You are on page 1of 5

Pages: 5

Student ID number: Questions: 27


____________________

UNIVERSITY OF TASMANIA

EXAMINATIONS FOR
DEGREES AND DIPLOMAS

November 2016

KIT501 ICT Systems Administration Fundamentals

Examining Lecturer: Dr Joel Scanlan

Time Allowed: Three (3) hours

Reading Time: FIFTEEN (15) minutes

Instructions:
This examination has 3 sections that provide 180 marks. Please write your answers
in the answer book provided.

Attempt all 15 questions from Section A. Each question in this section is worth 2
marks. This section should take you about 30 minutes.

Attempt all 7 questions from Section B. Each question in this section is worth 10
marks. This section should take you about 70 minutes.

Attempt 4 questions (of the 5 presented) in Section C. Each question in this section is
worth 20 marks. This section should take you about 80 minutes.
KIT501 ICT Systems Administration Fundamentals -2-
SECTION A
Attempt all 15 questions from Section A. Each question in this section is worth 2 marks.
This section should take you about 30 minutes.

The following questions are based on the ICT Architecture and Operating Systems
part of the course

Question 1
Using 2s complement representation, what is the binary representation for -17
(negative seventeen)?
[2 marks]
Question 2
What is the purpose of the ALU within a CPU?
[2 marks]
Question 3
Name two types of information stored in the Process Control Block.
[2 marks]
Question 4
What is the result of the following bitwise expression?
((NOT 1001011) XOR 0101100) OR (0001111 AND 1101100)
[2 marks]
Question 5
In relation to image files, what is bit-depth a measure of?
[2 marks]
Question 6
What is the OS kernel?
[2 marks]

The following questions are based on the Data Networks and Security part of the
course

Question 7
What is the main security goal of sending a message encrypted with a Symmetric
algorithm?
[2 marks]
Question 8
How many host computers can be addressed in a /28 network?
[2 marks]
Question 9
What is the dotted-decimal value of the wildcard mask for 192.168.10.0/29 when
used in OSPF routing?
[2 marks]
Question 10
Name a distance vector routing protocol?
[2 marks]
Question 11
The TCP handshake is started by a simple request packet with a particular flag (or
bit) set in the header. What is that flag called?
[2 marks]
Question 12
Is the IP address 192.168.10.128/25 a valid host address? Give a reason for your
answer.
[2 marks]

Continued ..
2 of 5
KIT501 ICT Systems Administration Fundamentals -3-
Question 13
What are the four layers of the TCP model?
[2 marks]
Question 14
What is the IEEE 802.1Q protocol used for in a VLANed network?
[2 marks]
Question 15
What is the purpose of a MAC address?
[2 marks]

Section B commences on the next page

3 of 5
KIT501 ICT Systems Administration Fundamentals -4-
SECTION B
Attempt all 7 questions from Section B. Each question in this section is worth 10 marks. This
section should take you about 70 minutes.

The following questions are based on the ICT Architecture and Operating Systems
part of the course

Question 16
With the aid of a diagram, describe the main components inside of a computer, and
how they connect to each other.
[10 marks]

Question 17
a) What are Device Drivers? Describe their role in relation to operating systems.
[5 marks]
b) Within a filesystem, what are Links? Define the two that are supported in
UNIX filesystems.
[5 marks]

Question 18
What is the Dining Philosophers problem illustrating? For this underlying problem,
describe the main categories of solutions.
[10 marks]

The following questions are based on the Data Networks and Security part of the
course

Question 19
The network 172.16.1.0/24 needs to be divided into six subnets. The first is
comprised of 80 computers, another three have more than 20 but less than 30 hosts
and the final two subnets have 8 and 10 hosts respectively. Explain how Variable
Length Subnet Masking (VLSM) is able to allow for efficient use of this address
space.
[10 marks]

Question 20
Define and describe the purpose of each of the layers of the OSI model.
[10 marks]

Question 21
Explain how the Address Resolution Protocol (ARP) operates, and what it achieves.
[10 marks]

Question 22
(a) Describe the purpose and operation of HMAC protocol.
[5 marks]

(b) Describe the purpose and operation of the Digital Signature protocol.
[5 marks]

Section C commences on the next page

4 of 5
KIT501 ICT Systems Administration Fundamentals -5-
SECTION C
Attempt FOUR (4) of the FIVE (5) questions from Section C. Each question is worth 20
marks. Each of these questions requires an answer of approximately a page in length.

The following questions are based on the ICT Architecture and Operating Systems
part of the course

Question 23
a) Describe what advantages paging has in memory management in relation to
how physical memory is utilised.
[10 marks]
b) Consider using demand paging for memory management. When a required
page is not in memory the memory manager generates a page fault. List the
sequence of actions taken when a page fault occurs.
[10 marks]

Question 24
List and describe the seven main components of an operating system.
[20 marks]

The following questions are based on the Data Networks and Security part of the
course

Question 25
Discuss the concept of ‘Defence in Depth’ as referred to in this unit, and describe
how it can assist the technical decisions we make in relation to our network.
[20 marks]

Question 26
In the context of a network running the RIPv1 protocol, explain the following terms

a) Auto-summarization
[8 marks]
b) Route poisoning
[4 marks]
c) Hold down time
[4 marks]
d) Split Horizon
[4 marks]

Question 27
(a) Explain how the designated router is elected by the OSPF routing protocol
when running on a broadcast multi-access network.
[8 marks]
(b) How are areas used by OSPF to limit the amount of routing information traffic
flowing through the network?
[8 marks]
(c) As part of OSPF configuration, the network command allows you to define
the networks that are allowed to participate and the area in which they reside.
Given the network 100.100.100.64/26, what is the value of the wild card mask
that should be used in the network statement?
[4 marks]

END OF PAPER

5 of 5

You might also like