Beruflich Dokumente
Kultur Dokumente
For the
CODE: CSYS2408
INSTRUCTIONS:
1 2 2. Several factors may cause PC failures. Which of the following are non-human factors to
could result in the malfunctioning of PCs?
A. Magnetism
B. Spills
C. Ignorance
D. Errors
2 3 5. Which of the following is not a key trait to be considered when selecting security system
designs?
A. Minimalism
B. Professionalism
C. Simplicity
D. Usability
C. i and iv
D. ii and iv
3 12 9. A free and open source network intrusion prevention system (NIPS) and network
intrusion detection system (NIDS) created by Martin Roesch in 1998:
A. Snort
B. Fragroute
C. Novabench
D. Sguil
3 12 10. A network packet fragmentation & firewall testing tool that was created with the ability
to take traffic destined for a particular host and intercept, modify, and/or rewrite it:
A. Snort
B. Fragroute
C. Novabench
D. Sguil
9 12. Security issues come in many different forms. Which of the following BEST describes
2
the goal for information security?
A. Confidentiality, authentication and integrity
B. Acceptable, confidential, reliable
C. Authorization, authentication, integrity
D. Available, interesting, confidential
Unit Objective
2 6 13. ‘Brutus’, ‘Pandora’ and ‘NTFSDOS Professional’ are all examples of which of the
following:
A. Nondestructive hacking systems
B. Organizational policies
C. Hacking techniques
D. Intrusion detection systems
2 6
14. To prevent this simple, but effective, security attack, experts recommend that you shield
paperwork or your keypad from view by using your body or cupping your hand.
A. Rootkit
B. Smurf Attack
C. Wa driving
D. Shoulder Surfing
2 10 15. This denial of service attack sends a ping message addressed to an IP broadcast address.
Enough pings and resultant echoes can flood the network and make it unusable for real
traffic.
A. Rootkit
B. Smurf Attack
C. Wa driving
D. Shoulder Surfing
3 12 16. A solution designed to detect unauthorized user activities, attacks, and network
compromises:
A. Intrusion prevention system
B. Network access protection
C. Intrusion detection system
D. Unified threat management
3 5 18. All of the following are basic node types in Fault Tree Analysis EXCEPT?
A. Basic Event (BE)
B. Gate Event (GE)
C. Condition Event (CE)
D. Transitional Event (TE)
2 10 20. The attempt to obtain sensitive information such as usernames, passwords, and credit
card details (and, indirectly, money), often for malicious reasons, by disguising as a
trustworthy entity in an electronic communication:
A. Hacking
B. Phishing
C. Cracking
D. Spoofing
1 3 21. A backup of all changes made since the last backup that is fast and efficient:
A. Incremental Backup
B. Mirror Backup
C. FTP Backup
D. Differential Backup
3 2 22. An error screen displayed on a Windows computer system after a fatal system error:
A. Blue Screen of Death
B. Troubleshooting window
C. Black Screen of Death
D. Challenge Window of System
2 4 23. The practice of testing a computer system, network or Web application to find
vulnerabilities that an attacker could exploit.
A. Legal Scamming
B. Smart Hacking
C. Virtual Cracking
D. Ethical Hacking
1 2 24. A client takes a computer to you that was dropped while running. This has resulted in a
failure of the electric motor or the drive itself - the moving parts. What type of hard disk
failure is this?
A. Chemical
B. Logical
C. Mathematical
D. Physical
1 2 25. A logical hard disk failure may occur due to all of the following EXCEPT:
A. Dropping a system that in turned on
B. Accidentally deleted an important registry entry
C. Formatting the drive improperly
D. Getting a virus
Unit Objective
1 6
26. RAID uses disk striping to distribute and store data across multiple physical drives.
Which of the following would you use to spread the data across all the disk drives in a
RAID group without parity?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
1 6 29. Which of the following RAID levels uses dedicated parity disk?
A. RAID 1
B. RAID 2
C. RAID 3
D. RAID 4
2 10 30. A client/server protocol that automatically provides an Internet Protocol (IP) host with its
IP address and other related configuration information such as the subnet mask and
default gateway.
A. DHCP
B. NTFS
C. FTA
D. Tracer T
2 10 31. An IP address which is assigned by a network when it connects and changes over time:
A. Logical IP address
B. Dynamic IP address
C. Static IP address
D. Physical IP address
2 11 32. A type of filter that operates at the router and compare each packet received to a set of
established criteria (such as allowed IP addresses, packet type, port number, etc.) before
being either dropped or forwarded.
A. Circuit-level gateways
B. Packet-filtering firewall
C. Proxies
Unit Objective
D. Multilayer inspection firewall
2 6 33. The file system that the Windows NT operating system uses to store and retrieve files on
a hard disk.
A. UMFS
B. VFAT
C. NTFS
D. HPFS
11
34. A computer that contains a database of public IP addresses and their associated
2 hostnames, and serves to resolve, or translate, those common names to IP addresses as
requested.
A. DNS server
B. FTP server
C. Application server
D. Net server
35. A network administration command-line tool use by to query the Domain Name System
2 6 (DNS) to obtain domain name or IP address mapping or for any other specific DNS
record.
A. Ping
B. Tracer T
C. NS lookup
D. Pinging T
2 36. A policy that identifies legitimate users of computers and network resources and what
8
they are permitted to use those resources for.
A. Remote Access Policy
B. Acceptable Use Policy
C. Network Connectivity Policy
D. Privacy Policy
2 11 37. An encryption method in which the key is published for anyone to use and encrypt
messages. However, only the receiving party has access to the decryption key that
enables messages to be read.
A. Symmetric Key
B. Private Key
C. Pseudo Key
D. Public Key
4 38. A way for your business to manage their computing resources online:
1
A. Parallel processing
B. Cloud computing
C. Virtual machine
D. Cluster computing
Unit Objective
4 1 39. An approach used to limit costs in business by reducing the need for physical hardware
systems; reducing the quantities of hardware and associated maintenance costs, and
reduces power and cooling demand.
A. Parallel processing
B. Cloud computing
C. Virtual machine
D. Cluster computing
2 40. A command used to display information that you can use to diagnose Domain Name
6
System (DNS) infrastructure:
A. Ping 127.0.0.1
B. Tracer T
C. Ping
D. NS Lookup
Unit Objective SECTION B
[Question 3]
2 a. Explain the term ‘Ethical Hacker’ (2 marks)
b. Identify and briefly explain THREE key traits to be considered when choosing security
systems (3 marks)
c. Identify FIVE hacking techniques used to gain entry to computer resources (15 marks)
[Question 4]
3 a. Explain the terms ‘fault tolerant network’ and ‘baseline’(4 marks)
b. With appropriate examples, briefly describe how ANY FOUR Human and FOUR Non-
human faults could affect a network (8 + 8marks)
COUNCIL OF COMMUNITY COLLEGES OF JAMAICA
DEGREE EXAMINATIONS
PROGRAMME:
COURSE NAME:
CODE:
YEAR GROUP:
DATE:
TIME:
DURATION: 3 HOURS
EXAMINATION TYPE: FINAL
Solutions
Section A
1 B 11 D 21 D 31 B
2 A 12 A 22 A 32 B
3 D 13 C 23 D 33 C
4 C 14 D 24 D 34 A
5 B 15 B 25 A 35 C
6 D 16 C 26 A 36 B
7 C 17 D 27 B 37 D
8 B 18 D 28 C 38 B
9 A 19 A 29 C 39 C
10 B 20 B 30 A 40 D
Section B
[Question 1]
c. Outline and explain TWO suitable techniques to safeguarg against the above-mentioned
PC risks (8 marks)
Including (Use surge protectors, UPS, Fault tolerant computers, etc.)
[Question 2]
a. Briefly describe FOUR ways that could contribute to hard disk failure: (8 marks)
- Firmware corruption- The smallest mistake in firmware modification can result in
total data loss and zero chance for recovery.
- Electronic failure - Failure of the hard drive’s printed circuit board (PCB) can result
in the hard drive not powering up at all.
- Mechanical/Physical failure- A drive with a physical failure will often fail to be seen
by the computer and often make a clicking sound, or no sound at all.
- Logical corruption- This implies that the physical components of the hard drive are
functioning correctly, however there is damage to the logical (software) part of the
drive.
b. Outline FIVE strategies that could be used to recover from a hard disk failure (12 marks)
Answer could include Data backup, RAID, Active hard-drive protection, etc
[Question 3]
a. Explain the term ‘Ethical Hacker’ (2 marks)
b. Identify and briefly explain THREE key traits to be considered when choosing security
systems (3 marks)
c. Identify FIVE hacking techniques used to gain entry to computer resources (15 marks)
[Question 4]
a. Explain the terms ‘fault tolerant network’ and ‘baseline’(4 marks)
b. With appropriate examples, briefly describe how ANY FOUR Human and FOUR Non-
human faults could affect a network (8 + 8marks)