CSA Final Examination 2020

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Computing and Information Systems

COMPUTER SYSTEMS ENGINEERING (B.SC. YEAR 3) &

APPLIED BUSINESS COMPUTING (B.SC. YEAR 3)

CSE302-Computer Systems Administration Year 3 Semester 1

FINAL EXAMINATION

Date: 2 December 2020 Time: 1400


-1800hrs
Total Marks: 100 Duration: 4 hours

Instructions to candidates

1. Candidates must attempt question 1 in Section A.


2. Candidates must attempt any three (3) questions in Section B.
3. Candidates attempting to gain unfair advantage or colluding in any way
whatsoever are liable to be disqualified.
4. Candidates are allowed to bring textbooks, lecture notes, online resources
into the examination environment
5. Download both Examination Question Paper and the Examination Answer
Booklet on to your computer
6. Write your answers in the answer booklet provided with this question
paper.
7. Append your signature and ID number at the bottom of your Examination
Answer Booklet as acknowledgement the submitted work as your own.
8. Submit your work in PDF, or Word format
9. Submit the Examination Answer Booklet ONLY as one document
on TurniItIn on the submission bin provided.
10. Should you encounter a challenge please email immediately at the emails
below; Module leader [email protected] or call 727108

Section A

Question 1 (Compulsory)n/
Kim has just been hired as ab2 new systems analyst for Expect Systems Inc. As part
of her first assignment, she has been tasked with installing a DHCP server for the
network.
[2 marks]
b) Describe problems that might be encountered in a large network with more
than 100 PCs without the use of DHCP
[2 marks]
a) Explain the role of DHCP server in a network
[2 marks]
d) Kim has to create a virtual machine on a computer running Server 2012 R2.
Describe the process of creating a Windows Server 2012 R2 virtual machine
using Hyper-V Manager.
[4 marks]
e) Kim wants to set up a help desk that is responsible for only resetting user
accounts passwords but must not be able to create new user accounts. What
does she need to do? 
[2 marks]

f) You have just added AD DS on your server, but you receive a warning that says,
“The server is not yet running as a domain controller,” Which 5 steps
would you use to promote a Windows 2012 R2 Server to become an Active
Directory Domain Services (AD DS) Domain controller?
[5 marks]

g) Assuming the Active Directory domain Services role has already been installed
and the domain controller has already been powered on, write down the steps
that the administrator needs to perform to achieve the following tasks:

(i) To create a new Organizational Unit (OU) called Marketing. [2


marks]

(ii) To create a new group called Sales under Marketing OU.


[2 marks]

(iii)Add an existing user called Kim to the Sales group.  [2


marks]

Page 2 of 7
[Total
marks 25]

Section B

Question 2

a) Explain in detail a DHCP process, clearly highlighting all the signals used to
achieve the issuance of IPv4 addresses.
[8 marks]
b) Give a brief description for each of the following IEEE 802.11 aspects:
a. Frequency Hopping Spread Spectrum (FHSS) s [2
marks]
b. Direct Sequence Spread Spectrum (DSSS)
[2 marks]
Exposed node problem
[3 marks]
c) Discuss the Wired Equivalent Privacy (WEP) Algorithm.  [4 marks]
d) c) Suggest any four (4) ways by which you can detect an attack or threat of
attack in your network.
[4 marks]
[Total
marks 25]

Question 3

a) Give a brief description for each of the following IEEE 802.11 aspects:
i) Frequency Hopping Spread Spectrum (FHSS) [2
marks]
ii) Direct Sequence Spread Spectrum (DSSS)
[2 marks]
iii) Exposed node problem
[2 marks]
b) Explain how the Wireless Application Protocol (WAP) provides support for
interconnections or internetworking between GSM cellular-based networks and

Page 3 of 7
the packet-based data networks such as the Internet.
[10 marks]

c) From your knowledge of the Gigabit Ethernet architecture, justify the need to
have the following sub-layers: Physical Medium Dependent (PMD), Physical
Medium Attachment (PMA) and Physical Coding Sub-layer (PCS). [6
marks]

d) What is the goal of Ethernet Fabric? [3


marks]

[Total marks 25]

Question 4

a) Kosto Inc. is a local startup that has been asked by the city to monitor and
record near misses and accidents between cars, bicyclists and pedestrians 24
hours per day, 7 days per week, 365 days per year. Kotso Inc. (KI) is planning to
deploy video cameras and dedicated computing at each busy intersection in the
city. KI plans to capture video at a sustained frame grab rate of 20 frames per
second, 24 hours per day. Since the bandwidth from the intersection to the
cloud is limited, KI plans to process the streams of data at the intersection to
identify near misses and accidents. They will then send the data for just the
“interesting” cases to the cloud for storage and potential further analysis.

i) We know that cloud computing offers various benefits and features to users.
For each benefit listed in the table below, indicate whether you believe it
would be important to KI and describe why. [6
marks]

Cloud advantage Beneficial Reason


(Yes/no)

Page 4 of 7
Elasticity

No upfront cost

Reduced IT
mantaiance

ii) KI has grown and gone international, soon to cover 75% of the world’s big
cities. Should they build their own private cloud? Explain your answer.

[2 marks]
b) Operating systems use privileged instructions to manage hardware resources like page tables and
I/O devices. When executed with a VM on a modern hypervisor providing full hardware
virtualization, what happens when a guest OS executes a privileged instruction of this sort? Explain
your answer.  [4 marks]
c) Ronald believes paravirtualization outperforms full hardware-level
virtualization. What is one advantage of full hardware virtualization over
paravirtualization? Explain your answer. [2
marks]
d) One of the changes made in the MAC sub-layer was to switch to the full duplex
mode, discuss the impact of the change on Gigabit Ethernet. [2
marks]

e) Describe how roaming is supported when a device moves from one Basic
Service Set to another in the IEEE802.11 (Wi-Fi) standard.
[6 marks]

f) Explain any three (3) advantages an organisation may derive through the
integration of the wired and wireless technology (networks).
[3 marks]
[Total 25 marks]

Question 5

1. You have joined a new organization as a systems administrator. You realize the
company has been operating without any security policy. You decide to educate

Page 5 of 7
the employees about the importance of this concept in order to implement it.
Explain any four (4) arguments you can raise in support of implementing a
security policy.

[4 marks]
2. You are required to adopt a Variable Length Subnet Masking (VLSM) design for a
network with the following 4 departments and their number of users given the
network address of 172.16.0.0/16:
3. • Net 1 with 120 hosts
4. • Net 2 with 62 hosts
5. • Net 3 with 14 hosts
6. • Net 4 with 2 hosts
7. NB: Begin by using the zero subnet for the largest LAN.
8. Use the above information to answer the questions below.
9. In what class is this IP address?  [1 marks]
10. -class B
11. If you were going to use a fixed length subnet mask, what subnet mask would
you use?  [2
marks]
12. What is the disadvantage of using fixed length subnet mask in this scenario

[2 marks]
13. Implement Variable Length Subnet Mask for this network and for each subnet
find
14. Subnet mask [4
marks]
15. Network id [4
marks]
16. Broadcast id [4
marks]
17. Range of usable IP addresses [4 marks]

Page 6 of 7
[Total

marks 25]

End of Examination Paper

Page 7 of 7

You might also like