CSA Final Examination 2020
CSA Final Examination 2020
CSA Final Examination 2020
FINAL EXAMINATION
Instructions to candidates
Section A
Question 1 (Compulsory)n/
Kim has just been hired as ab2 new systems analyst for Expect Systems Inc. As part
of her first assignment, she has been tasked with installing a DHCP server for the
network.
[2 marks]
b) Describe problems that might be encountered in a large network with more
than 100 PCs without the use of DHCP
[2 marks]
a) Explain the role of DHCP server in a network
[2 marks]
d) Kim has to create a virtual machine on a computer running Server 2012 R2.
Describe the process of creating a Windows Server 2012 R2 virtual machine
using Hyper-V Manager.
[4 marks]
e) Kim wants to set up a help desk that is responsible for only resetting user
accounts passwords but must not be able to create new user accounts. What
does she need to do? 
[2 marks]
f) You have just added AD DS on your server, but you receive a warning that says,
“The server is not yet running as a domain controller,” Which 5 steps
would you use to promote a Windows 2012 R2 Server to become an Active
Directory Domain Services (AD DS) Domain controller?
[5 marks]
g) Assuming the Active Directory domain Services role has already been installed
and the domain controller has already been powered on, write down the steps
that the administrator needs to perform to achieve the following tasks:
Page 2 of 7
[Total
marks 25]
Section B
Question 2
a) Explain in detail a DHCP process, clearly highlighting all the signals used to
achieve the issuance of IPv4 addresses.
[8 marks]
b) Give a brief description for each of the following IEEE 802.11 aspects:
a. Frequency Hopping Spread Spectrum (FHSS) s [2
marks]
b. Direct Sequence Spread Spectrum (DSSS)
[2 marks]
Exposed node problem
[3 marks]
c) Discuss the Wired Equivalent Privacy (WEP) Algorithm.  [4 marks]
d) c) Suggest any four (4) ways by which you can detect an attack or threat of
attack in your network.
[4 marks]
[Total
marks 25]
Question 3
a) Give a brief description for each of the following IEEE 802.11 aspects:
i) Frequency Hopping Spread Spectrum (FHSS) [2
marks]
ii) Direct Sequence Spread Spectrum (DSSS)
[2 marks]
iii) Exposed node problem
[2 marks]
b) Explain how the Wireless Application Protocol (WAP) provides support for
interconnections or internetworking between GSM cellular-based networks and
Page 3 of 7
the packet-based data networks such as the Internet.
[10 marks]
c) From your knowledge of the Gigabit Ethernet architecture, justify the need to
have the following sub-layers: Physical Medium Dependent (PMD), Physical
Medium Attachment (PMA) and Physical Coding Sub-layer (PCS). [6
marks]
Question 4
a) Kosto Inc. is a local startup that has been asked by the city to monitor and
record near misses and accidents between cars, bicyclists and pedestrians 24
hours per day, 7 days per week, 365 days per year. Kotso Inc. (KI) is planning to
deploy video cameras and dedicated computing at each busy intersection in the
city. KI plans to capture video at a sustained frame grab rate of 20 frames per
second, 24 hours per day. Since the bandwidth from the intersection to the
cloud is limited, KI plans to process the streams of data at the intersection to
identify near misses and accidents. They will then send the data for just the
“interesting” cases to the cloud for storage and potential further analysis.
i) We know that cloud computing offers various benefits and features to users.
For each benefit listed in the table below, indicate whether you believe it
would be important to KI and describe why. [6
marks]
Page 4 of 7
Elasticity
No upfront cost
Reduced IT
mantaiance
ii) KI has grown and gone international, soon to cover 75% of the world’s big
cities. Should they build their own private cloud? Explain your answer.
[2 marks]
b) Operating systems use privileged instructions to manage hardware resources like page tables and
I/O devices. When executed with a VM on a modern hypervisor providing full hardware
virtualization, what happens when a guest OS executes a privileged instruction of this sort? Explain
your answer.  [4 marks]
c) Ronald believes paravirtualization outperforms full hardware-level
virtualization. What is one advantage of full hardware virtualization over
paravirtualization? Explain your answer. [2
marks]
d) One of the changes made in the MAC sub-layer was to switch to the full duplex
mode, discuss the impact of the change on Gigabit Ethernet. [2
marks]
e) Describe how roaming is supported when a device moves from one Basic
Service Set to another in the IEEE802.11 (Wi-Fi) standard.
[6 marks]
f) Explain any three (3) advantages an organisation may derive through the
integration of the wired and wireless technology (networks).
[3 marks]
[Total 25 marks]
Question 5
1. You have joined a new organization as a systems administrator. You realize the
company has been operating without any security policy. You decide to educate
Page 5 of 7
the employees about the importance of this concept in order to implement it.
Explain any four (4) arguments you can raise in support of implementing a
security policy.
[4 marks]
2. You are required to adopt a Variable Length Subnet Masking (VLSM) design for a
network with the following 4 departments and their number of users given the
network address of 172.16.0.0/16:
3. • Net 1 with 120 hosts
4. • Net 2 with 62 hosts
5. • Net 3 with 14 hosts
6. • Net 4 with 2 hosts
7. NB: Begin by using the zero subnet for the largest LAN.
8. Use the above information to answer the questions below.
9. In what class is this IP address?  [1 marks]
10. -class B
11. If you were going to use a fixed length subnet mask, what subnet mask would
you use?  [2
marks]
12. What is the disadvantage of using fixed length subnet mask in this scenario
[2 marks]
13. Implement Variable Length Subnet Mask for this network and for each subnet
find
14. Subnet mask [4
marks]
15. Network id [4
marks]
16. Broadcast id [4
marks]
17. Range of usable IP addresses [4 marks]
Page 6 of 7
[Total
marks 25]
Page 7 of 7