Download COMP 2122 Assignment 2

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net bias wikipedia , lookup

Lag wikipedia , lookup

IEEE 1355 wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer network wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Airborne Networking wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
BSc COMPUTING
COMP 2122 Assignment 2
Multiple Choice Exam
1½ hours
Answer ALL Questions.
Please note that the last three carry double weighting
1.
Which of the following protocols in the Unix TCP/IP protocol suite
functions at the network layer according to the OSI model?
A
B
C
D
2.
Which of the following is NOT a characteristic of network data transfer
using packet switching:
A
B
C
D
3.
each packet has a limited “time to live”
packet headers contain IP addresses of source and destination
nodes
the route for all packets is calculated before any data is sent
packets sent through the Internet are also known as datagrams
Which of the following is true about data sent round a local area network
using IEEE 802.3 compliant hardware:
A
B
C
D
4.
SMTP
IP
TCP
UDP
It could be wireless data
It cannot be sent full duplex
The network cards have fixed IP addresses
Contention on the network is dealt with using CSMA/CD
Which is NOT true about ADSL
A
B
C
D
It can use existing copper telephone wires
It is available everywhere within the UK
It provides sufficient bandwidth to be able to handle the
downloading and display of interactive multimedia data
It provides unequal amounts of bandwidth for uploading and
downloading
Page 1 of 17
5.
HomePlug is an alternative to both sending data through Ethernet cables
or a wireless network (WiFi). Which of the following is NOT true about
HomePlug:
A
B
C
D
6.
Which is NOT a regularly used IEEE network standard:
A
B
C
D
7.
it makes use of interrupts to control access to the CPU
it depends on co-operation between processes on CPU cycles
it can support many processes at the same time
it manages CPU time by means of adjustable time slicing between
processes
Which of the following is NOT true about Active Directory
A.
B.
C.
D.
9.
IEEE 802.11a
IEEE 802.11b
IEEE 802.11f
IEEE 802.11g
Why is pre-emptive multitasking considered to be an important feature of a
network operating system servicing many users:
A
B
C
D
8.
Bandwidth is greater than WiFi
It can easily be used in homes
It does not cause radio interference
It works with RJ45 Ethernet connections
it does not follow an International Standard for data storage
it can only be used within a single site
it can reside on network client machines
it can be used to provide secure authentication
Which of the following is TRUE about the Windows boot.ini file?
A:
B:
C:
D:
The boot.ini file indicates where the computer is to find its operating
system during the boot-up process
The boot.ini file stores information about the partitions existing on
the hard drive
Every logical drive needs a boot.ini file
The boot.ini file has been replaced by BOOTMGR in Vista &
Windows 7
Page 2 of 17
10.
What is NOT a characteristic of connection-oriented communication?
A.
B.
C.
D.
11.
You manage a domain with three groups: MANAGERS, TECHNICAL,
ADMIN, and staff are allocated to them accordingly. A particular folder
/SMTMEETINGS on the main domain controller is configured so that
MANAGERS have full access through a SHARE, but ADMIN personnel
can only use that SHARE for read access. One of the managers cannot
get into work, but one of her files (in a subfolder of SMTMEETINGS)
needs to be urgently updated. Which is the safest way to allow access to
her secretary (who is a member of the ADMIN group), so that the relevant
file can be updated:
A
B
C
D
12.
Give full access to the share to the ADMIN group
Give change control access to the share for the TECHNICAL group
Give change control access to the share for just the administrator
who will make the changes
Give the ADMIN group write access to the folder itself
A network device functions at or above the Transport layer of the OSI
model. It acts as a translator between 2 computers that use different
protocols or data formats. Is it:
A.
B.
C.
D.
13.
It provides fast but unreliable delivery of datagrams.
It provides assurance of packet delivery.
It uses store-and-forward techniques to move datagrams between
computers.
It uses message-oriented communication for processing e-mail.
a gateway
a bridge
a router
a repeater
Which of the following Operating Systems is NOT multiplatform?
A.
B.
C.
D.
Unix
Linux
Windows 2000
VMS
Page 3 of 17
14.
Which computer languages are modern network operating systems written
in:
A.
B.
C.
D.
15.
When connecting two computers together directly with a cat 5 UTP patch
lead, we need:
A:
B:
C:
D:
16.
A straight-though cable because the data has to go straight through
from one computer to the other without an intermediate hub or
router
A straight-through cable so that the receiving computer knows on
which lines to expect data
A crossover cable so that data sent by one computer on its output
lines is placed on the input lines of the other computer
A crossover cable so that data can cross over directly from one
computer to the other
The purpose of the Windows Registry is to control:
A:
B:
C:
D:
17.
Visual BASIC
C
Java
COBOL
system hardware
the boot-up process
the user desktop
user rights
You are designing a 1000-Mbps Ethernet network for a building that has
existing UTP cable. You test the existing cable and decide that it meets
Category 3 specifications. Which of the media listed below should you
use?
A.
B.
C.
D.
the existing cable
new Type 1 STP cable
new Category 5 UTP cable
new Category 6 UTP cable
Page 4 of 17
18.
You want to run Linux and Windows on the same computer. Which of the
following is not a workable solution:
A
B
C
D
19.
Copy each operating system to a different folder on the same
partition on the boot disk
Use a floppy disk as the Linux boot disk, and install Windows and
Linux on different partitions
Use a USB disk as the Linux boot disk, and install Windows and
Linux on different partitions
Install Linux on an existing Windows machine using a “non-lethal”
partition program to create the new partition
During the installation of Windows 2000 server via a bootable CD-ROM
drive, you receive a media error. You shut down the computer and restart
the installation, but receive the same error.
Four suggestions are given below for troubleshooting this problem
1.
2.
3.
4.
Replace the CD-ROM in the drive
Shut down the computer and restart the installation
Contact the manufacturer to obtain another copy of the server CD
Create more free hard disk space on the hard drive by deleting
unnecessary files
The best solution would involve:
A
1 only
B
1 and 4
C
1 and 3
D
1, 2, and 4
20.
Which of the following statements about IP addresses is false:
A.
B.
C.
D.
A computer must have an IP address to communicate with others
via TCP/IP
There is no need to worry about the IP address because it is
allocated automatically
The local IP address can be found easily using IPCONFIG
All domain names registered with the Internet authorities has a
fixed IP address that can be easily looked up
Page 5 of 17
21.
Two computers on a peer-to-peer network need to have:
A:
B:
C:
D:
22.
You want to segment your 200-node network into 3 subnets. The network
uses TCP/IP. Which device should you use?
A.
B.
C.
D.
23.
Allocating nodes to trees within a forest
Allocating IP addresses to nodes within a domain
Allocating nodes to domains within a tree
Moving nodes from one domain to another
You wish to connect two computers directly together for data transfer
purposes. Each of the computers has a network card and several USB
ports. Which of the following options would not work:
A
B
C
D
25.
repeater
bridge
router
gateway
DHCP is used for
A:
B:
C:
D:
24.
The same subnet mask
Different IP addresses in the same subnet
The same subnet mask and different IP addresses in the same
subnet
Different subnet masks but the same IP address
A crossover Ethernet cable
Two crossover Ethernet cables and a passive hub
Two straight-through Ethernet cables and a passive hub
A single USB cable with two male connectors
Your l00BaseT Ethernet network uses TCP/IP. Users of your client
computers need to access an IBM 3090 mainframe computer by using a
3270 terminal-emulation program. Which device must you install?
A.
B.
C.
D.
bridge
gateway
router
brouter
Page 6 of 17
26.
You want to connect 2 computers by using l00BaseT Ethernet cable. The
computers are located more than 300 meters apart. Which device should
you use?
A.
B.
C.
D.
27.
When you have administrative access to a network, why is it a good idea
to create a user with limited access and use that identity as much as
possible?
A:
B:
C:
D:
28.
repeater
amplifier
multiplexer
gateway
The limited user needs less processor time than the administrator
The limited user needs less memory than the administrator
Because of the reduced privileges, the limited user can accomplish
tasks more quickly than the administrator
If you make a mistake as a limited user, it is less likely to be
disastrous than a mistake made as an administrator
The hard disk on your Windows 2000 Server computer is configured with
an NTFS volume (C:) that contains the ACCOUNTING folder. This folder
contains three subfolders: MANAGERS, ACCOUNTANTS, and
ADMINASSTS. The folder is shared and the Everyone group has been
granted Read shared folder permission. In addition, the Everyone group
has been granted the Full Control NTFS permission to the C: drive and its
contents. What content can network users who are members of the
Everyone group view?
A
B
C
D
All content of the ACCOUNTING folder, including the subfolder
names and content
Content in the ACCOUNTING folder and names of the subfolders,
but not content in the subfolders
The names of the subfolders and their content, but not content in
the ACCOUNTING folder
The names of the subfolders, but not content in the ACCOUNTING
folder or in the subfolders
Page 7 of 17
29.
Which of the following most accurately describes the relationship between
Active Directory domains, forests, trees and users?
A:
B:
C:
D:
30.
In the list below, which IS a characteristic of a client/server networks?
A.
B.
C.
D.
31.
Any computer can make its resources available to any other
computer on the network.
Dumb terminals are connected to a central host computer that
performs all processing.
Any computer on the network can be both a client and a server.
Client computers access a server that performs back-end services.
You successfully upgrade a Windows 2000 Server computer on your
network to a Domain Controller. What is most likely to be true about the
resulting machine:
A
B
C
D
32.
Users are attached to trees which exist within forests that exist
within domains
Users are members of domains that link together to form trees that
exist within forests
Domains include trees, forests and users
Trees and forests are types of domain, and a user can log onto a
tree, a forest or a simple domain
It is now running a service that will allocate IP addresses to client
computers
It will automatically become controller of the local network Forest
It has an “active directory” that can store data on all users and any
computer that is part of the local network
It has an “active directory” of local computer names but users are
managed in a different way
You install a plug-and-play Ethernet network adapter in a client computer.
The computer's network software is initialized successfully, but the
computer is not able to communicate with other computers on the
network. All other client computers on the network are able to
communicate. What is the most likely cause of the problem?
A.
B.
C.
D
the computer doesn’t have an IP address
the IO port address on the network adapter is incorrect.
the cable segment is not properly terminated
the packet-size setting is incorrect.
Page 8 of 17
33.
The servers on your network run Microsoft Windows 2000 Server. The
client computers run Microsoft Windows XP. You want to monitor network
activity and evaluate network communications at the packet level. Which
tool should you use?
A.
B.
C.
D.
34.
In DHCP, the scope is
A:
B:
C:
D:
35.
Network Monitor
Protocol analyzer
Oscilloscope
Volt-ohmmeter
A software tool for examining the relationships between nodes in
the domain
The range of IP addresses that can be allocated within a domain
A software tool for examining the properties of a node within a
domain
The Software Control and Operation of Programs Executive
Your network has 35 client computers and 1 server. The server runs
Microsoft Windows 2000 Server. Network performance is steadily
decreasing as new client computers are added to the network. You run
Performance Monitor on the server and obtain the following statistics:
Counter Average
% Processor Time: 8
Page Faults/sec: 2
% Disk Time: 25
What should you do to improve network performance?
A.
Replace the server with a multiprocessor computer.
B.
Install additional RAM in the server.
C.
Install disk striping with parity on the server
D.
Segment the network by adding another network adapter to the
server.
Page 9 of 17
36.
Which of the statements below is a characteristic of a peer-peer network?
A.
B.
C.
D.
Any computer can make its resources available to any other
computer on the network.
Dumb terminals are connected to a central host computer that
performs all processing.
Network services are provided by servers and requested by clients
Client computers access a server that performs back-end services
37.
You are setting up a new domain structure. There will be four main
domain controllers in four different locations. An appropriate set of DNS
names would be:
A
charlie.exy.net, foxtrot.exy.net, exy.net, delta.exy.net
B
charlie.exy.net, foxtrot.exy.net, tango.net, delta.exy.net
C
charlie.exy.net, foxtrot.exy.net, delta.net, delta.exy.net
D
charlie.exy.net, foxtrot.exy.net, foxtrot.net, delta.exy.net
38.
A client is setting up a new network. She wishes to use a network
operating system that makes use of a network directory of existing
resource names, accessible to all authorised users. Which of the following
operating systems would NOT support such a facility:
A
B
C
D
39.
Windows NT v4
Windows 2000
Linux
Novell Netware v4
You are running a Windows 2000 network. You have administrative rights
to the domain, and are setting up users on one of the domain controllers.
Which of the following tasks will you not be able to do:
A
B
C
D
Set up a new group of domain users called SPECIAL
Set up a new user that belongs to SPECIAL
Add an existing user to the SPECIAL group
Set up a local group called SPECIAL on one of the client machines
Page 10 of 17
40.
You have been asked to set up a PC to be “dual boot”, so it can become
part of a Windows 2000 network or a Linux network, which both run on the
same cabling and hardware infrastructure. Which of the following must
you NOT do:
A
B
C
D
41.
When a user logs on normally to a Windows 2000 or Unix network, which
of the following must happen before the user gets their desktop/command
prompt:
A
B
C
D
42.
The server must encrypt any data sent from the keyboard
User data sent from the keyboard must be matched with data in a
user database held on a logon server
They must change their password
They need to select the domain name of the server
A user normally on a peer-peer network wants to log on to a Windows
2000 domain controller. This user has a username/password in the
domain, but the user gets an error message when they try to use it.
Assuming that they have not forgotten their username/password, which of
the following is NOT a likely possible explanation?
A.
B.
C.
D.
43.
Use Windows 2000 Disk Administrator to set up two partitions
Install Linux onto an existing Windows 2000 partition
Use a version of Linux that has been downloaded from the Internet
Set up a boot floppy to start up the Linux partition
They haven’t selected the domain name in the given dialogue box
Their password has expired
Their domain login has been set up on the local machine
The domain controller cannot recognise the local computer
When a Windows XP computer boots up, which is the correct order of
accessing software:
A
B
C
D
BIOS, bootloader, CMOS, drivers, winlogon
CMOS bootloader, BIOS, winlogon, services
BIOS, CMOS, bootloader, services, winlogon
bootloader, BIOS, CMOS, drivers, winlogon
Page 11 of 17
44.
A user wants to connect to your local Windows 2000 network through a
broadband wireless WAN. Their hardware and OSI level 1 and 2 software
used must comply to:
A
B
C
D
45.
Why don’t signals in adjacent cells for cellphone networks interfere with
each other?
A:
B:
C:
D:
46.
the base stations are so far apart that a handset can only
communicate with at most one base station at a time
Adjacent cells use different radio frequencies
The user has to point the handset at the base station, so there is no
problem with a base station in another direction
The handset uses electronic filters to block out unwanted signals
Which of the following is an advantage of wireless computer networks
over hard-wired computer networks?
A:
B:
C:
D:
47.
IEEE 802.3 specification
IEEE 802.5 specification
IEEE 802.11 specification
IEEE 802.16 specification
Faster data rates are possible with wireless networks
Wireless networks are less expensive to set up
Wireless networks are more secure
Wireless networks are less susceptible to interference
Here are three statements about wireless networks.
1. ‘Ad hoc’ wireless networks were invented by the Romans.
2. Infrastructure wireless networks need base stations.
3. Wireless networks use electromagnetic radiation to send messages.
Which of these statements is/are correct?
A:
1 only
B:
1 and 2
C:
2 and 3
D:
1, 2 and 3
Page 12 of 17
48.
You install a new audio adapter and its unsigned driver in your Windows
2000 Server computer. When you restart the computer, the system hangs
and you cannot log in to Windows 2000. You decide to use one of the
advanced startup options to open Windows 2000 Server and remove the
device driver. Which advanced setup option should you use?
A
B
C
D
49.
Safe Mode
Debugging Mode
Enable VGA Mode
Last Known Good Configuration
The Maximum Acceptable Path Loss (MAPL) for IEEE 802.11b is currently
100 dB, and the actual path loss is given by:
PL = PL(1) + 30 log(d)
Where PL = the path loss in dB
PL(1) is the path loss at a distance of 1 m from the transmitter = 40
dB at 2.5 GHz (IEEE 802.11b and g frequency)
log(d) is the logarithm to base 10 of the distance between the
transmitter and receiver (in metres).
The range is the value of d when the path loss has risen to the MAPL, so
100 dB = 40 dB + 30 log(range)
60 = 30 log(range)
2 = log(range)
range = 102 = 100 m
In the future, due to advances in receiver technology, it may become
possible to introduce a new wireless network specification, IEEE
802.11b(2), such that the MAPL is 130 dB.
What would be the range of this new type of network?
A:
B:
C:
D:
130 m
200 m
500 m
1000 m
Page 13 of 17
50.
What is a ‘hotspot’?
A:
B:
C:
D:
51.
Why is it difficult to detect collisions in a wireless network?
A:
B:
C:
D:
52.
The place between two wireless network base stations where their
combined signal strength is a maximum
The safety region around a wireless network base station where the
signal is so strong that prolonged exposure can cause cancer
The area on the plastic case of a wireless network component that
heats up as the radio signals pass through it
The region around a wireless network base station within which it
can send and receive signals
The signals from two messages can pass through each other
because they don’t have to travel along the same wire
A transmitter may not know about a collision that occurs at a
receiver
Signal strength decreases with increasing distance from the
transmitter, so a strong signal may not be much affected by a
collision with a weak signal
Radio waves travel faster than signals in a wire, so collisions last
for much shorter times
Here is some information about some of the IEEE 802.11 specifications.
Specification
IEEE 802.11a
IEEE 802.11b
IEEE 802.11g
Maximum data rate
54 Mb/s
11 Mb/s
54 Mb/s
Frequency band
5.5 GHz
2.4 GHz
2.4 GHz
Here are some statements relating to this data.
1. IEEE 802.11b and IEEE 802.11g use the same frequency band
2. IEEE 802.11a has a faster maximum data rate than IEEE 802.11b.
3. Because IEEE 802.11a operates in a higher frequency band, it can
send messages faster than IEEE 802.11g.
Which of these statements is/are true?
A:
B:
C:
D:
1 only
1 and 2
2 and 3
1, 2 and 3
Page 14 of 17
53.
How do wireless networks deal with the problem of collisions?
A:
B:
C:
D:
54.
D
55.
ALOHA
CSMA/CA
CSMA/CD
Ignore them and try again
The Windows Registry gets overwritten during all of the operations listed
below, except one. Choose the operation that leaves the registry intact
A
Logging on locally
B
Writing and saving a MS-Word document
C
Logging on to a domain
Installing a new version of MS-Office
You are setting up a TCP/IP network. The network will be configured as a
Windows 2000 mixed-mode network that will contain four subnets. Each
subnet will correspond to a node in the domain workspace and will include
Windows 2000 Server computers, Windows 2000 Professional computers
and some legacy Windows 98 computers.
You want to achieve the following results:
1. The client computers must be assigned IP addressing information
automatically
2. The network must be able to automatically resolve the NetBIOS names of the
Windows 98 computers to their IP addresses
3. The network must be able to automatically resolve the host names of the
Windows 98 computers to their IP addresses
You configure a DHCP server on each subnet, and then you configure the
Windows 2000 Professional and Windows 98 computers as DHCP clients.
Which result have you achieved:
A
B
C
D
1, 2, 3
1, 2 only
1, 3 only
None of the above options
Page 15 of 17
56.
You are designing a cabled WAN that will connect 3 existing
networks in Bristol, Birmingham, and London
Required results:
 All of the computers on each of the 3 networks must be able to
communicate with any other computer on the 3 networks.
 The WAN links must be capable of transmitting data at a minimum
speed of 1 Gbps.
Optional desired results:
 You want to provide continued communications in the event of a
single-link failure.
 You want to provide continued communications at a minimum
speed of 1 Gbps in the event of a single-link failure.
Proposed solution:
Connect the 3 networks by using three 2 Gbps links, as shown below:
Birmingham
London
Bristol
Which outcome does the proposed solution bring about?
A.
B.
C.
D.
the required results and produces both of the optional desired
results.
the required results and produces only 1 of the optional desired
results.
the required results but does not produce any of the optional
desired results.
does not produce the required results.
Page 16 of 17
57.
Situation: You have inherited a rather old network, for an organisation
that is experiencing considerable growth. Network monitoring shows that
network utilization has grown from 30 percent to 70 percent of maximum
capacity in the past year. Yet the network still continues to grow and it is
estimated that you will need to add a further 24 client computers and an
additional server within 3 months. The objective will be to considerably
reduce network utilization before any further nodes are added. The
following table summarizes your current network configuration.
Servers
Client Computers
Network Type
Protocol
Cable
Routers
Bridges
3
120 evenly distributed among the 3
servers
10BaseT Ethernet
TCP/IP
Category 3 UTP
None
None
Required result:
You must reduce network utilization by 50 percent.
Optional desired results:
You want to allow for continued network growth.
You want to maintain the new network utilization levels even after the
planned additions to the network are implemented.
You want to minimize costs for the project.
Proposed solution:
Replace all 10BaseT hubs with equivalent 100BaseT hubs. Replace all
existing Category 3 UTP cable with Category 5 UTP cable. Replace all
10BaseT network adapters with 100BaseT network adapters.
Which results do the proposed solution produce?
A.
B.
C.
D.
the required result and all of the optional desired results.
the required result and only 2 of the optional desired results.
the required result but none of the optional desired results.
The proposed solution does not produce the required result.
Page 17 of 17