Professional Documents
Culture Documents
INF2010 Semester Test Sep 2019
INF2010 Semester Test Sep 2019
2. This test is out of 46 marks and you have one hour (90 minutes) writing time.
3. Marks allocated to a question should be used as an indication of the level of details expected
for the answer.
4. You should spend no more than 2 minutes per mark allocated to a question.
5. You may write your answers in clear pencil/pen. If you wish to change an answer and have
written in pencil, erase it and re-write it.
7. Answer all questions on this paper. If you need more space, make a note below the question
and refer to the back of the paper.
A.2. Computer systems use both temporary and permanent storage areas. Provide 2 examples
of each. (2 marks - ½ for each answer)
A.3. Briefly describe the different components in a client server architecture. (2 marks – 1 for
each component and its description)
2
Page
Your student number: …………………………………………..
B.1. Briefly Explain what you understand by the term packet as it is used in networking (1)
B.2. What is the purpose of a Network Interface Card (NIC) in computer networking? (1)
CIRCLE or TICK ✓ the correct answer below (True/False); DON’T USE A CROSS
B.3. One of the key differences between a LAN and a WAN is that the cost of data transfer on a
LAN is generally higher than that of data transfer on a WAN (1)
TRUE FALSE
B.4. A hub is a network device which connects two different LANs (1)
TRUE FALSE
B.7. Wireless transmission media includes cellular telephones, microwave transmission and
fibre optic transmission (1)
TRUE FALSE
B.8. The difference between the OSI reference model and the TCP/IP model is that the TCP/IP
model is a generic model mostly used to describe and explain network communication,
but the OSI model is the one mostly used in practice (1)
TRUE FALSE
3
Page
Section C: Jean-Paul Van Belle [8 marks]
C.1. Describe briefly what server virtualization is [1], what are three big advantages of server
virtualization [3] and what is one possible disadvantage [1]? [5 marks]
C.2. Give three reasons why it could be good for UCT to have an enterprise architecture. [3]
4
Page
Your student number: …………………………………………..
D.2. Name one example (each) of direct and indirect risk implications during a security attack [2]
D.3. Give one example (each) of Passive and Active attacks [2]
5
Page
D.4. Name four things that are determined/verified on a user browser during a SSL handshake? [4]
6
Page
Your student number: …………………………………………..
D.6. Give a brief definition/description of 3 types of intruders (i.e. Black, White and Grey Hackers).
[3]
D.8. What type of encryption does Kerberos use as part of its access control function? [1]
7
Page
Use this additional space to answer any questions where you had insufficient space
but mark the continuation clearly in the question space above.
8
Page