You are on page 1of 2

Select Collage

School of Technology
Network and System Administration (CoSc 3063) Final Exam Weighted 50%
Name___________________________________ ID______________ Section_____________Entry 2013
Instruction: Be sure for writing your name and school ID on the given space provided above and take care for
instructions under each parts.
Part I: For the following statements, Write True for correct statement and False for wrong on space
provided. (2pnt each)
_____1. In the creating of infrastructure, the software synchronization technique can be used to maintain a level
of uniformity in the software used around the network.
_____2. Host-to-host transport layer provides end-to-end data delivery services.
_____3. DNS is a network service that enables clients to resolve names to IP address and vice-versa.
_____4. Apache is a web server package that web server and client communicate with platform independent
Hypertext Transfer Protocol (HTTP).
_____5. The System Administration is similar to Administrative Job in an organization.
Part II: Choose the best answer and write your answer on the space provided. 2pnt each)
_____1. What is by NIS mean?
A. Network Information Service C. Allows Configuration-such as Password
B. Simple Directory Service D. Network Interface Card
_____2. What layer protocol is responsible for user and the application program support such as passwords,
resource sharing, file transfer and network management?
A. Layer 1 protocol C. Layer 4 protocol
B. Layer 7 protocol D. Layer 3 protocol
_____3. What service is used to translate domain names to IP addresses?
E. NFS B. SMB C. DNS D. NIC
_____4. Which one of the following is not the responsibilities of the Network Administrator?
A. Designing and Planning the Network C. User Management
B. Setting up the Network D. Maintaining the Network
_____5. The System Administrators’ code of ethics includes personal integrity is guardant-- ----?
A. Maintain and protect the confidentiality B. Maintain professional conduct and avoid personality
C. To ensure the necessary integrity of the systems D. Avoid conflicts of interest and Bias
_____6. Which of the following is/are NOT part/s of network administrator roles?
A. Controlling complexity C. Increase downtime
B. Improving service D. All
_____7. In the network management technologies, which is correct steps for the facilities that enabled by fault
management
A. IsolationCorrectionDetection C. CorrectionIsolationDetection
B. DetectionIsolationCorrection D. IsolationDetection Correction
_____8. In the network management technologies, the management includes except one of the following.
A. Security log C. Availability
B. Accuracy D. Response times
_____9. Which is NOT included in Top-level Domains (TLDs)
A. Generic TLDs (gTLDs) C. Country code TLDs (ccTLDs
B. Second-level Domain Name D. All
_____10.Which is/are example of Advanced BIND Features
A. Access List B. Round Robin Load Sharing C. Dynamic DNS Update D. ALL
_____11._____ is problem that causes the disclosure of sensitive information to people who should not have
access to the information.
A. Disclosure of information B. An Authorized access C. Denial of Service D. Non-Functional
_____12.___is problem that makes it difficult or impossible for the system to continue to do productive work.
A. Disclosure of information B. Denial of Service C. An Authorized access D. Non-Functional
_____13.The system administrator's security responsibilities policy may require_____
A. Every host use specific security measures C. Monitoring and accounting procedures.
B. Login banner messages D. All
_____14.The proper use of network resources includes all except one of the following
A. Define who can use network resources C. Do not care for others network
B. What things they can do. D. What things they should not do
_____15. Which of the following is/are included in security standards and levels?
A. ISO 15408 standard C. One-Time Passwords
B. Request for Comments (RFC) D. All
Part III: Fill the blink space with the correct term that fit the sentences. (2pnt each space)
1. An___________________ is sent if a problem occurs on the network whereas ___________ are sent on
a regular basis to the management station which collates & stores them.
2. _______________has become the most popular DNS server on the Internet.
3. For the DNS Namespace branches, ______________mapping of hostnames to IP addresses whereas the
_________________mapping is IP addresses to hostnames.
Bonus
1. Define One-Time Passwords (OTP) by a line of sentences (2point)

2. Distinguish the difference between Encapsulation and Disconsolation process (use 1line for each). 3point

February, 2023

Samuel M.

You might also like