Sei sulla pagina 1di 9

CPIT School of Computing

Diploma in Information and Communications Technology

NDNM600 LAN ADMINISTRATION

Practice Test
Term 3 2010

Student name/number ………………………………….………………………


Christchurch Polytechnic Institute of Technology School of Computing

Time allowed:1 hour 50 minutes including reading time.


There are 3 sections. The total mark is 50.
Attempt all questions. There is no choice of questions.
This test is 50% of the course credit.

Section A – Multiple Choice Questions (10


marks)

Circle all correct answers that apply

1 Which of the following is an example of a ‘protocol’.


a. star network
b. TCP/IP
c. twisted pair
d. groupware

2 The main function of a router in a network is to:


a. act to connect networks
b. prevent broadcasts
c. avoid collisions
d. pass all traffic on to other networks

3 Groupware is a term used to mean:


a. e-mail and chat group software
b. scheduling and appointment software
c. whiteboard and videoconference software
d. all of the above

4 100BaseT is:
a. an Ethernet specification
b. a specification for installing UTP cable
c. another term for Category 5 UTP cable
d. none of the above

R.Oliver: 46804907.doc 27 November 2010 Page 2


© Christchurch Polytechnic Institute of Technology
Christchurch Polytechnic Institute of Technology School of Computing

5 The following is an example of a network topology:


a. bridge
b. bus
c. twisted pair
d. broadband

6 After a user receives encrypted data, the process of ‘decrypting’ that data involves
a. writing the data to a device that can read that data
b. converting the data to readable form
c. converting the data from one protocol to another protocol
d. none of the above

7 Public key encryption requires:


a. no encryption keys
b. three encryption keys
c. two encryption keys
d. four encryption keys

8 A firewall is a general term that refers to:


a. hardware only
b. software only
c. hardware and/or software
d. none of the above

9 A hybrid network is a network that:


a. has its own unique structure
b. represents the features of more than one network structure
c. may represent the features of only 2 different network structures
d. pass all traffic on to other networks

10 A bridge or switch in a network


R.Oliver: 46804907.doc 27 November 2010 Page 3
© Christchurch Polytechnic Institute of Technology
Christchurch Polytechnic Institute of Technology School of Computing

a. prevents tokens and frames colliding


b. may pass traffic to another segment of the same network where necessary
c. prevents broadcasts
d. uses the network layer address

Section B – True/False Questions (10


marks)

Circle the correct answers in each case

1 In a token ring network the ‘Token’ controls which workstation has the ability to
transmit data around the network. TRUE / FALSE

2 Bus networks using a thin coaxial cable do not require a resistor to terminate the end
of the cable.
TRUE / FALSE
3 One type of virus is a ‘Boot Sector’ virus.
TRUE / FALSE
4 A ‘Logic’ bomb activates according to specific criteria.
TRUE / FALSE
5 Virus ‘signature files’ do not need to be updated regularly.
TRUE / FALSE
6 ‘Plain text’ is the term use to describe encrypted data.
TRUE / FALSE
7 Symmetric encryption is another name for Public Key encryption
TRUE / FALSE
8 RSA encryption is found in newer versions of Internet Explorer
TRUE / FALSE
9 A ‘Proxy Sever’ is a server that is inside the main network and controls which
communications pass into the main network.
TRUE / FALSE

10 ‘Unbounded’ media requires a physical connection.

R.Oliver: 46804907.doc 27 November 2010 Page 4


© Christchurch Polytechnic Institute of Technology
Christchurch Polytechnic Institute of Technology School of Computing

TRUE / FALSE

Section C – Short Answer Questions (30 marks)

Write concise answers in the spaces provided. Use extra paper if needed.
All questions are to be answered – there is NO choice of questions
Use short phrases, bullet points, or two to three sentences to answer each of these
questions

1. Antivirus software is often employed in an effort to detect and remove virus and
other `malware' infections.
Distinguish between a 'virus' and a 'worm'. (2 marks)
_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

2. List 2 alterations which can be made to the accessing of a desktop computer


hardware to reduce the likely hood of virus infection being introduced from the
desktop. (1 mark)

____________________________________________________________________________

____________________________________________________________________________

3. Sometimes an anti-virus program is not able to disinfect a file. Explain why


disinfection might not be possible. (1 mark)

____________________________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

4. Groupware is a class of software that helps groups of colleagues (workgroups)


organize their activities.
Some groupware software is specialised for supporting users in different places but
interacting at the same time (not e-mail). State one function of groupware which is
R.Oliver: 46804907.doc 27 November 2010 Page 5
© Christchurch Polytechnic Institute of Technology
Christchurch Polytechnic Institute of Technology School of Computing

intended for this purpose. (1 mark)

___________________________________________________________________________

___________________________________________________________________________

5. Protocols are most important in the operation of networks.


State the meaning of a protocol.
(1 mark)
___________________________________________________________________________

___________________________________________________________________________

6. Protocols are most important in the operation of networks.


Explain why ethernet is a protocol. (2 marks)
____________________________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

7. 'Error detection' and 'error correction' are important for the operation of a network.
Which of these is a CRC (cyclic redundancy checksum) used for?
(1 mark)

(1 mark)
_____________________________________________________________________________

_____________________________________________________________________________

8. Describe four requirements which would help to ensure reasonable physical


security for a commercial network. (2 marks)
____________________________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

____________________________________________________________________________

R.Oliver: 46804907.doc 27 November 2010 Page 6


© Christchurch Polytechnic Institute of Technology
Christchurch Polytechnic Institute of Technology School of Computing

9 Explain how user access permissions or rights help to make a network secure. (2
marks)
___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

10. An organisation has to invest money, equipment, and time in taking backups of its
computer system. This is also known as 'archiving'.
List 4 results that could occur if the organisation fails to archive its data. (2 marks)
___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

11. What is meant by the term 'hot site'? (1 mark)


___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

12. Explain the following term:


‘vendor support’ (1 mark)
___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

13 Explain the following term:


‘third-party support’ (1 mark)
___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________
14 A typical support contract should cover four main topics: response time, hours of

R.Oliver: 46804907.doc 27 November 2010 Page 7


© Christchurch Polytechnic Institute of Technology
Christchurch Polytechnic Institute of Technology School of Computing

availability, parts & labour costs, responsibilities.


Explain any one of the four. (3 marks)
___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

15. Explain in general terms how a VPN (Virtual Private Network) works. (2
marks)
___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

16. 'Client', 'server', and 'peer' are terms related to the operation of a network.
Define the terms 'client' and 'server'. (2 marks)
___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

17. Explain the place (if any) of clients and servers in a 'peer-to-peer' network. (1
mark)

___________________________________________________________________________

___________________________________________________________________________

___________________________________________________________________________

R.Oliver: 46804907.doc 27 November 2010 Page 8


© Christchurch Polytechnic Institute of Technology
Christchurch Polytechnic Institute of Technology School of Computing

18. There are four main data encryption methods. List all four and explain the basic
concept with an example of any one of these methods. (4 marks)
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________

R.Oliver: 46804907.doc 27 November 2010 Page 9


© Christchurch Polytechnic Institute of Technology

Potrebbero piacerti anche