Final Exam
1. How did the top-secret computing technologies developed at Bletchley Park during World-War II impact computing technology after the war:
- The computer scientists used their knowledge of electronic computers to build the first generation of general purpose computers
2. What did Alan Turing contribute to Computer Science?
- He founded the field of Artificial Intelligence
3. What was the primary reason the Colossus computer was faster than the BOMBE computer?
- The Colossus computer used vacuum tubes instead or gears and relays
4. Which of the following was the greatest weakness of store-and-forward networks like BITNET?
- If your message was behind a large message it would have to wait until the large message was completed before it was sent.
5. Which of the following is most like a “packet” on the Internet?
6. What was the original “stated” intention of the National Science Foundation Network (NSFNet)?
- To connect scientists to supercomputers
7. Given the original five-year and 15 million dollar budget of the National Science Foundation Network (NSFNet), what was the expected speed of the national NSFNet backbone?
- 56 thousand bits per second
8. Which of the following is the best explanation as to why the web was invented at CERN?
- Well-funded smart people in a culture that was open and fun
9. Which of the following is something that Robert Cailliau and Tim Berners-Lee did not do?
- Invented the first object-oriented language (WWW++)
10. Where was the first web server in America in production on December 12, 1991?
- Stanford Linear Accelerator (SLAC)
11. What protocol was commonly used during 1990-1993 to organize and find information on the Internet that did not use the world-wide-web protocols?
12. Which of the following products could be thought of as the “early ancestor of the Mozilla Firefox browser”?
13. Where was JavaScript developed at?
14. What is the purpose of the World-Wide-Web Consortium?
- Define standards for the web and avoid proprietary balkanization of the web
15. Why was the first product sold by Amazon books?
- Because there are over 3 million books in print
16. Which of the following is most similar to an Internet router?
17. About how many separate physical connections (i.e. hops) will a packet cross on the Internet as it goes from University of Michigan to Stanford University?
18. What is the value of a layered network model?
- It allows a complex design problem to be broken into smaller manageable parts
19. What is the IETF?
- It is a coordinating body where the standards that define the inner workings of the Internet are developed and published
20. Which is the lowest layer in the TCP/IP network model?
21. Which of the following is a Link Layer address?
22. Which of the following is *not* an attribute of the Internet (IP) Layer?
- It is designed to recover lost packets
23. What is the purpose of the TTL value in an IP packet?
- It ensures that a packet does not get stuck in an infinite loop in the Internet
24. Which of the following is a domain name?
25. What problem did Van Jacobson solve in TCP?
- He invented the slow-start algorithm to keep systems from overloading a slow link
26. When we talk of the protocols that move data over the Internet, we talk of TCP/IP. Which of the following is FALSE about TCP/IP?
- IP makes use of TCP as its underlying transport mechanism
27. Secure TCP (TLS) is between which two layers?
28. When you are using secure http and sending data between your computer and your bank’s computer, where is the data encrypted and decrypted?
- Encrypted in your computer and decrypted in the bank’s computer
29. Which of the following is a TCP port (such as port 80 for HTTP) most like?
30. Which of the following commands is part of the Hypertext Transport Protocol (HTTP)?
- GET
31. What is the problem with secret key distribution via the internet?
- We cannot all physically visit every web site and physically pick up a key book to work securely with that site
32. What does a cryptographic hash function do?
- It takes a block of data and computes a fixed-size bit string called the hash value
33. Which of the following is credited as one of the inventors of Public Key Cryptograhy in the 1970’s
34. Which historical figure is credited with encrypting military messages using a simple “shifted alphabet”?
35. Which of the following are the steps to sign and send a message to insure that the message came from the sender and was not modified in transit?
- Append the shared secret to the message, compute the cryptographic hash of the message + secret, send the message + cryptographic hash across the internet
36. Which of the following statements is false
- Public key encryption cannot be broken
37. What is the mathematical underpinnings of public key encryption?
38. Considering the four-layer TCP/IP model, which two layers does Secure Sockets Layer (SSL) fit between?
39. If you are sending credit card information from a coffee shop WiFi to an Internet web site and later you find your credit card information has been stolen, which is the most likely scenario as to how your information was stolen?
- You did not use secure HTTP (https) at a coffee shop with an open WiFi
Symantec Corp.
40. Which of the following would be major a warning sign that indicates lax security practices when dealing with a site where you have an ID and Pasword?
- They can send you a mail message with the password you previously used to log in if you forget it
Thanks for your information.Simply locate the best deals and costs on the web, and discover the stuff that suits you the best.
ReplyDeleteonline shopping in pakistan payment on delivery
It is not necessary to create a circuit between end points before communications can commence. skype resolver
ReplyDeleteThanks for posting this useful information for admission in Michigan Colleges. It is very informative.
ReplyDeleteHave you always dreamed of going to the university in Ivy League Michigan? Make your dream comes true with our support. IvyZen committed to creating our next generation’s leaders and achievers.
Insight – identifies the files or application that are secure or non-secure using the combined feedback of more that 175 million Norton Users to identify incoming virus, spyware , malware and proactively avert them. Sydney Complete Alarms & CCTV
ReplyDeleteThis blog resolved all my queries I had in my mind. Really helpful and supportive subject matter written in all the points. Hard to find such kind of blogs as descriptive and accountable to your doubts.
ReplyDeleteCISCO Cisco Meraki MR33
The method of execution is really impressive of writers of this blog. This team does really work hard and brings new information to its readers. I am connected with this blog very long and I am really thankful.
ReplyDeleteCisco SF350 POE
I enjoyed reading this blog. in my opinion, everything was perfectly written there as well as few small tips are also can be taken as healthy suggestion. Descriptive informative content written in this blog is very useful.
ReplyDeleteopleiding eigen bedrijf
i discovered this weblog after a long time that's clearly beneficial to allow understand unique techniques. i'm going to adopt the ones new issue to my career and thankful for this assist. canvs
ReplyDeleteI would like to know more about these suggestive points. Give me little more brief and I think they can help me. Here the mentioned points are very useful and I am definitely going to adopt in my life.cursus zelfstandig ondernemer
ReplyDeleteThanks bro.Very informative.
ReplyDeleteIt is my belief Kratom For Sale more examples of health technology controlling our lives.
ReplyDeleteAussie Broadband Speed Test
ReplyDeleteI have read all the comments and suggestions posted by the visitors for this article are very fine,We will wait for your next article so only.Thanks! screen repair for laptops
ReplyDeleteMyclassnotes: Internet History, Technology, And Security - Final >>>>> Download Now
ReplyDelete>>>>> Download Full
Myclassnotes: Internet History, Technology, And Security - Final >>>>> Download LINK
>>>>> Download Now
Myclassnotes: Internet History, Technology, And Security - Final >>>>> Download Full
>>>>> Download LINK uP
Thanks this course is so boring
ReplyDelete