Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Practice Test
Term 3 2010
4 100BaseT is:
a. an Ethernet specification
b. a specification for installing UTP cable
c. another term for Category 5 UTP cable
d. none of the above
6 After a user receives encrypted data, the process of ‘decrypting’ that data involves
a. writing the data to a device that can read that data
b. converting the data to readable form
c. converting the data from one protocol to another protocol
d. none of the above
1 In a token ring network the ‘Token’ controls which workstation has the ability to
transmit data around the network. TRUE / FALSE
2 Bus networks using a thin coaxial cable do not require a resistor to terminate the end
of the cable.
TRUE / FALSE
3 One type of virus is a ‘Boot Sector’ virus.
TRUE / FALSE
4 A ‘Logic’ bomb activates according to specific criteria.
TRUE / FALSE
5 Virus ‘signature files’ do not need to be updated regularly.
TRUE / FALSE
6 ‘Plain text’ is the term use to describe encrypted data.
TRUE / FALSE
7 Symmetric encryption is another name for Public Key encryption
TRUE / FALSE
8 RSA encryption is found in newer versions of Internet Explorer
TRUE / FALSE
9 A ‘Proxy Sever’ is a server that is inside the main network and controls which
communications pass into the main network.
TRUE / FALSE
TRUE / FALSE
Write concise answers in the spaces provided. Use extra paper if needed.
All questions are to be answered – there is NO choice of questions
Use short phrases, bullet points, or two to three sentences to answer each of these
questions
1. Antivirus software is often employed in an effort to detect and remove virus and
other `malware' infections.
Distinguish between a 'virus' and a 'worm'. (2 marks)
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
7. 'Error detection' and 'error correction' are important for the operation of a network.
Which of these is a CRC (cyclic redundancy checksum) used for?
(1 mark)
(1 mark)
_____________________________________________________________________________
_____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
____________________________________________________________________________
9 Explain how user access permissions or rights help to make a network secure. (2
marks)
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
10. An organisation has to invest money, equipment, and time in taking backups of its
computer system. This is also known as 'archiving'.
List 4 results that could occur if the organisation fails to archive its data. (2 marks)
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
14 A typical support contract should cover four main topics: response time, hours of
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
15. Explain in general terms how a VPN (Virtual Private Network) works. (2
marks)
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
16. 'Client', 'server', and 'peer' are terms related to the operation of a network.
Define the terms 'client' and 'server'. (2 marks)
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
17. Explain the place (if any) of clients and servers in a 'peer-to-peer' network. (1
mark)
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
18. There are four main data encryption methods. List all four and explain the basic
concept with an example of any one of these methods. (4 marks)
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________