Thursday, July 30, 2015

Internet History, Technology, and Security - Final

Final Exam

1. How did the top-secret computing technologies developed at Bletchley Park during World-War II impact computing technology after the war:
  • The computer scientists used their knowledge of electronic computers to build the first generation of general purpose computers
2. What did Alan Turing contribute to Computer Science?
  • He founded the field of Artificial Intelligence

3. What was the primary reason the Colossus computer was faster than the BOMBE computer?
  • The Colossus computer used vacuum tubes instead or gears and relays
  • banner
4. Which of the following was the greatest weakness of store-and-forward networks like BITNET?
  • If your message was behind a large message it would have to wait until the large message was completed before it was sent.


5. Which of the following is most like a “packet” on the Internet?
  • A postcard
6. What was the original “stated” intention of the National Science Foundation Network (NSFNet)?
  • To connect scientists to supercomputers
7. Given the original five-year and 15 million dollar budget of the National Science Foundation Network (NSFNet), what was the expected speed of the national NSFNet backbone?
  • 56 thousand bits per second
8. Which of the following is the best explanation as to why the web was invented at CERN?
  • Well-funded smart people in a culture that was open and fun
9. Which of the following is something that Robert Cailliau and Tim Berners-Lee did not do?
  • Invented the first object-oriented language (WWW++)
10. Where was the first web server in America in production on December 12, 1991?
  • Stanford Linear Accelerator (SLAC)
11. What protocol was commonly used during 1990-1993 to organize and find information on the Internet that did not use the world-wide-web protocols?
  • Gopher
12. Which of the following products could be thought of as the “early ancestor of the Mozilla Firefox browser”?
  • NCSA Mosaic
13. Where was JavaScript developed at?
  • Netscape
14. What is the purpose of the World-Wide-Web Consortium?
  • Define standards for the web and avoid proprietary balkanization of the web
15. Why was the first product sold by Amazon books?
  • Because there are over 3 million books in print
16. Which of the following is most similar to an Internet router?
  • A train station
17. About how many separate physical connections (i.e. hops) will a packet cross on the Internet as it goes from University of Michigan to Stanford University?
  • 15


18. What is the value of a layered network model?
  • It allows a complex design problem to be broken into smaller manageable parts
19. What is the IETF?
  • It is a coordinating body where the standards that define the inner workings of the Internet are developed and published
20. Which is the lowest layer in the TCP/IP network model?
  • Link
21. Which of the following is a Link Layer address?
  • 00:1f:5b:81:62:e7
22. Which of the following is *not* an attribute of the Internet (IP) Layer?
  • It is designed to recover lost packets
23. What is the purpose of the TTL value in an IP packet?
  • It ensures that a packet does not get stuck in an infinite loop in the Internet
24. Which of the following is a domain name?
  • www.coursera.org
25. What problem did Van Jacobson solve in TCP?
  • He invented the slow-start algorithm to keep systems from overloading a slow link
  • banner
26. When we talk of the protocols that move data over the Internet, we talk of TCP/IP. Which of the following is FALSE about TCP/IP?
  • IP makes use of TCP as its underlying transport mechanism
27. Secure TCP (TLS) is between which two layers?
28. When you are using secure http and sending data between your computer and your bank’s computer, where is the data encrypted and decrypted?
  • Encrypted in your computer and decrypted in the bank’s computer
29. Which of the following is a TCP port (such as port 80 for HTTP) most like?
  • A telephone extension
30. Which of the following commands is part of the Hypertext Transport Protocol (HTTP)?
  • GET
  • Find Enroll Learnbanner
31. What is the problem with secret key distribution via the internet?
  • We cannot all physically visit every web site and physically pick up a key book to work securely with that site
32. What does a cryptographic hash function do?
  • It takes a block of data and computes a fixed-size bit string called the hash value
33. Which of the following is credited as one of the inventors of Public Key Cryptograhy in the 1970’s
  • Whitfield Diffie
34. Which historical figure is credited with encrypting military messages using a simple “shifted alphabet”?
  • Caesar
35. Which of the following are the steps to sign and send a message to insure that the message came from the sender and was not modified in transit?
  • Append the shared secret to the message, compute the cryptographic hash of the message + secret, send the message + cryptographic hash across the internet
36. Which of the following statements is false
  • Public key encryption cannot be broken
  • Testive
37. What is the mathematical underpinnings of public key encryption?
  • Prime numbers
38. Considering the four-layer TCP/IP model, which two layers does Secure Sockets Layer (SSL) fit between?
  • Application and TCP
39. If you are sending credit card information from a coffee shop WiFi to an Internet web site and later you find your credit card information has been stolen, which is the most likely scenario as to how your information was stolen?
  • You did not use secure HTTP (https) at a coffee shop with an open WiFi
  • Symantec Corp.
40. Which of the following would be major a warning sign that indicates lax security practices when dealing with a site where you have an ID and Pasword?
  • They can send you a mail message with the password you previously used to log in if you forget it

15 comments:

  1. Thanks for your information.Simply locate the best deals and costs on the web, and discover the stuff that suits you the best.
    online shopping in pakistan payment on delivery

    ReplyDelete
  2. It is not necessary to create a circuit between end points before communications can commence. skype resolver

    ReplyDelete
  3. Thanks for posting this useful information for admission in Michigan Colleges. It is very informative.
    Have you always dreamed of going to the university in Ivy League Michigan? Make your dream comes true with our support. IvyZen committed to creating our next generation’s leaders and achievers.

    ReplyDelete
  4. Insight – identifies the files or application that are secure or non-secure using the combined feedback of more that 175 million Norton Users to identify incoming virus, spyware , malware and proactively avert them. Sydney Complete Alarms & CCTV

    ReplyDelete
  5. This blog resolved all my queries I had in my mind. Really helpful and supportive subject matter written in all the points. Hard to find such kind of blogs as descriptive and accountable to your doubts.
    CISCO Cisco Meraki MR33

    ReplyDelete
  6. The method of execution is really impressive of writers of this blog. This team does really work hard and brings new information to its readers. I am connected with this blog very long and I am really thankful.
    Cisco SF350 POE

    ReplyDelete
  7. I enjoyed reading this blog. in my opinion, everything was perfectly written there as well as few small tips are also can be taken as healthy suggestion. Descriptive informative content written in this blog is very useful.
    opleiding eigen bedrijf

    ReplyDelete
  8. i discovered this weblog after a long time that's clearly beneficial to allow understand unique techniques. i'm going to adopt the ones new issue to my career and thankful for this assist. canvs

    ReplyDelete
  9. I would like to know more about these suggestive points. Give me little more brief and I think they can help me. Here the mentioned points are very useful and I am definitely going to adopt in my life.cursus zelfstandig ondernemer

    ReplyDelete
  10. Thanks bro.Very informative.

    ReplyDelete
  11. It is my belief Kratom For Sale more examples of health technology controlling our lives.  

    ReplyDelete
  12. I have read all the comments and suggestions posted by the visitors for this article are very fine,We will wait for your next article so only.Thanks! screen repair for laptops

    ReplyDelete
  13. Myclassnotes: Internet History, Technology, And Security - Final >>>>> Download Now

    >>>>> Download Full

    Myclassnotes: Internet History, Technology, And Security - Final >>>>> Download LINK

    >>>>> Download Now

    Myclassnotes: Internet History, Technology, And Security - Final >>>>> Download Full

    >>>>> Download LINK uP

    ReplyDelete
  14. Thanks this course is so boring

    ReplyDelete