Sie sind auf Seite 1von 12

Bethlehem Moravian College

For the

ASSOCIATE DEGREE EXAMINATIONS

PROGRAMME: Computer Repairs

COURSE NAME: System Administration II

CODE: CSYS2408

SUBMITTED BY: Kereen Tatham-Brown

FOR USE IN: Semester 1, 2017

SUBMITTED IN: September, 2017

INSTRUCTIONS:

SECTION A: ANSWER ALL QUESTIONS IN THIS SECTION.

SECTION B: ANSWER ANY THREE(3) QUESTIONS FROM THIS SECTION.

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO


SECTION A
Instructions: On the computerized answer sheet provided, shade the letter that corresponds
with the most appropriate response for each of the following.
Unit Objective
1 3 1. All of the following are suitable techniques to recover from system failure EXCEPT:
A. Keeping good backups of data files
B. Auditing to prevent human errors
C. Documenting all setup changes
D. Using anti-virus to protect systems

1 2 2. Several factors may cause PC failures. Which of the following are non-human factors to
could result in the malfunctioning of PCs?
A. Magnetism
B. Spills
C. Ignorance
D. Errors

3. A person who specializes in finding exploiting any vulnerabilities in a system in an


2 4 attempt to determine whether unauthorized access or other malicious activities are
possible is known as:
A. Scamming hacker
B. Smart Hacker
C. Virtual Cracker
D. Ethical Hacker
3 1
4. Which of the following BEST explains why known computer network failures are
preferably acceptable than unknown?
A. It justifies the use of diagnosis software
B. It encourages users to be aware of their surrounding
C. It can be controlled and mitigated
D. It combats attacks with packet filtering

2 3 5. Which of the following is not a key trait to be considered when selecting security system
designs?
A. Minimalism
B. Professionalism
C. Simplicity
D. Usability

1 7 6. Which two RAID types use parity for data protection?


i. RAID 1
ii. RAID 4
iii. RAID 1+ 0
iv. RAID 5
A. i and ii
B. ii and iii
Unit Objective

C. i and iv
D. ii and iv

1 7 7. What is the unique characteristic of RAID 6?


A. Distributed Parity
B. Striping
C. Two independent distributed parity
D. Mirroring
1 7
8. What is the minimum number of disks required for RAID1?
A. 1
B. 2
C. 4
D. 5

3 12 9. A free and open source network intrusion prevention system (NIPS) and network
intrusion detection system (NIDS) created by Martin Roesch in 1998:
A. Snort
B. Fragroute
C. Novabench
D. Sguil

3 12 10. A network packet fragmentation & firewall testing tool that was created with the ability
to take traffic destined for a particular host and intercept, modify, and/or rewrite it:
A. Snort
B. Fragroute
C. Novabench
D. Sguil

1 10 11. All of the following are covered by internal auditing EXCEPT:


A. Checking whether security environments are in compliance with policies and
design criteria
B. Checking employee and contractor lists against authentication and authorization
databases
C. Making physical checks on machine rooms, wiring, and telecom closets for
foreign devices
D. Checking for baseline of fault tolerance network

9 12. Security issues come in many different forms. Which of the following BEST describes
2
the goal for information security?
A. Confidentiality, authentication and integrity
B. Acceptable, confidential, reliable
C. Authorization, authentication, integrity
D. Available, interesting, confidential
Unit Objective

2 6 13. ‘Brutus’, ‘Pandora’ and ‘NTFSDOS Professional’ are all examples of which of the
following:
A. Nondestructive hacking systems
B. Organizational policies
C. Hacking techniques
D. Intrusion detection systems
2 6
14. To prevent this simple, but effective, security attack, experts recommend that you shield
paperwork or your keypad from view by using your body or cupping your hand.
A. Rootkit
B. Smurf Attack
C. Wa driving
D. Shoulder Surfing

2 10 15. This denial of service attack sends a ping message addressed to an IP broadcast address.
Enough pings and resultant echoes can flood the network and make it unusable for real
traffic.
A. Rootkit
B. Smurf Attack
C. Wa driving
D. Shoulder Surfing

3 12 16. A solution designed to detect unauthorized user activities, attacks, and network
compromises:
A. Intrusion prevention system
B. Network access protection
C. Intrusion detection system
D. Unified threat management

3 5 17. Which of the following is a misconception about Fault Tree Analysis?


A. Visual Model
B. Probability Model
C. Combines hardware, software, environment and human interaction
D. Hazard Analysis

3 5 18. All of the following are basic node types in Fault Tree Analysis EXCEPT?
A. Basic Event (BE)
B. Gate Event (GE)
C. Condition Event (CE)
D. Transitional Event (TE)

3 7 19. A control measurement of a system being tested is know as:


A. Baseline
B. PassMark
C. Encryption
Unit Objective
D. Authentication

2 10 20. The attempt to obtain sensitive information such as usernames, passwords, and credit
card details (and, indirectly, money), often for malicious reasons, by disguising as a
trustworthy entity in an electronic communication:
A. Hacking
B. Phishing
C. Cracking
D. Spoofing

1 3 21. A backup of all changes made since the last backup that is fast and efficient:
A. Incremental Backup
B. Mirror Backup
C. FTP Backup
D. Differential Backup

3 2 22. An error screen displayed on a Windows computer system after a fatal system error:
A. Blue Screen of Death
B. Troubleshooting window
C. Black Screen of Death
D. Challenge Window of System

2 4 23. The practice of testing a computer system, network or Web application to find
vulnerabilities that an attacker could exploit.
A. Legal Scamming
B. Smart Hacking
C. Virtual Cracking
D. Ethical Hacking

1 2 24. A client takes a computer to you that was dropped while running. This has resulted in a
failure of the electric motor or the drive itself - the moving parts. What type of hard disk
failure is this?
A. Chemical
B. Logical
C. Mathematical
D. Physical

1 2 25. A logical hard disk failure may occur due to all of the following EXCEPT:
A. Dropping a system that in turned on
B. Accidentally deleted an important registry entry
C. Formatting the drive improperly
D. Getting a virus
Unit Objective

1 6
26. RAID uses disk striping to distribute and store data across multiple physical drives.
Which of the following would you use to spread the data across all the disk drives in a
RAID group without parity?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6

1 6 27. Which RAID level is also known as 'Disk Mirroring'?


A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6

3 2 28. The ability of systems to continue to function despite a disaster:


A. Disaster Recovery
B. Backup
C. Fault Tolerance
D. Fault Prevention

1 6 29. Which of the following RAID levels uses dedicated parity disk?
A. RAID 1
B. RAID 2
C. RAID 3
D. RAID 4

2 10 30. A client/server protocol that automatically provides an Internet Protocol (IP) host with its
IP address and other related configuration information such as the subnet mask and
default gateway.
A. DHCP
B. NTFS
C. FTA
D. Tracer T

2 10 31. An IP address which is assigned by a network when it connects and changes over time:
A. Logical IP address
B. Dynamic IP address
C. Static IP address
D. Physical IP address

2 11 32. A type of filter that operates at the router and compare each packet received to a set of
established criteria (such as allowed IP addresses, packet type, port number, etc.) before
being either dropped or forwarded.
A. Circuit-level gateways
B. Packet-filtering firewall
C. Proxies
Unit Objective
D. Multilayer inspection firewall

2 6 33. The file system that the Windows NT operating system uses to store and retrieve files on
a hard disk.
A. UMFS
B. VFAT
C. NTFS
D. HPFS

11
34. A computer that contains a database of public IP addresses and their associated
2 hostnames, and serves to resolve, or translate, those common names to IP addresses as
requested.
A. DNS server
B. FTP server
C. Application server
D. Net server

35. A network administration command-line tool use by to query the Domain Name System
2 6 (DNS) to obtain domain name or IP address mapping or for any other specific DNS
record.
A. Ping
B. Tracer T
C. NS lookup
D. Pinging T
2 36. A policy that identifies legitimate users of computers and network resources and what
8
they are permitted to use those resources for.
A. Remote Access Policy
B. Acceptable Use Policy
C. Network Connectivity Policy
D. Privacy Policy
2 11 37. An encryption method in which the key is published for anyone to use and encrypt
messages. However, only the receiving party has access to the decryption key that
enables messages to be read.
A. Symmetric Key
B. Private Key
C. Pseudo Key
D. Public Key

4 38. A way for your business to manage their computing resources online:
1
A. Parallel processing
B. Cloud computing
C. Virtual machine
D. Cluster computing
Unit Objective

4 1 39. An approach used to limit costs in business by reducing the need for physical hardware
systems; reducing the quantities of hardware and associated maintenance costs, and
reduces power and cooling demand.
A. Parallel processing
B. Cloud computing
C. Virtual machine
D. Cluster computing

2 40. A command used to display information that you can use to diagnose Domain Name
6
System (DNS) infrastructure:
A. Ping 127.0.0.1
B. Tracer T
C. Ping
D. NS Lookup
Unit Objective SECTION B

Instructions: Answer any FOUR (4) questions from this section.


1 [Question 1]

a. Briefly describe the difference between preventative maintenance and reactive


maintenance (4 marks)
b. Identify FOUR factors that may cause System failures (8 marks)
c. Outline and explain TWO suitable techniques to safeguarg against the above-mentioned
PC risks (8 marks)
1
[Question 2]
a. Briefly describe FOUR ways that could contribute to hard disk failure: (8 marks)
b. Outline FIVE strategies that could be used to recover from a hard disk failure (12 marks)

[Question 3]
2 a. Explain the term ‘Ethical Hacker’ (2 marks)
b. Identify and briefly explain THREE key traits to be considered when choosing security
systems (3 marks)
c. Identify FIVE hacking techniques used to gain entry to computer resources (15 marks)

[Question 4]
3 a. Explain the terms ‘fault tolerant network’ and ‘baseline’(4 marks)
b. With appropriate examples, briefly describe how ANY FOUR Human and FOUR Non-
human faults could affect a network (8 + 8marks)
COUNCIL OF COMMUNITY COLLEGES OF JAMAICA

DEGREE EXAMINATIONS

SEMESTER II – 2017 MAY

PROGRAMME:
COURSE NAME:
CODE:
YEAR GROUP:
DATE:
TIME:
DURATION: 3 HOURS
EXAMINATION TYPE: FINAL

Solutions

Section A

1 B 11 D 21 D 31 B
2 A 12 A 22 A 32 B
3 D 13 C 23 D 33 C
4 C 14 D 24 D 34 A
5 B 15 B 25 A 35 C
6 D 16 C 26 A 36 B
7 C 17 D 27 B 37 D
8 B 18 D 28 C 38 B
9 A 19 A 29 C 39 C
10 B 20 B 30 A 40 D
Section B

[Question 1]

a. Briefly describe the difference between preventative maintenance and reactive


maintenance (4 marks)
Reactive maintenance focuses on repairing system when failure occurs. Preventative
maintenance, however, focuses on avoiding repairs and system failure through preventive
and predictive methods.

b. Identify FOUR factors that may cause System failures (8 marks)


A system failure can occur because of a hardware failure or a severe software issue,
causing the system to freeze, reboot, or stop functioning altogether. Human factors
include human error (accidental changes to system configurations); non-human factors
might include dust, electricity problems, etc. other factors include aging hardware,
natural disasters, etc.

c. Outline and explain TWO suitable techniques to safeguarg against the above-mentioned
PC risks (8 marks)
Including (Use surge protectors, UPS, Fault tolerant computers, etc.)

[Question 2]
a. Briefly describe FOUR ways that could contribute to hard disk failure: (8 marks)
- Firmware corruption- The smallest mistake in firmware modification can result in
total data loss and zero chance for recovery.
- Electronic failure - Failure of the hard drive’s printed circuit board (PCB) can result
in the hard drive not powering up at all.
- Mechanical/Physical failure- A drive with a physical failure will often fail to be seen
by the computer and often make a clicking sound, or no sound at all.
- Logical corruption- This implies that the physical components of the hard drive are
functioning correctly, however there is damage to the logical (software) part of the
drive.

b. Outline FIVE strategies that could be used to recover from a hard disk failure (12 marks)
Answer could include Data backup, RAID, Active hard-drive protection, etc

[Question 3]
a. Explain the term ‘Ethical Hacker’ (2 marks)
b. Identify and briefly explain THREE key traits to be considered when choosing security
systems (3 marks)
c. Identify FIVE hacking techniques used to gain entry to computer resources (15 marks)

[Question 4]
a. Explain the terms ‘fault tolerant network’ and ‘baseline’(4 marks)
b. With appropriate examples, briefly describe how ANY FOUR Human and FOUR Non-
human faults could affect a network (8 + 8marks)

Das könnte Ihnen auch gefallen