Documente Academic
Documente Profesional
Documente Cultură
Master of Networking
MN603 Wireless Networks and Security
Sample Final Exam
Semester-3, 2009/2010
Date : 26/06/2010
Begin Reading Time: 9.20 am
Begin Writing Time : 9.30 am
Duration : Three (3) hours
Venue : MIT Melbourne
Lecturer : Biplob Rakshit Ray
Total Marks : 100 (40% for the Total Subject Grade)
___________________________________________________________
Full marks are only awarded for correct answers with detailed explanation and justification, and
they will not be awarded for incomplete/or incorrect answer. Answer all questions on this exam
paper according to given instruction. Use the exam booklets for your answers.
Student ID : _________________________
Page 1 of 6
MN603 Wireless Networks and Security, Semester 1, 2010
a) ICMP (Internet message control protocol) is a very handy protocol for network
professionals.
- What layer of the OSI model does ICMP belong to? Identify three uses of
the ICMP protocol for troubleshooting network problems. (7 marks)
b) Write Extended ACL that will accomplish the following (13 marks)
- Router A will deny all FTP communication (FTP packets) from sales
network to 172.16.10.2/24 workstation.
Page 2 of 6
MN603 Wireless Networks and Security, Semester 1, 2010
a) Info Atomic
b) Info Compound
c) Attack Atomic
3. Identify and define two QoS parameters. Identify and explain three
challenges for QoS services in wireless network. (10 marks)
1 page 41
Page 3 of 6
MN603 Wireless Networks and Security, Semester 1, 2010
5. Identify two security levels and security modes we have in our Bluetooth
technology (802.15.1). Explain the elements of Bluetooth security for
protection. (10 marks)
2 page 41
8. Identify two best firewall technologies and explain with example to support
you selection ‘why they are the best comparing with others?’. (10 marks)
10
9. Identify two physical layer features and one advantage of each feature in
WiMAX (80216). Explain one of them in details. (10 marks)
Lecture 6
Wireless network cards are becoming quite common at GEAP especially in notebook
computers. With this proliferation of wireless network cards, there are requests from the users
of these computers to access the corporate network using a wireless connection. In 2001 and
Page 4 of 6
MN603 Wireless Networks and Security, Semester 1, 2010
2002 an 802.11b system was implemented on a limited scale for the GEAP Pty Ltd Company.
This used Wireless Encryption Protocol (WEP) encryption as the sole security mechanism.
Demand for wireless service has steadily increased since then, and in July of 2010 a
consultant was asked to implement a wireless network for GEAP Pty. Ltd. on a larger scale.
The consultant explained to the management team at GEAP the many shortcomings of the
WEP encryption protocol, and they agreed that any upgrade of the wireless network should
include better security.
The 802.1x authentication is based on authentication methods that are already in use at GEAP
Pty Ltd by remote users. This is important to GEAP because any upgrades need to integrate to
the current network infrastructure. During the past year, the Wi-Fi Protected Access (WPA)
components of the upcoming 802.1i standard have been released. The consultant then chose
the Cisco ‘WAP4410N Wireless-N Access Point - PoE/Advanced Security’ Access Point for the
GEAP wireless upgrade.
The consultant also explained that aside from the Cisco access point, Windows 2003 server
edition and network interface card (NIC), no additional hardware and software was needed.
GEAP management wants this upgrade to be done with minimal configuration and with best
possible security.
Page 5 of 6
MN603 Wireless Networks and Security, Semester 1, 2010
You are working as a system analyst. Analyze the above case and answer the following
questions:
Page 6 of 6