Get premium membership and access revision papers, questions with answers as well as video lessons.

Bit2204:Network System Administration Question Paper

Bit2204:Network System Administration 

Course:Bachelor Of Information Technology

Institution: Meru University Of Science And Technology question papers

Exam Year:2013



QUESTION ONE – 30 MARKS
a. Consider the IP address: 127.0.0.1 is this address a usable host address? Explain. (2 Marks) b. Explain the following: (4 Marks) i. Data centre ii. Virtual server
c. What is the rationale behind use of RAID technology in server machines? (4 Marks) d. Outline four protocols and briefly explain their role in communication networks. (4 Marks)
e. Joe is unable to access the internet via a computer he is using in the lab. He comes to you as a network administrator for assistance: (6 Marks) i. Outline four possible causes for his problem ii. List any two solutions to the issues you raise in part (e) i.
f. Briefly explain three main considerations when connecting a workstation to a network. (3 Marks) g. Briefly discuss two challenges relating to server virtualization. (4 Marks) h. What is a file system? List any two file systems used in Linux operating system machines. (3 Marks)
QUESTION TWO – 20 MARKS
a. Bob has recently take up a role with a leading SACCO as a systems administrator. Discuss five typical roles that will be part of his duties. (5 Marks)
b. You have recently joined ICT staff team of a leading regional bank. Your task is considering deploying new server machines as part of the institution’s IT infrastructure upgrading: (15 Marks) i. List any five hardware specifications that are typical of server machines ii. Discuss five roles characteristic of servers in such an organization iii. What operating systems would you recommend and why?
2
QUESTION THREE – 20 MARKS
a. Discuss application of RAID technology in networking. (5 Marks) b. c. For many tasks on Linux, you need root or super user authority i. What tasks may require root authority and what is the precaution to observe in this mode? ii. List and demonstrate using an example two commands associated with root authority (7 Marks)
d. The bash shell is one of the several shells available for Linux. (8 Marks) i. What is a shell? What role does it play? ii. Using examples, distinguish between built-in and external commands iii. List two other shells used in Linux
QUESTION FOUR – 20 MARKS
a. In an age where use of computer based systems is prominent, a lot of attention has been directed towards IT security. i. What is IT security (2 Marks) ii. Discuss two ways used to mitigate/prevent security attacks? (2 Marks) iii. Describe how a botnet is created and how it can be used for a DDoS attack. (7 Marks)
b. Skype offers a service that allows you to make a phone call from PC to an ordinary phone. This means that the voice call must pass through both the internet and through a telephone network. Discuss how this might be done. (7 Marks)
QUESTION FIVE – 20 MARKS
You have recently been appointed as the Head of ICT at a rapidly expanding medium size bank. With plan underway to open new branches in neighbouring countries, management has made a proposal for the development of a new ICT security policy document.
a. Explain the aim and role of an ICT security policy. (5 Marks)
b. Write down a draft policy document for the bank including sections such as acceptable use policy, user account policy and remote access policy. (15 Marks)






More Question Papers


Popular Exams



Return to Question Papers