0% found this document useful (0 votes)
24 views

INF2010 Semester Test October 2018

The document contains a test for an Information Systems course with multiple choice and short answer questions covering topics like computer hardware, networking, security, and enterprise architecture. The test has three sections from different lecturers with a total of 60 marks and is to be completed in 90 minutes.

Uploaded by

yamkelangwazi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

INF2010 Semester Test October 2018

The document contains a test for an Information Systems course with multiple choice and short answer questions covering topics like computer hardware, networking, security, and enterprise architecture. The test has three sections from different lecturers with a total of 60 marks and is to be completed in 90 minutes.

Uploaded by

yamkelangwazi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT OF INFORMATION SYSTEMS

Course Code & Name: INF2010S Information Systems


Module: IT Architecture
Test Date: October 2018
Test Duration: 1 ½ hrs (90 minutes)
UCT Examiners: Pitso Tsibolane; Andre Lopez; Jean-Paul
Van Belle

NOTE: THIS WAS THE 2018 SEMESTER TEST


PLEASE NOTE THAT ALL LECTURERS WERE DIFFERENT
AND THERE WERE DIFFERENCES IN COURSE CONTENT

PLEASE READ INSTRUCTIONS CAREFULLY

1. This test is closed book.

2. This test is out of 60 marks and you have one and a half hours (90 minutes) writing time.

3. Marks allocated to a question should be used as an indication of the level of details expected
for the answer.
4. You should spend no more than about 1 ½ minutes per mark allocated to a question.

5. You may write your answers in clear pencil/pen. If you wish to change an answer and have
written in pencil, erase it and re-write it.

6. Unclear and illegible answers will not be marked.

Part A: Pitso Tsibolane (25 marks)


Question A.1
Describe briefly how a Solid state drives (SSD) stores data and provide 4 reasons why it is an ideal
form of data storage [5]

Question A.2
Describe two broad categories of network transmission media. Provide 3 examples per category [5
= 1 mark for a description, ½ mark for each correct example]
Question A.3
Making reference to the OSI layers, briefly explain the functionality of the following devices in a
computer network. [6]

1. Hub
2. Switch
3. Router
Question A.4
List and discuss very briefly two disadvantages of a 2-Tier client-server architecture. [2]

Question A.5
Describe the purpose and briefly define the seven layers of the OSI model. [7]

Section B: Andre Lopez [25 marks]


B.1. Define confidentiality, integrity and availability in the context of security services. (3)
B.2. Define passive and active attacks. (2)
B.3. True or False: Key size does not influence the time it takes to break a cipher when using
brute force? (1)
B.4. What is the main difference between symmetric and asymmetric encryption? (1)
B.5. Name two ways in which asymmetric encryption can used. (2)
B.6. What problem does digital certificates solve? (1)
B.7. True or False: It is possible for a hashing algorithm to produce the same output given two
different inputs? (1)
B.8. What service is provided when encrypting a hash of a message with a symmetric key? (1)
B.9. Name a reason for applying compression after signing, but before encryption in PGP. (1)
B.10. In PGP, why do we encrypt a symmetric key, using asymmetric encryption, and send it with
the message? (1)
B.11. Name 3 types of malware. (3)
B.12. What is the purpose of bacteria? (1)
B.13. What are botnets? (1)
B.14. What is the aim of denial of service attacks? (1)
B.15. What is the difference between a Masquerader and a Misfeasor in intrusion detection? (1)
B.16. Name two ways in which an intruder can gain initial access to a network. (2)
B.17. Name two advantages of packet filtering firewalls. (2)

Section C: Jean-Paul Van Belle [10 marks]


Question C.1
Describe briefly what server virtualization is [1], what are four big advantages of server
virtualization[4] and what is one possible disadvantage [1]? [6 marks]

Question C.2
There are five main sub-architectures of enterprise architecture. The Business Architecture (how
the business is organised e.g. organisational mission, business processes, locations, structure, …) is
one of them. List and very briefly describe the other four? [4]

Good Luck!

You might also like