PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “OMR” answer sheet supplied with the question
paper, following instructions therein. (1x10)
1.1 ________ are networks that connect people within a company to each other and to the
company network.
A) Extranets
B) Internets
C) Bitstreams
D) Intranets
1.2 The internet model or TCP/IP reference model specifically applies to internet worked
systems, and has 4 layers. The movement of data packets across a network would be
managed by which layer?
A) The link layer
B) The (inter) network layer
C) The transport layer
D) The application layer
1.3 Which is NOT a good Web security strategy?
A) Restrict access to the Web server; keep a minimum number of ports open
B) Limit the users who can load software, edit or add files.
C) Add demo programs, so users can test system without accessing production data.
D) Remove unnecessary compilers and interpreters.
1.4 A passive threat to computer security is
A) Malicious Intent
B) Sabotage
C) Accident Errors
D) Espionage Agents
1.5 ________ are used to identify a user who returns to a Website.
A) Cookies
B) Plug-ins
C) Scripts
D) ASPs
1.6 E-mail message can be protected by
A) Mirroring
B) Caching
C) Encryption
D) Resending
1.7 Multipurpose Internet Mail Extension (MIME) was developed
A) to support email messages containing text, audio and video
B) to support FTP clients
C) to support telnet between two machines
D) to support text-based email messages only
1.8 The tag used in HTML to link it with other URL’s is:
A) <H>
B) <A>
C) <U>
D) <L>
1.9 HTTP stands for
A) Hyper Text Transfer Protocol
B) Hyper Tetra Transfer Protocol
C) Heavy Text Transfer Protocol
D) Huge Text Transfer Protocol
1.10 A reliable stream service in TCP is described as two-way transmission, free of transmission
________, with no lost or duplicate ________, and the bytes are delivered in the same
________ in which they were transmitted.
A) errors; bytes; manner
B) failure; packets; sequence
C) errors; activity; manner
D) errors; bytes; sequence
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “OMR” answer sheet supplied with the question paper, following
instructions therein. (1x10)
2.1 The core of Fiber Optic Cable is made of highly refined cylindrical glass.TRUE
2.2 Wi-Fi can be used for connecting two machines without any cable.TRUE
2.3 A socket address comprises the IP address of the host and a port number.TRUE
2.4 TCP is reliable and segments include a checksum field in the header. UDP is unreliable and
therefore has no checksum in its header.TRUE
2.5 ARP is used to find the appropriate IP address, given a MAC address.TRUE
2.6 The Domain Name System (DNS) is primarily used to determine the symbolic name of a
host, given its IP address.TRUE
2.7 A Gigabyte contains 1000 Megabytes.TRUE
2.8 JavaScript embeds a script within an HTML page. When the HTML interpreter reaches the
script it invokes an interpreter which executes it.TRUE
2.9 IPv6 address mappings require a AAAA DNS record.TRUE
2.10 The network address is usually encoded as a prefix of the IP address.TRUE
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet
supplied with the question paper, following instructions therein. (1x10)
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “OMR” answer sheet supplied with the question
paper, following instructions therein. (1x10)
1.1 ________ are networks that connect people within a company to each other and to the
company network.
A) Extranets
B) Internets
C) Bitstreams
D) Intranets
1.2 The internet model or TCP/IP reference model specifically applies to internet worked
systems, and has 4 layers. The movement of data packets across a network would be
managed by which layer?
A) The link layer
B) The (inter) network layer
C) The transport layer
D) The application layer
1.3 Which is NOT a good Web security strategy?
A) Restrict access to the Web server; keep a minimum number of ports open
B) Limit the users who can load software, edit or add files.
C) Add demo programs, so users can test system without accessing production data.
D) Remove unnecessary compilers and interpreters.
1.4 A passive threat to computer security is
A) Malicious Intent
B) Sabotage
C) Accident Errors
D) Espionage Agents
1.5 ________ are used to identify a user who returns to a Website.
A) Cookies
B) Plug-ins
C) Scripts
D) ASPs
1.6 E-mail message can be protected by
A) Mirroring
B) Caching
C) Encryption
D) Resending
1.7 Multipurpose Internet Mail Extension (MIME) was developed
A) to support email messages containing text, audio and video
B) to support FTP clients
C) to support telnet between two machines
D) to support text-based email messages only
1.8 The tag used in HTML to link it with other URL’s is:
A) <H>
B) <A>
C) <U>
D) <L>
1.9 HTTP stands for
A) Hyper Text Transfer Protocol
B) Hyper Tetra Transfer Protocol
C) Heavy Text Transfer Protocol
D) Huge Text Transfer Protocol
1.10 A reliable stream service in TCP is described as two-way transmission, free of transmission
________, with no lost or duplicate ________, and the bytes are delivered in the same
________ in which they were transmitted.
A) errors; bytes; manner
B) failure; packets; sequence
C) errors; activity; manner
D) errors; bytes; sequence
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “OMR” answer sheet supplied with the question paper, following
instructions therein. (1x10)
2.1 The core of Fiber Optic Cable is made of highly refined cylindrical glass.TRUE
2.2 Wi-Fi can be used for connecting two machines without any cable.TRUE
2.3 A socket address comprises the IP address of the host and a port number.TRUE
2.4 TCP is reliable and segments include a checksum field in the header. UDP is unreliable and
therefore has no checksum in its header.TRUE
2.5 ARP is used to find the appropriate IP address, given a MAC address.TRUE
2.6 The Domain Name System (DNS) is primarily used to determine the symbolic name of a
host, given its IP address.TRUE
2.7 A Gigabyte contains 1000 Megabytes.TRUE
2.8 JavaScript embeds a script within an HTML page. When the HTML interpreter reaches the
script it invokes an interpreter which executes it.TRUE
2.9 IPv6 address mappings require a AAAA DNS record.TRUE
2.10 The network address is usually encoded as a prefix of the IP address.TRUE
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet
supplied with the question paper, following instructions therein. (1x10)
3.1 IP packet is encapsulated within a new IP packet. A. TCP 9
3.2 Transfer of electronic mail. B. UDP 1
3.3 The network protocol that breaks messages into C. List
packets, reassembles the packets at the destination, and D. SMTP 2
takes care of errors. E. IP 3
F. Tunnel mode
3.4 Speed of printer is measured in G. FTP 8
3.5 A script used to display a non-text based object at a H. MIME 10
specified location within a page. I. Non-persistent
J. Image
3.6 Protocol used to fetch e-mail from a remote mailbox K. ppm 4
3.7 A protocol provides routing and error reporting functions L. TELNET
in addition to forwarding, fragmentation/re-assembly and M. POP3 6
address resolution
3.8 Used to send/receive files between two computers
3.9 An alternative to TCP that achieves higher transmission
speeds.
3.10 Format of email attachments.
No comments:
Post a Comment