ity273 module test - university of worcester module t…  · web view15. when connecting two...

31
BSc COMPUTING COMP 2122 Assignment 2 Multiple Choice Exam 1½ hours Answer ALL Questions. Please note that the last three carry double weighting

Upload: others

Post on 13-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

BSc COMPUTING

COMP 2122 Assignment 2

Multiple Choice Exam

1½ hours

Answer ALL Questions.

Please note that the last three carry double weighting

Page 2: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

1. Which of the following protocols in the Unix TCP/IP protocol suite functions at the network layer according to the OSI model?

A SMTPB IPC TCPD UDP

2. Which of the following is NOT a characteristic of network data transfer using packet switching:

A each packet has a limited “time to live”B packet headers contain IP addresses of source and destination

nodesC the route for all packets is calculated before any data is sentD packets sent through the Internet are also known as datagrams

3. Which of the following is true about data sent round a local area network using IEEE 802.3 compliant hardware:

A It could be wireless dataB It cannot be sent full duplexC The network cards have fixed IP addresses D Contention on the network is dealt with using CSMA/CD

4. Which is NOT true about ADSL

A It can use existing copper telephone wiresB It is available everywhere within the UKC It provides sufficient bandwidth to be able to handle the

downloading and display of interactive multimedia dataD It provides unequal amounts of bandwidth for uploading and

downloading

Page 1 of 17

Page 3: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

5. HomePlug is an alternative to both sending data through Ethernet cables or a wireless network (WiFi). Which of the following is NOT true about HomePlug:

A Bandwidth is greater than WiFiB It can easily be used in homesC It does not cause radio interferenceD It works with RJ45 Ethernet connections

6. Which is NOT a regularly used IEEE network standard:

A IEEE 802.11aB IEEE 802.11bC IEEE 802.11fD IEEE 802.11g

7. Why is pre-emptive multitasking considered to be an important feature of a network operating system servicing many users:

A it makes use of interrupts to control access to the CPUB it depends on co-operation between processes on CPU cyclesC it can support many processes at the same timeD it manages CPU time by means of adjustable time slicing between

processes

8. Which of the following is NOT true about Active Directory

A. it does not follow an International Standard for data storageB. it can only be used within a single siteC. it can reside on network client machinesD. it can be used to provide secure authentication

9. Which of the following is TRUE about the Windows boot.ini file?

A: The boot.ini file indicates where the computer is to find its operating system during the boot-up process

B: The boot.ini file stores information about the partitions existing on the hard drive

C: Every logical drive needs a boot.ini fileD: The boot.ini file has been replaced by BOOTMGR in Vista &

Windows 7

Page 2 of 17

Page 4: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

10. What is NOT a characteristic of connection-oriented communication?

A. It provides fast but unreliable delivery of datagrams. B. It provides assurance of packet delivery. C. It uses store-and-forward techniques to move datagrams between

computers. D. It uses message-oriented communication for processing e-mail.

11. You manage a domain with three groups: MANAGERS, TECHNICAL, ADMIN, and staff are allocated to them accordingly. A particular folder /SMTMEETINGS on the main domain controller is configured so that MANAGERS have full access through a SHARE, but ADMIN personnel can only use that SHARE for read access. One of the managers cannot get into work, but one of her files (in a subfolder of SMTMEETINGS) needs to be urgently updated. Which is the safest way to allow access to her secretary (who is a member of the ADMIN group), so that the relevant file can be updated:

A Give full access to the share to the ADMIN groupB Give change control access to the share for the TECHNICAL groupC Give change control access to the share for just the administrator

who will make the changesD Give the ADMIN group write access to the folder itself

12. A network device functions at or above the Transport layer of the OSI model. It acts as a translator between 2 computers that use different protocols or data formats. Is it:

A. a gateway B. a bridge C. a router D. a repeater

13. Which of the following Operating Systems is NOT multiplatform?

A. Unix B. Linux C. Windows 2000D. VMS

Page 3 of 17

Page 5: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

14. Which computer languages are modern network operating systems written in:

A. Visual BASIC B. C C. Java D. COBOL

15. When connecting two computers together directly with a cat 5 UTP patch lead, we need:

A: A straight-though cable because the data has to go straight through from one computer to the other without an intermediate hub or router

B: A straight-through cable so that the receiving computer knows on which lines to expect data

C: A crossover cable so that data sent by one computer on its output lines is placed on the input lines of the other computer

D: A crossover cable so that data can cross over directly from one computer to the other

16. The purpose of the Windows Registry is to control:

A: system hardwareB: the boot-up processC: the user desktopD: user rights

17. You are designing a 1000-Mbps Ethernet network for a building that has existing UTP cable. You test the existing cable and decide that it meets Category 3 specifications. Which of the media listed below should you use?

A.  the existing cable B.  new Type 1 STP cable C.  new Category 5 UTP cable D.  new Category 6 UTP cable

Page 4 of 17

Page 6: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

18. You want to run Linux and Windows on the same computer. Which of the following is not a workable solution:

A Copy each operating system to a different folder on the same partition on the boot disk

B Use a floppy disk as the Linux boot disk, and install Windows and Linux on different partitions

C Use a USB disk as the Linux boot disk, and install Windows and Linux on different partitions

D Install Linux on an existing Windows machine using a “non-lethal” partition program to create the new partition

19. During the installation of Windows 2000 server via a bootable CD-ROM drive, you receive a media error. You shut down the computer and restart the installation, but receive the same error.

Four suggestions are given below for troubleshooting this problem

1. Replace the CD-ROM in the drive2. Shut down the computer and restart the installation3. Contact the manufacturer to obtain another copy of the server CD4. Create more free hard disk space on the hard drive by deleting

unnecessary files

The best solution would involve:A 1 onlyB 1 and 4C 1 and 3D 1, 2, and 4

20. Which of the following statements about IP addresses is false:

A. A computer must have an IP address to communicate with others via TCP/IP

B. There is no need to worry about the IP address because it is allocated automatically

C. The local IP address can be found easily using IPCONFIGD. All domain names registered with the Internet authorities has a

fixed IP address that can be easily looked up

Page 5 of 17

Page 7: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

21. Two computers on a peer-to-peer network need to have:

A: The same subnet maskB: Different IP addresses in the same subnetC: The same subnet mask and different IP addresses in the same

subnetD: Different subnet masks but the same IP address

22. You want to segment your 200-node network into 3 subnets. The network uses TCP/IP. Which device should you use?   A. repeater B. bridge C. router D. gateway

23. DHCP is used for

A: Allocating nodes to trees within a forestB: Allocating IP addresses to nodes within a domainC: Allocating nodes to domains within a treeD: Moving nodes from one domain to another

24. You wish to connect two computers directly together for data transfer purposes. Each of the computers has a network card and several USB ports. Which of the following options would not work:

A A crossover Ethernet cableB Two crossover Ethernet cables and a passive hubC Two straight-through Ethernet cables and a passive hubD A single USB cable with two male connectors

25. Your l00BaseT Ethernet network uses TCP/IP. Users of your client computers need to access an IBM 3090 mainframe computer by using a 3270 terminal-emulation program. Which device must you install?

    A.  bridge B.  gateway C.  router D.  brouter

Page 6 of 17

Page 8: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

26. You want to connect 2 computers by using l00BaseT Ethernet cable. The computers are located more than 300 meters apart. Which device should you use?

    A. repeater B. amplifier C. multiplexer D. gateway

27. When you have administrative access to a network, why is it a good idea to create a user with limited access and use that identity as much as possible?

A: The limited user needs less processor time than the administratorB: The limited user needs less memory than the administratorC: Because of the reduced privileges, the limited user can accomplish

tasks more quickly than the administratorD: If you make a mistake as a limited user, it is less likely to be

disastrous than a mistake made as an administrator 

28. The hard disk on your Windows 2000 Server computer is configured with an NTFS volume (C:) that contains the ACCOUNTING folder. This folder contains three subfolders: MANAGERS, ACCOUNTANTS, and ADMINASSTS. The folder is shared and the Everyone group has been granted Read shared folder permission. In addition, the Everyone group has been granted the Full Control NTFS permission to the C: drive and its contents. What content can network users who are members of the Everyone group view?

A All content of the ACCOUNTING folder, including the subfolder names and content

B Content in the ACCOUNTING folder and names of the subfolders, but not content in the subfolders

C The names of the subfolders and their content, but not content in the ACCOUNTING folder

D The names of the subfolders, but not content in the ACCOUNTING folder or in the subfolders

Page 7 of 17

Page 9: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

29. Which of the following most accurately describes the relationship between Active Directory domains, forests, trees and users?

A: Users are attached to trees which exist within forests that exist within domains

B: Users are members of domains that link together to form trees that exist within forests

C: Domains include trees, forests and usersD: Trees and forests are types of domain, and a user can log onto a

tree, a forest or a simple domain

30. In the list below, which IS a characteristic of a client/server networks?

A. Any computer can make its resources available to any other computer on the network.

B. Dumb terminals are connected to a central host computer that performs all processing.

C. Any computer on the network can be both a client and a server. D. Client computers access a server that performs back-end services.

31. You successfully upgrade a Windows 2000 Server computer on your network to a Domain Controller. What is most likely to be true about the resulting machine:

A It is now running a service that will allocate IP addresses to client computers

B It will automatically become controller of the local network ForestC It has an “active directory” that can store data on all users and any

computer that is part of the local networkD It has an “active directory” of local computer names but users are

managed in a different way

32. You install a plug-and-play Ethernet network adapter in a client computer. The computer's network software is initialized successfully, but the computer is not able to communicate with other computers on the network. All other client computers on the network are able to communicate. What is the most likely cause of the problem?

A. the computer doesn’t have an IP address B. the IO port address on the network adapter is incorrect. C. the cable segment is not properly terminated D the packet-size setting is incorrect.

Page 8 of 17

Page 10: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

33. The servers on your network run Microsoft Windows 2000 Server. The client computers run Microsoft Windows XP. You want to monitor network activity and evaluate network communications at the packet level. Which tool should you use?

A. Network Monitor B. Protocol analyzer C. Oscilloscope D. Volt-ohmmeter

34. In DHCP, the scope is

A: A software tool for examining the relationships between nodes in the domain

B: The range of IP addresses that can be allocated within a domainC: A software tool for examining the properties of a node within a

domainD: The Software Control and Operation of Programs Executive

35. Your network has 35 client computers and 1 server. The server runs Microsoft Windows 2000 Server. Network performance is steadily decreasing as new client computers are added to the network. You run Performance Monitor on the server and obtain the following statistics: Counter Average % Processor Time: 8 Page Faults/sec: 2 % Disk Time: 25

What should you do to improve network performance? A. Replace the server with a multiprocessor computer. B. Install additional RAM in the server. C. Install disk striping with parity on the server D. Segment the network by adding another network adapter to the

server.

Page 9 of 17

Page 11: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

36. Which of the statements below is a characteristic of a peer-peer network?

A. Any computer can make its resources available to any other computer on the network.

B. Dumb terminals are connected to a central host computer that performs all processing.

C. Network services are provided by servers and requested by clientsD. Client computers access a server that performs back-end services

37. You are setting up a new domain structure. There will be four main domain controllers in four different locations. An appropriate set of DNS names would be:A charlie.exy.net, foxtrot.exy.net, exy.net, delta.exy.netB charlie.exy.net, foxtrot.exy.net, tango.net, delta.exy.netC charlie.exy.net, foxtrot.exy.net, delta.net, delta.exy.netD charlie.exy.net, foxtrot.exy.net, foxtrot.net, delta.exy.net

38. A client is setting up a new network. She wishes to use a network operating system that makes use of a network directory of existing resource names, accessible to all authorised users. Which of the following operating systems would NOT support such a facility:

A Windows NT v4B Windows 2000C LinuxD Novell Netware v4

39. You are running a Windows 2000 network. You have administrative rights to the domain, and are setting up users on one of the domain controllers. Which of the following tasks will you not be able to do:

A Set up a new group of domain users called SPECIALB Set up a new user that belongs to SPECIALC Add an existing user to the SPECIAL groupD Set up a local group called SPECIAL on one of the client machines

Page 10 of 17

Page 12: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

40. You have been asked to set up a PC to be “dual boot”, so it can become part of a Windows 2000 network or a Linux network, which both run on the same cabling and hardware infrastructure. Which of the following must you NOT do:

A Use Windows 2000 Disk Administrator to set up two partitionsB Install Linux onto an existing Windows 2000 partitionC Use a version of Linux that has been downloaded from the InternetD Set up a boot floppy to start up the Linux partition

41. When a user logs on normally to a Windows 2000 or Unix network, which of the following must happen before the user gets their desktop/command prompt:

A The server must encrypt any data sent from the keyboardB User data sent from the keyboard must be matched with data in a

user database held on a logon serverC They must change their passwordD They need to select the domain name of the server

42. A user normally on a peer-peer network wants to log on to a Windows 2000 domain controller. This user has a username/password in the domain, but the user gets an error message when they try to use it. Assuming that they have not forgotten their username/password, which of the following is NOT a likely possible explanation?

A. They haven’t selected the domain name in the given dialogue box

B. Their password has expiredC. Their domain login has been set up on the local machineD. The domain controller cannot recognise the local computer

43. When a Windows XP computer boots up, which is the correct order of accessing software:

A BIOS, bootloader, CMOS, drivers, winlogonB CMOS bootloader, BIOS, winlogon, servicesC BIOS, CMOS, bootloader, services, winlogonD bootloader, BIOS, CMOS, drivers, winlogon

Page 11 of 17

Page 13: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

44. A user wants to connect to your local Windows 2000 network through a broadband wireless WAN. Their hardware and OSI level 1 and 2 software used must comply to:

A IEEE 802.3 specificationB IEEE 802.5 specificationC IEEE 802.11 specificationD IEEE 802.16 specification

45. Why don’t signals in adjacent cells for cellphone networks interfere with each other?

A: the base stations are so far apart that a handset can only communicate with at most one base station at a time

B: Adjacent cells use different radio frequenciesC: The user has to point the handset at the base station, so there is no

problem with a base station in another directionD: The handset uses electronic filters to block out unwanted signals

46. Which of the following is an advantage of wireless computer networks over hard-wired computer networks?

A: Faster data rates are possible with wireless networksB: Wireless networks are less expensive to set upC: Wireless networks are more secureD: Wireless networks are less susceptible to interference

47. Here are three statements about wireless networks.

1. ‘Ad hoc’ wireless networks were invented by the Romans.2. Infrastructure wireless networks need base stations.3. Wireless networks use electromagnetic radiation to send messages.

Which of these statements is/are correct?A: 1 onlyB: 1 and 2C: 2 and 3D: 1, 2 and 3

Page 12 of 17

Page 14: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

48. You install a new audio adapter and its unsigned driver in your Windows 2000 Server computer. When you restart the computer, the system hangs and you cannot log in to Windows 2000. You decide to use one of the advanced startup options to open Windows 2000 Server and remove the device driver. Which advanced setup option should you use?

A Safe ModeB Debugging ModeC Enable VGA ModeD Last Known Good Configuration

49. The Maximum Acceptable Path Loss (MAPL) for IEEE 802.11b is currently 100 dB, and the actual path loss is given by:

PL = PL(1) + 30 log(d)Where PL = the path loss in dBPL(1) is the path loss at a distance of 1 m from the transmitter = 40

dB at 2.5 GHz (IEEE 802.11b and g frequency)log(d) is the logarithm to base 10 of the distance between the

transmitter and receiver (in metres).

The range is the value of d when the path loss has risen to the MAPL, so100 dB = 40 dB + 30 log(range)60 = 30 log(range)2 = log(range)range = 102 = 100 m

In the future, due to advances in receiver technology, it may become possible to introduce a new wireless network specification, IEEE 802.11b(2), such that the MAPL is 130 dB.

What would be the range of this new type of network?

A: 130 mB: 200 mC: 500 mD: 1000 m

Page 13 of 17

Page 15: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

50. What is a ‘hotspot’?

A: The place between two wireless network base stations where their combined signal strength is a maximum

B: The safety region around a wireless network base station where the signal is so strong that prolonged exposure can cause cancer

C: The area on the plastic case of a wireless network component that heats up as the radio signals pass through it

D: The region around a wireless network base station within which it can send and receive signals

51. Why is it difficult to detect collisions in a wireless network?

A: The signals from two messages can pass through each other because they don’t have to travel along the same wire

B: A transmitter may not know about a collision that occurs at a receiver

C: Signal strength decreases with increasing distance from the transmitter, so a strong signal may not be much affected by a collision with a weak signal

D: Radio waves travel faster than signals in a wire, so collisions last for much shorter times

52. Here is some information about some of the IEEE 802.11 specifications.

Specification Maximum data rate Frequency bandIEEE 802.11a 54 Mb/s 5.5 GHzIEEE 802.11b 11 Mb/s 2.4 GHzIEEE 802.11g 54 Mb/s 2.4 GHz

Here are some statements relating to this data.

1. IEEE 802.11b and IEEE 802.11g use the same frequency band2. IEEE 802.11a has a faster maximum data rate than IEEE 802.11b.3. Because IEEE 802.11a operates in a higher frequency band, it can

send messages faster than IEEE 802.11g.

Which of these statements is/are true?

A: 1 onlyB: 1 and 2C: 2 and 3D: 1, 2 and 3

Page 14 of 17

Page 16: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

53. How do wireless networks deal with the problem of collisions?

A: ALOHAB: CSMA/CAC: CSMA/CDD: Ignore them and try again

54. The Windows Registry gets overwritten during all of the operations listed below, except one. Choose the operation that leaves the registry intact

A Logging on locallyB Writing and saving a MS-Word documentC Logging on to a domain

D Installing a new version of MS-Office

55. You are setting up a TCP/IP network. The network will be configured as a Windows 2000 mixed-mode network that will contain four subnets. Each subnet will correspond to a node in the domain workspace and will include Windows 2000 Server computers, Windows 2000 Professional computers and some legacy Windows 98 computers.

You want to achieve the following results:

1. The client computers must be assigned IP addressing information automatically

2. The network must be able to automatically resolve the NetBIOS names of the Windows 98 computers to their IP addresses

3. The network must be able to automatically resolve the host names of the Windows 98 computers to their IP addresses

You configure a DHCP server on each subnet, and then you configure the Windows 2000 Professional and Windows 98 computers as DHCP clients.

Which result have you achieved:

A 1, 2, 3B 1, 2 onlyC 1, 3 onlyD None of the above options

Page 15 of 17

Page 17: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

56. You are designing a cabled WAN that will connect 3 existing networks in Bristol, Birmingham, and London

Required results: All of the computers on each of the 3 networks must be able to

communicate with any other computer on the 3 networks. The WAN links must be capable of transmitting data at a minimum

speed of 1 Gbps.  

Optional desired results: You want to provide continued communications in the event of a

single-link failure. You want to provide continued communications at a minimum

speed of 1 Gbps in the event of a single-link failure.  

Proposed solution: Connect the 3 networks by using three 2 Gbps links, as shown below:

 

 

Which outcome does the proposed solution bring about?

A. the required results and produces both of the optional desired results.

B. the required results and produces only 1 of the optional desired results.

C. the required results but does not produce any of the optional desired results.

D. does not produce the required results.

Page 16 of 17

Birmingham

Bristol

London

Page 18: ITY273 Module Test - University of Worcester Module t…  · Web view15. When connecting two computers together directly with a cat 5 UTP patch lead, we need: A: A straight-though

57. Situation: You have inherited a rather old network, for an organisation that is experiencing considerable growth. Network monitoring shows that network utilization has grown from 30 percent to 70 percent of maximum capacity in the past year. Yet the network still continues to grow and it is estimated that you will need to add a further 24 client computers and an additional server within 3 months. The objective will be to considerably reduce network utilization before any further nodes are added. The following table summarizes your current network configuration.

Servers 3

Client Computers 120 evenly distributed among the 3 servers

Network Type 10BaseT EthernetProtocol TCP/IPCable Category 3 UTPRouters NoneBridges None

Required result: You must reduce network utilization by 50 percent.

Optional desired results: You want to allow for continued network growth. You want to maintain the new network utilization levels even after the planned additions to the network are implemented. You want to minimize costs for the project.

Proposed solution: Replace all 10BaseT hubs with equivalent 100BaseT hubs. Replace all existing Category 3 UTP cable with Category 5 UTP cable. Replace all 10BaseT network adapters with 100BaseT network adapters.

Which results do the proposed solution produce?

A. the required result and all of the optional desired results. B. the required result and only 2 of the optional desired results. C. the required result but none of the optional desired results. D. The proposed solution does not produce the required result.

Page 17 of 17