Question 6: Write down the conunand the PC Technician would have to execute to identify all
the devices that the PC in Figure 2 has communicated with on the Local Area Network. (2)
Question 7: The PC in Figure 2 is connected to the Local Area Network (LAN) using
Unshielded Twisted Pair (UTP) cables.
a) Mention two (2) disadvantages of using UTP cables.
(2)
b) The PC technician proposes to his supervisor that they upgrade the Local Area
Network (LAN) by replacing UTP cables with Shielded Twisted Pair (STP) cables.
Mention three (3) advantages this change will have on the LAN.
(3)
SECTIONE:
[20]
Question 1: You are hired as a Network Administrator for a new Small Medium Enterprise
(SME) business. The ISP allocated an IP address of 172.100.32.10 /29 to the SME business.
Using the given IP address, answer the following questions and clearly show your calculations.
a) What is the Subnet Address
(2)
b) What is the Subnet Mask
(2)
c) How many network bits are borrowed from the host portion?
(2)
d) What is the number of possible subnets?
(2)
e) What is the number of usable IP addresses per subnet
(2)
f) Identify the Subnet IP address range the above-given IP address belongs to.
(2)
g) What is the Broadcast Address of the above subnet range in question (f).
(2)
h) Indicate the IP class and type of address of the above-given IP address.
(2)
i) As a network administrator, provide and explain four (4) benefits of subnetting a
network.
(4)
SECTIONF:
[10]
Answer the following questions:
Question 1: It was anticipated that by now, IPv4 addresses were expected to have depleted.
Identify and explain two (2) techniques that are utilized to preserve the availability ofIPv4
addresses to date.
(4)
Question 2: Identify and explain two (2) advantages the development of the OSI model
provides in computer networks.
(2)
Question 3: Define data integrity in network security.
(2)
---------------------T- HEEND----------------------
[100 MARKS]
7