Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

DEPARTMENT OF INFORMATION SYSTEMS

Course Code & Name: INF2010S Information Systems


Module: IT Architecture
Test Date: September 2019
Test Duration: 1 ½ hrs (90 minutes)
UCT Examiners: Jean-Paul Van Belle; Mike Monson;
Joshua Mwenya; Grant Oosterwyk

PLEASE READ INSTRUCTIONS CAREFULLY

1. This test is closed book.

2. This test is out of 46 marks and you have one hour (90 minutes) writing time.

3. Marks allocated to a question should be used as an indication of the level of details expected
for the answer.

4. You should spend no more than 2 minutes per mark allocated to a question.

5. You may write your answers in clear pencil/pen. If you wish to change an answer and have
written in pencil, erase it and re-write it.

6. Unclear and illegible answers will not be marked.

7. Answer all questions on this paper. If you need more space, make a note below the question
and refer to the back of the paper.

Your name: ………………………………………………………………………………………..

Your student number: …………………………………………..


1
Page
Part A: Mike Monson (8 marks)
A.1. Name the elements of computer systems and provide examples of each (4 marks – ½ for
each element and ½ for an example of each)

A.2. Computer systems use both temporary and permanent storage areas. Provide 2 examples
of each. (2 marks - ½ for each answer)

A.3. Briefly describe the different components in a client server architecture. (2 marks – 1 for
each component and its description)
2
Page
Your student number: …………………………………………..

Part B: Joshua Mwenya (8 marks)


For questions B.1 and B.2 provide short answers. For B.3 to B.8 choose either True or False.

B.1. Briefly Explain what you understand by the term packet as it is used in networking (1)

B.2. What is the purpose of a Network Interface Card (NIC) in computer networking? (1)

CIRCLE  or TICK ✓ the correct answer below (True/False); DON’T USE A CROSS
B.3. One of the key differences between a LAN and a WAN is that the cost of data transfer on a
LAN is generally higher than that of data transfer on a WAN (1)
TRUE FALSE

B.4. A hub is a network device which connects two different LANs (1)
TRUE FALSE

B.5. Ethernet is the standard protocol of the Internet (1)


TRUE FALSE

B.6. In a peer-to-peer network, any client can also be a server (1)


TRUE FALSE

B.7. Wireless transmission media includes cellular telephones, microwave transmission and
fibre optic transmission (1)
TRUE FALSE

B.8. The difference between the OSI reference model and the TCP/IP model is that the TCP/IP
model is a generic model mostly used to describe and explain network communication,
but the OSI model is the one mostly used in practice (1)
TRUE FALSE
3
Page
Section C: Jean-Paul Van Belle [8 marks]
C.1. Describe briefly what server virtualization is [1], what are three big advantages of server
virtualization [3] and what is one possible disadvantage [1]? [5 marks]

C.2. Give three reasons why it could be good for UCT to have an enterprise architecture. [3]

4
Page
Your student number: …………………………………………..

Section D: Grant Oosterwyk [22 marks]


D.1. List two difference(s) between symmetric and asymmetric encryption? [4]

Symmetric encryption Asymmetric encryption

D.2. Name one example (each) of direct and indirect risk implications during a security attack [2]

D.3. Give one example (each) of Passive and Active attacks [2]
5
Page
D.4. Name four things that are determined/verified on a user browser during a SSL handshake? [4]

D.5. Name and define two types of malware. [4]

6
Page
Your student number: …………………………………………..
D.6. Give a brief definition/description of 3 types of intruders (i.e. Black, White and Grey Hackers).
[3]

D.7. Name the 2 types of firewalls. [2]

D.8. What type of encryption does Kerberos use as part of its access control function? [1]
7
Page
Use this additional space to answer any questions where you had insufficient space
but mark the continuation clearly in the question space above.

8
Page

You might also like