answer scripts that are submitted after one hour from the end time of this online assessment.
● Extenuation Mitigating Circumstance (EMC) encountered, if any, must be submitted to the
Faculty/Branch/Centre within 48 hours after the date of this online assessment. All EMC
applications must be supported with valid reasons and evidence. The UC EMC Guidelines apply.

FOCS Additional Instructions to Candidates:


• Include your FULL NAME, STUDENT ID and PROGRAMME OF STUDY in your
submission of answer.
• Read all the questions carefully and understand what you are being asked to answer.
• Marks are awarded for your own (original) analysis. Therefore, use the time and information to
build well-constructed answers.

This question paper consists of 4 questions on 6 printed pages.


2
BMIT3094 ADVANCED COMPUTER NETWORK

STUDENT’S DECLARATION OF ORIGINALITY


By submitting this online assessment, I declare that this submitted work is free from all forms of
plagiarism and for all intents and purposes is my own properly derived work. I understand that I have
to bear the consequences if I fail to do so.

Final Online Assessment Submission


Course Code:
Course Title:
Signature:
Name of Student:
Student ID:
Date:

This question paper consists of 4 questions on 6 printed pages.


3
BMIT3094 ADVANCED COMPUTER NETWORK

Question 1

a) Figure 1-1 shows a network topology with the Internet Protocol version 4 (IPv4) configurations
done on all routers interfaces and Personal Computers (PCs).

Figure 1-1: A network topology

Based on Figure 1-1, determine the appropriate static routes configurations with justifications
in the respective routers (EDGE and FOCS). ISP is already pre-configured with static routing.
Use Table 1-1 to document your answer.

(i) Standard static routes using next hop IP address. PC1 and PC2 are able to communicate
with PC3. (9 marks)

(ii) Default static route as a primary route using next hop IP address. PC3 is able to ping
ExternalPC. Make your assumptions. (5 marks)

(iii) Default static route as a secondary route or backup route using next hop IP address. PC3
is able to ping ExternalPC. Make your assumptions. (6 marks)

Table 1-1: Documentation Table


Item Router Static route configurations Justifications
name
(i)
(ii)
(iii)

This question paper consists of 4 questions on 6 printed pages.


4
BMIT3094 ADVANCED COMPUTER NETWORK

Question 1 (Continued)

b) You are required to replace standard static routes with Open Shortest Path First (OSPF)
configurations in EDGE and FOCS routers. Configuration of default static routes remain the
same on your answer for Question 1a). Based on Figure 1-1, determine the OSPF using network
command configurations in EDGE and FOCS routers to allow PC1, PC2, PC3 and any PCs on
the Internet to communicate with each other. Use OSPF process-id 54 and area-id 0. Use Table
1-2 to document your answer.

Table 1-2: Documentation Table

Router name OSPF configurations

(10 marks)

[Total: 30 marks]

Question 2

a) (i) Compare and contrast TWO (2) social engineering attacks. (4 marks)

(ii) Which of these two social engineering attacks is more commonly encountered among
businesses? Include your reasons to support your answer. (4 marks)

b) Figure 2-1 shows a network topology where the Access Control List (ACLs) are to be applied
to the router’s interface to secure the network.

Figure 2-1: A network topology

This question paper consists of 4 questions on 6 printed pages.


5
BMIT3094 ADVANCED COMPUTER NETWORK

Question 2 b) (Continued)

Analyze Figure 2-1 and answer the following questions.


(i) Write an access list numbered 30 to allow PC3 to telnet into RouterA. Deny all other
telnet traffic to RouterA which must be explicitly written in your Access Control List
(ACL). Use suitable keyword(s) in the ACL. Indicate the router, interface and direction
to apply the ACL. (5 marks)

(ii) Write an extended access list named HALF_NET to block Laptop0 from receiving
information from second half of usable addresses from 192.168.44.0/24 network. Permit
all other traffics. Use suitable keyword(s) in your ACL. Indicate the router, interface and
direction to apply the ACL. (7 marks)
[Total: 20 marks]

Question 3

CEO of ARMY Sdn. Bhd. has employed you to ensure all the PCs in the company are able to
communicate with each other. Assume all the IPv4 addressing, static routing and OSPF configurations
are configured in the respective routers. With reference to a network topology shown in Figure 3-1,
answer the following questions.

Figure 3-1: A network topology

a) DHCP (Dynamic Host Configuration Protocol) configurations are to be configured in BE-


DHCP router. PC-V, PC-JK, PC-HOPE and PC-JM should obtain the IP addresses and other
DHCP configurations automatically from BE-DHCP router as shown in Figure 3-1. Use Table
3-1 to document the DHCP configurations with justifications. (16 marks)

Table 3-1: Documentation Table


Router name Configurations Justifications

This question paper consists of 4 questions on 6 printed pages.


6
BMIT3094 ADVANCED COMPUTER NETWORK

Question 3 (Continued)

b) Refer to Figure 3-1. Write the configurations for Port Address Translation (PAT) using the
single IP address assigned to the external interface in BE-NAT router. Access-list number is
18. All the PCs should be able to ping ExternalPC.
(9 marks)

[Total: 25 marks]

Question 4

a) Modern Wide Area Network (WAN) technologies continually emerging. An organization has
options to choose a modern Wide Area Network (WAN) to connect their Local Area Networks
(LANs) to the remote LANs. Propose and illustrate the most appropriate modern WAN solution
for the following scenario.

(i) A company with branches at different locations using Ethernet technology. (5 marks)

(ii) Local subscriber using coaxial cable to have Internet connection. (5 marks)

b) “Due to Covid-19 pandemic, many people are working from home during the lockdown
including many sectors that were not previously home working. Companies’ management staff
and their employees are keeping operations under social distancing restrictions. These mobile
workers are using Virtual Private Networks (VPNs) to connect to the companies.” Evaluate the
usage of VPNs by mobile workers based on the above statements. (9 marks)

c) "First-In, First-Out (FIFO) algorithm is suitable to be used for a very congested network."
Comment on the above statement. (6 marks)

[Total: 25 marks]

This question paper consists of 4 questions on 6 printed pages.

You might also like