* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download COMP 2122 Assignment 2
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Wireless security wikipedia , lookup
Network tap wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Airborne Networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
BSc COMPUTING COMP 2122 Assignment 2 Multiple Choice Exam 1½ hours Answer ALL Questions. Please note that the last three carry double weighting 1. Which of the following protocols in the Unix TCP/IP protocol suite functions at the network layer according to the OSI model? A B C D 2. Which of the following is NOT a characteristic of network data transfer using packet switching: A B C D 3. each packet has a limited “time to live” packet headers contain IP addresses of source and destination nodes the route for all packets is calculated before any data is sent packets sent through the Internet are also known as datagrams Which of the following is true about data sent round a local area network using IEEE 802.3 compliant hardware: A B C D 4. SMTP IP TCP UDP It could be wireless data It cannot be sent full duplex The network cards have fixed IP addresses Contention on the network is dealt with using CSMA/CD Which is NOT true about ADSL A B C D It can use existing copper telephone wires It is available everywhere within the UK It provides sufficient bandwidth to be able to handle the downloading and display of interactive multimedia data It provides unequal amounts of bandwidth for uploading and downloading Page 1 of 17 5. HomePlug is an alternative to both sending data through Ethernet cables or a wireless network (WiFi). Which of the following is NOT true about HomePlug: A B C D 6. Which is NOT a regularly used IEEE network standard: A B C D 7. it makes use of interrupts to control access to the CPU it depends on co-operation between processes on CPU cycles it can support many processes at the same time it manages CPU time by means of adjustable time slicing between processes Which of the following is NOT true about Active Directory A. B. C. D. 9. IEEE 802.11a IEEE 802.11b IEEE 802.11f IEEE 802.11g Why is pre-emptive multitasking considered to be an important feature of a network operating system servicing many users: A B C D 8. Bandwidth is greater than WiFi It can easily be used in homes It does not cause radio interference It works with RJ45 Ethernet connections it does not follow an International Standard for data storage it can only be used within a single site it can reside on network client machines it can be used to provide secure authentication Which of the following is TRUE about the Windows boot.ini file? A: B: C: D: The boot.ini file indicates where the computer is to find its operating system during the boot-up process The boot.ini file stores information about the partitions existing on the hard drive Every logical drive needs a boot.ini file The boot.ini file has been replaced by BOOTMGR in Vista & Windows 7 Page 2 of 17 10. What is NOT a characteristic of connection-oriented communication? A. B. C. D. 11. You manage a domain with three groups: MANAGERS, TECHNICAL, ADMIN, and staff are allocated to them accordingly. A particular folder /SMTMEETINGS on the main domain controller is configured so that MANAGERS have full access through a SHARE, but ADMIN personnel can only use that SHARE for read access. One of the managers cannot get into work, but one of her files (in a subfolder of SMTMEETINGS) needs to be urgently updated. Which is the safest way to allow access to her secretary (who is a member of the ADMIN group), so that the relevant file can be updated: A B C D 12. Give full access to the share to the ADMIN group Give change control access to the share for the TECHNICAL group Give change control access to the share for just the administrator who will make the changes Give the ADMIN group write access to the folder itself A network device functions at or above the Transport layer of the OSI model. It acts as a translator between 2 computers that use different protocols or data formats. Is it: A. B. C. D. 13. It provides fast but unreliable delivery of datagrams. It provides assurance of packet delivery. It uses store-and-forward techniques to move datagrams between computers. It uses message-oriented communication for processing e-mail. a gateway a bridge a router a repeater Which of the following Operating Systems is NOT multiplatform? A. B. C. D. Unix Linux Windows 2000 VMS Page 3 of 17 14. Which computer languages are modern network operating systems written in: A. B. C. D. 15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: B: C: D: 16. A straight-though cable because the data has to go straight through from one computer to the other without an intermediate hub or router A straight-through cable so that the receiving computer knows on which lines to expect data A crossover cable so that data sent by one computer on its output lines is placed on the input lines of the other computer A crossover cable so that data can cross over directly from one computer to the other The purpose of the Windows Registry is to control: A: B: C: D: 17. Visual BASIC C Java COBOL system hardware the boot-up process the user desktop user rights You are designing a 1000-Mbps Ethernet network for a building that has existing UTP cable. You test the existing cable and decide that it meets Category 3 specifications. Which of the media listed below should you use? A. B. C. D. the existing cable new Type 1 STP cable new Category 5 UTP cable new Category 6 UTP cable Page 4 of 17 18. You want to run Linux and Windows on the same computer. Which of the following is not a workable solution: A B C D 19. Copy each operating system to a different folder on the same partition on the boot disk Use a floppy disk as the Linux boot disk, and install Windows and Linux on different partitions Use a USB disk as the Linux boot disk, and install Windows and Linux on different partitions Install Linux on an existing Windows machine using a “non-lethal” partition program to create the new partition During the installation of Windows 2000 server via a bootable CD-ROM drive, you receive a media error. You shut down the computer and restart the installation, but receive the same error. Four suggestions are given below for troubleshooting this problem 1. 2. 3. 4. Replace the CD-ROM in the drive Shut down the computer and restart the installation Contact the manufacturer to obtain another copy of the server CD Create more free hard disk space on the hard drive by deleting unnecessary files The best solution would involve: A 1 only B 1 and 4 C 1 and 3 D 1, 2, and 4 20. Which of the following statements about IP addresses is false: A. B. C. D. A computer must have an IP address to communicate with others via TCP/IP There is no need to worry about the IP address because it is allocated automatically The local IP address can be found easily using IPCONFIG All domain names registered with the Internet authorities has a fixed IP address that can be easily looked up Page 5 of 17 21. Two computers on a peer-to-peer network need to have: A: B: C: D: 22. You want to segment your 200-node network into 3 subnets. The network uses TCP/IP. Which device should you use? A. B. C. D. 23. Allocating nodes to trees within a forest Allocating IP addresses to nodes within a domain Allocating nodes to domains within a tree Moving nodes from one domain to another You wish to connect two computers directly together for data transfer purposes. Each of the computers has a network card and several USB ports. Which of the following options would not work: A B C D 25. repeater bridge router gateway DHCP is used for A: B: C: D: 24. The same subnet mask Different IP addresses in the same subnet The same subnet mask and different IP addresses in the same subnet Different subnet masks but the same IP address A crossover Ethernet cable Two crossover Ethernet cables and a passive hub Two straight-through Ethernet cables and a passive hub A single USB cable with two male connectors Your l00BaseT Ethernet network uses TCP/IP. Users of your client computers need to access an IBM 3090 mainframe computer by using a 3270 terminal-emulation program. Which device must you install? A. B. C. D. bridge gateway router brouter Page 6 of 17 26. You want to connect 2 computers by using l00BaseT Ethernet cable. The computers are located more than 300 meters apart. Which device should you use? A. B. C. D. 27. When you have administrative access to a network, why is it a good idea to create a user with limited access and use that identity as much as possible? A: B: C: D: 28. repeater amplifier multiplexer gateway The limited user needs less processor time than the administrator The limited user needs less memory than the administrator Because of the reduced privileges, the limited user can accomplish tasks more quickly than the administrator If you make a mistake as a limited user, it is less likely to be disastrous than a mistake made as an administrator The hard disk on your Windows 2000 Server computer is configured with an NTFS volume (C:) that contains the ACCOUNTING folder. This folder contains three subfolders: MANAGERS, ACCOUNTANTS, and ADMINASSTS. The folder is shared and the Everyone group has been granted Read shared folder permission. In addition, the Everyone group has been granted the Full Control NTFS permission to the C: drive and its contents. What content can network users who are members of the Everyone group view? A B C D All content of the ACCOUNTING folder, including the subfolder names and content Content in the ACCOUNTING folder and names of the subfolders, but not content in the subfolders The names of the subfolders and their content, but not content in the ACCOUNTING folder The names of the subfolders, but not content in the ACCOUNTING folder or in the subfolders Page 7 of 17 29. Which of the following most accurately describes the relationship between Active Directory domains, forests, trees and users? A: B: C: D: 30. In the list below, which IS a characteristic of a client/server networks? A. B. C. D. 31. Any computer can make its resources available to any other computer on the network. Dumb terminals are connected to a central host computer that performs all processing. Any computer on the network can be both a client and a server. Client computers access a server that performs back-end services. You successfully upgrade a Windows 2000 Server computer on your network to a Domain Controller. What is most likely to be true about the resulting machine: A B C D 32. Users are attached to trees which exist within forests that exist within domains Users are members of domains that link together to form trees that exist within forests Domains include trees, forests and users Trees and forests are types of domain, and a user can log onto a tree, a forest or a simple domain It is now running a service that will allocate IP addresses to client computers It will automatically become controller of the local network Forest It has an “active directory” that can store data on all users and any computer that is part of the local network It has an “active directory” of local computer names but users are managed in a different way You install a plug-and-play Ethernet network adapter in a client computer. The computer's network software is initialized successfully, but the computer is not able to communicate with other computers on the network. All other client computers on the network are able to communicate. What is the most likely cause of the problem? A. B. C. D the computer doesn’t have an IP address the IO port address on the network adapter is incorrect. the cable segment is not properly terminated the packet-size setting is incorrect. Page 8 of 17 33. The servers on your network run Microsoft Windows 2000 Server. The client computers run Microsoft Windows XP. You want to monitor network activity and evaluate network communications at the packet level. Which tool should you use? A. B. C. D. 34. In DHCP, the scope is A: B: C: D: 35. Network Monitor Protocol analyzer Oscilloscope Volt-ohmmeter A software tool for examining the relationships between nodes in the domain The range of IP addresses that can be allocated within a domain A software tool for examining the properties of a node within a domain The Software Control and Operation of Programs Executive Your network has 35 client computers and 1 server. The server runs Microsoft Windows 2000 Server. Network performance is steadily decreasing as new client computers are added to the network. You run Performance Monitor on the server and obtain the following statistics: Counter Average % Processor Time: 8 Page Faults/sec: 2 % Disk Time: 25 What should you do to improve network performance? A. Replace the server with a multiprocessor computer. B. Install additional RAM in the server. C. Install disk striping with parity on the server D. Segment the network by adding another network adapter to the server. Page 9 of 17 36. Which of the statements below is a characteristic of a peer-peer network? A. B. C. D. Any computer can make its resources available to any other computer on the network. Dumb terminals are connected to a central host computer that performs all processing. Network services are provided by servers and requested by clients Client computers access a server that performs back-end services 37. You are setting up a new domain structure. There will be four main domain controllers in four different locations. An appropriate set of DNS names would be: A charlie.exy.net, foxtrot.exy.net, exy.net, delta.exy.net B charlie.exy.net, foxtrot.exy.net, tango.net, delta.exy.net C charlie.exy.net, foxtrot.exy.net, delta.net, delta.exy.net D charlie.exy.net, foxtrot.exy.net, foxtrot.net, delta.exy.net 38. A client is setting up a new network. She wishes to use a network operating system that makes use of a network directory of existing resource names, accessible to all authorised users. Which of the following operating systems would NOT support such a facility: A B C D 39. Windows NT v4 Windows 2000 Linux Novell Netware v4 You are running a Windows 2000 network. You have administrative rights to the domain, and are setting up users on one of the domain controllers. Which of the following tasks will you not be able to do: A B C D Set up a new group of domain users called SPECIAL Set up a new user that belongs to SPECIAL Add an existing user to the SPECIAL group Set up a local group called SPECIAL on one of the client machines Page 10 of 17 40. You have been asked to set up a PC to be “dual boot”, so it can become part of a Windows 2000 network or a Linux network, which both run on the same cabling and hardware infrastructure. Which of the following must you NOT do: A B C D 41. When a user logs on normally to a Windows 2000 or Unix network, which of the following must happen before the user gets their desktop/command prompt: A B C D 42. The server must encrypt any data sent from the keyboard User data sent from the keyboard must be matched with data in a user database held on a logon server They must change their password They need to select the domain name of the server A user normally on a peer-peer network wants to log on to a Windows 2000 domain controller. This user has a username/password in the domain, but the user gets an error message when they try to use it. Assuming that they have not forgotten their username/password, which of the following is NOT a likely possible explanation? A. B. C. D. 43. Use Windows 2000 Disk Administrator to set up two partitions Install Linux onto an existing Windows 2000 partition Use a version of Linux that has been downloaded from the Internet Set up a boot floppy to start up the Linux partition They haven’t selected the domain name in the given dialogue box Their password has expired Their domain login has been set up on the local machine The domain controller cannot recognise the local computer When a Windows XP computer boots up, which is the correct order of accessing software: A B C D BIOS, bootloader, CMOS, drivers, winlogon CMOS bootloader, BIOS, winlogon, services BIOS, CMOS, bootloader, services, winlogon bootloader, BIOS, CMOS, drivers, winlogon Page 11 of 17 44. A user wants to connect to your local Windows 2000 network through a broadband wireless WAN. Their hardware and OSI level 1 and 2 software used must comply to: A B C D 45. Why don’t signals in adjacent cells for cellphone networks interfere with each other? A: B: C: D: 46. the base stations are so far apart that a handset can only communicate with at most one base station at a time Adjacent cells use different radio frequencies The user has to point the handset at the base station, so there is no problem with a base station in another direction The handset uses electronic filters to block out unwanted signals Which of the following is an advantage of wireless computer networks over hard-wired computer networks? A: B: C: D: 47. IEEE 802.3 specification IEEE 802.5 specification IEEE 802.11 specification IEEE 802.16 specification Faster data rates are possible with wireless networks Wireless networks are less expensive to set up Wireless networks are more secure Wireless networks are less susceptible to interference Here are three statements about wireless networks. 1. ‘Ad hoc’ wireless networks were invented by the Romans. 2. Infrastructure wireless networks need base stations. 3. Wireless networks use electromagnetic radiation to send messages. Which of these statements is/are correct? A: 1 only B: 1 and 2 C: 2 and 3 D: 1, 2 and 3 Page 12 of 17 48. You install a new audio adapter and its unsigned driver in your Windows 2000 Server computer. When you restart the computer, the system hangs and you cannot log in to Windows 2000. You decide to use one of the advanced startup options to open Windows 2000 Server and remove the device driver. Which advanced setup option should you use? A B C D 49. Safe Mode Debugging Mode Enable VGA Mode Last Known Good Configuration The Maximum Acceptable Path Loss (MAPL) for IEEE 802.11b is currently 100 dB, and the actual path loss is given by: PL = PL(1) + 30 log(d) Where PL = the path loss in dB PL(1) is the path loss at a distance of 1 m from the transmitter = 40 dB at 2.5 GHz (IEEE 802.11b and g frequency) log(d) is the logarithm to base 10 of the distance between the transmitter and receiver (in metres). The range is the value of d when the path loss has risen to the MAPL, so 100 dB = 40 dB + 30 log(range) 60 = 30 log(range) 2 = log(range) range = 102 = 100 m In the future, due to advances in receiver technology, it may become possible to introduce a new wireless network specification, IEEE 802.11b(2), such that the MAPL is 130 dB. What would be the range of this new type of network? A: B: C: D: 130 m 200 m 500 m 1000 m Page 13 of 17 50. What is a ‘hotspot’? A: B: C: D: 51. Why is it difficult to detect collisions in a wireless network? A: B: C: D: 52. The place between two wireless network base stations where their combined signal strength is a maximum The safety region around a wireless network base station where the signal is so strong that prolonged exposure can cause cancer The area on the plastic case of a wireless network component that heats up as the radio signals pass through it The region around a wireless network base station within which it can send and receive signals The signals from two messages can pass through each other because they don’t have to travel along the same wire A transmitter may not know about a collision that occurs at a receiver Signal strength decreases with increasing distance from the transmitter, so a strong signal may not be much affected by a collision with a weak signal Radio waves travel faster than signals in a wire, so collisions last for much shorter times Here is some information about some of the IEEE 802.11 specifications. Specification IEEE 802.11a IEEE 802.11b IEEE 802.11g Maximum data rate 54 Mb/s 11 Mb/s 54 Mb/s Frequency band 5.5 GHz 2.4 GHz 2.4 GHz Here are some statements relating to this data. 1. IEEE 802.11b and IEEE 802.11g use the same frequency band 2. IEEE 802.11a has a faster maximum data rate than IEEE 802.11b. 3. Because IEEE 802.11a operates in a higher frequency band, it can send messages faster than IEEE 802.11g. Which of these statements is/are true? A: B: C: D: 1 only 1 and 2 2 and 3 1, 2 and 3 Page 14 of 17 53. How do wireless networks deal with the problem of collisions? A: B: C: D: 54. D 55. ALOHA CSMA/CA CSMA/CD Ignore them and try again The Windows Registry gets overwritten during all of the operations listed below, except one. Choose the operation that leaves the registry intact A Logging on locally B Writing and saving a MS-Word document C Logging on to a domain Installing a new version of MS-Office You are setting up a TCP/IP network. The network will be configured as a Windows 2000 mixed-mode network that will contain four subnets. Each subnet will correspond to a node in the domain workspace and will include Windows 2000 Server computers, Windows 2000 Professional computers and some legacy Windows 98 computers. You want to achieve the following results: 1. The client computers must be assigned IP addressing information automatically 2. The network must be able to automatically resolve the NetBIOS names of the Windows 98 computers to their IP addresses 3. The network must be able to automatically resolve the host names of the Windows 98 computers to their IP addresses You configure a DHCP server on each subnet, and then you configure the Windows 2000 Professional and Windows 98 computers as DHCP clients. Which result have you achieved: A B C D 1, 2, 3 1, 2 only 1, 3 only None of the above options Page 15 of 17 56. You are designing a cabled WAN that will connect 3 existing networks in Bristol, Birmingham, and London Required results: All of the computers on each of the 3 networks must be able to communicate with any other computer on the 3 networks. The WAN links must be capable of transmitting data at a minimum speed of 1 Gbps. Optional desired results: You want to provide continued communications in the event of a single-link failure. You want to provide continued communications at a minimum speed of 1 Gbps in the event of a single-link failure. Proposed solution: Connect the 3 networks by using three 2 Gbps links, as shown below: Birmingham London Bristol Which outcome does the proposed solution bring about? A. B. C. D. the required results and produces both of the optional desired results. the required results and produces only 1 of the optional desired results. the required results but does not produce any of the optional desired results. does not produce the required results. Page 16 of 17 57. Situation: You have inherited a rather old network, for an organisation that is experiencing considerable growth. Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. Yet the network still continues to grow and it is estimated that you will need to add a further 24 client computers and an additional server within 3 months. The objective will be to considerably reduce network utilization before any further nodes are added. The following table summarizes your current network configuration. Servers Client Computers Network Type Protocol Cable Routers Bridges 3 120 evenly distributed among the 3 servers 10BaseT Ethernet TCP/IP Category 3 UTP None None Required result: You must reduce network utilization by 50 percent. Optional desired results: You want to allow for continued network growth. You want to maintain the new network utilization levels even after the planned additions to the network are implemented. You want to minimize costs for the project. Proposed solution: Replace all 10BaseT hubs with equivalent 100BaseT hubs. Replace all existing Category 3 UTP cable with Category 5 UTP cable. Replace all 10BaseT network adapters with 100BaseT network adapters. Which results do the proposed solution produce? A. B. C. D. the required result and all of the optional desired results. the required result and only 2 of the optional desired results. the required result but none of the optional desired results. The proposed solution does not produce the required result. Page 17 of 17