Vous êtes sur la page 1sur 8

1

Facully of Econonsics and Social


Sciences

EXAM ASSIGNMENT

Course: IS204—Information Resource Operations, multiple choice

Lecturer: Arne B. Mikalsen

Class: Bachelor IT and Date: 16 March 2012 Exam period, from-to: 0900—1000
information s stems

The exam assignment No pages: No exercises: No attachments:


consistof 7 incl. frontpage 30 I (answer sheet)

Permissibleaids are: Writing materials (pen) and an approved calculator

STUDENTMUST MAKE SURE THE EXAMIS COMPLETE


This examination must be answered within 60 minutes. There are a total of 30 tasks.
Remember to allocate time and think that you only have two minutes on each task.
Rules / requirements for examination
For each question there are four options. It is one (and only one) correct option for each task.
The exam counts 30% of the total grade, and you will get the result back in terms of number
of points and a grade (A - F).
The correct answer gives three points, while incorrect answers give minus one point. If you
choose not to put any check, you get zero points. If you check two or more boxes, these will
be judged the same way.
Example: If you check two altematives, and one of these is correct, you get 2 points. If both
are wrong, you get minus 2 points.
You select your options by ticking the answer sheet to finish the task set. You must therefore
tear off this sheet, write your candidate number and hand it in.
Remember to write your candidate number on the check sheet.

Part 1 Introduction questions


- - 3 questions
Question 1 - Which of these statements is true about Ethernet?
Ethernet has the capacity of either either 11 or 54 Mbps.
Since Ethernet is a standard for shared network, it is not possible to use switches in
Ethernet networks.
When purchasing network interface cards, you do not need to know if you use
Ethernet or other network standards. Network cards support all standards.
Ethernet can combine multiple speeds on the same network.

Question 2 - Which of the following classffications of local area network says something
about the network's size?
WLAN
VLAN
SAN
WAN

Question 3 - What is a MAN (Metropolitan Area Network)?


MAN is only used in wireless networks to connect two networks that are located far
from each other.
MAN is a network that covers an area ranging between about 5 - 100 km.
MAN is a network technology —an alternative to Ethernet.
MAN is a method to divide the network into separate (virtual) network.

Page 2
Part 2 - Hardware components - 6 questions

Oppgave 4 —Which of the following PCI technologies is able to deliver the most effective
data rate?
PCI Express
Conventional PCI
PCI 3.0
PCI-X

Question 5 - What is meant by speed 100 mbps (on a network card, for example) on an
Ethernet?
This means that the rate of all communication is always running 100 megabits per
second.
It means that the rate of all communication is always running 100 megabytes per
second.
It means that speed is a maximum of 100 megabits per second
It means that speed is a maximum of 100 megabytes per second

Question 6 - Which of these statements is true about SCSI?


In general, the IDE standards are better suited for use in local networks than the
SCSI standards.
If the S-ATA standard is as fast as SCSI, we might as well use it in a server.
SCSI can only be used in servers, not workstations.
A SCSI controller can handle disks, CD-ROM and other I/0 devices on the same
controller.
Question 7 - The original SCSI-1 has a width of 8 bits and is running at clock frequency
of 5 MHz. Which of the following statements is true?
SCSI-1 has a capacity of 5 Mbps (megabits per second).
Fast Wide SCSI has a capacity of 160 Mbps (megabits per second).
Ultra SCSI has a capacity of 80 Mbps (megabits per second).
Ultra 320 SCSI has a capacity of 1280 Mbps (megabits per second).

Question 8 —Which of the following statements about memory (RAM) is true?


DDR SDRAM is slower than traditional SDRAM.
If it says DDR PC2000, it means that the memory chip has 2000 active transistors.
DDR3 uses a bus width of 64 bits
FPM RAM is the most recent RAM technology

Exercise 9 —What is a blade server?


It is a version in the Windows 2008 Server family.
It is one of the servers to be located in a rack.
It is a server technology where common components, like power supply and fans are
located in the chassis. This gives simpler and cheaper servers.
A blade server is a backup server.

Page 3
Part 3 - Local area network design - 8 questions
Question 10 What do we mean by the term topology in local area network theory?
-

Topology is a measure of capacity in the network.


Topology tells us how the network is physically laid out.
Topology is another name for switched networks.
Topology defines the storage technology used in the network.

Question 11 - Which of the following statements is true about networks that use only
hubs for connecting components?
We have a shared network
We have a switched network
We will have a more secure network than if a user switches
It is possible to use VLAN in this type of network

Question 12 - What is correct about interconnection components?


A hub operates at layer 2 of the OSI model and therefore typically work on the MAC
address level.
A bridge can't see any address types types, but passes everything further on.
A router operates at layer 3 of the OSI model and therefore typically works on the IP
address level.
A network of 10 computers connected by coaxial cables will work slower and less
efficient than a network with 10 computers connected together with a 10 Mbps hub.

Question 13 - Which of the following standards represent a wireless network standard,


saying something about the speed / frequency WLAN network can run?
802.11c
802.11g
802.11q
802.11w

Question 14 - What is 802.111?


A standard for wireless networks (like 802.11a, b, g and n).
A standard for "roaming" in wireless networks
A standard for security in wireless networks
A standard for "bridging" in the wireless network

Question 15 - Why is it only possible to only use a limited number of channels in the
802.11 WLAN?
Because a base station does not have the hardware to handle more than one channel.
Because the channel separation is too poor for all channels to be used.
Because the base station only has defined three channels.
Because it is not possible to encrypt multiple channels simultaneously.

Question 16 - What is 802.11i?


A standard for wireless networks (like 802.11a, b, g and n).
A standard for "roaming" wireless networks
A standard for security in wireless networks
A standard for "bridging" in the wireless network

Page 4
Question 17 - What is VLAN?
VLAN is a term used to indicate that the network is of medium size / extent.
A VLAN can divide the network into several separate networks (virtual networks)
on the same switch.
VLAN is a network where all devices communicate wireless.
VLAN is a name of a safety standard in Windows networks.

Part 4 - Local Network Operating Systems - 4 questions


Question 18 - Why do we spread the parity information across all the disks in RAID
leyel 5?
Because we want as good security as possible, and if a parity disk crashes, the entire
network goes down.
Because it speeds up reading from the system by being able to read incorrect data
from all disks.
Because it speeds up the writing to the system since the bottleneck of writing parity
data is gone.
Because it provides better storage capacity than storing all the parity data to one
disk.

Question 19 - Which of the following measures for increased fault tolerance in the
network?
Fast SCSI disk
RAID 0
RAID 5
Striping of data

Question 20 - Why is I/O optimizing so important in networks?


Because it provides better security since it secures that files are not passed to third
parties.
Because a file server is working a lot with I/O.
Because a server is working with heavy calculations.
I/0 optimization is not more important than other things in normal network.

Question 21 - Which of these methods / hardware components can not be called I / 0


optimization?
A lot of RAM so that it becomes much free memory cache.
Fast hard drives in the server.
Secure backup solution.
Gigabit connection to the server.

Page 5
Part 5 —Active Directory —7 questions

Question 22 - What is an Organisational Unit?


It is a Windows group (the same as a global group)
It is a way to ensure trust between domains
It is the way that Windows splits into several domains
It is an AD object that is used for organizing users.

Oppgave 23 —Hva heter katalogtjenesten til Windows 2000/2003?


NTFS
Active Directory
LDAP
eDirectory

Question 24 - What is a domain?


A domain is defined by the fact that there is at least one domain controller that keeps
track of users and groups.
A domain is defined by the fact that there is at least a "member server" that keeps
track of users and groups.
All machines that are members of a domain must be on the same IP segment (the
same default gateway and netmask).
A domain is another name for a server in Windows network.

Question 25 - What does "Windows 2000 mixed mode" mean?


This means that there are many servers on the network
This means that it allows for other servers than Windows 2000/2003
It means that a mixture of local and global groups is allowed
That means that some servers use NTFS while others use the FAT file system

Question 26 - Which file systems should be set up for a Windows Server?


One should always set up the server with NTFS
FAT
FAT or NTFS - it does not matter
Secure File System.

Question 27 - Which of the following statements is true of groups in Windows 2000/2003


(mixed mode)?
Local groups can only contain users as memberss
Global groups can contain other global groups as members
It is considered good practice to add global groups as members of local groups
We usually give rights to resources (such as printers or shared folders) from global
groups

Page 6
Question 28 —Which of the following statements is true about sharing (sharing)?
It is only possible to share files, not other resources (such as printers or directories)
There are no rights associated with sharing
If a directory is supposed to be available from a connected workstation, it must be
shared
It is not customary to share a file with "Full Control" to all users in a Windows
network (this is considered a major security risk, and are therefore usually not).

Part 6 - Security - 2 questions


Question 29 - What is logical security?
Logical security means using common sense, and not being paranoid in relation to
security measures.
Logical security is to secure rooms with servers, so that they are not available for
access (such as locks and alarms).
Logical security is to have measures to stop the attack of the network via cables
(electronic).
Logical security is a firewall method.

Question 30 - What do we mean by the top corner of the security triangle (integrity)?
That one is sure that the information is correct and that the source of information is
as specified.
That one is a sure that no unauthorized persons get access to the information.
The extent to which information is available.
That one is a sure that information does not harm the business.

Page 7
Attachment: Answer sheet. Candidat number: .

Check the correct boxes to mark your answers in the table below.

Oppg a) b) c) d) Oppg a) b) c) d)
1 16
2 17
3 18
4 19
5 20
6 21
7 22
8 23
9 24
10 25
11 26
12 27
13 28
14 29
15 30

Page 8

Vous aimerez peut-être aussi