BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT. March 2018 PRINCIPLES OF INTERNET TECHNOLOGIES

Similar documents
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT. March 2017 PRINCIPLES OF INTERNET TECHNOLOGIES

Birkbeck (University of London)

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES

Web Engineering (CC 552)

Shankersinh Vaghela Bapu Institue of Technology

CS164 Final Exam Winter 2013

General comments on candidates' performance

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

TCP/IP Transport Layer Protocols, TCP and UDP

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

TCP /IP Fundamentals Mr. Cantu

THE UNIVERSITY OF NEW SOUTH WALES

Computer Networks. 19 December This exam consists of 6 questions with subquestions. Every subquestion counts for 10 points.

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Alpha College of Engineering and Technology. Question Bank

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

ICS 351: Networking Protocols

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Set of IP routers. Set of IP routers. Set of IP routers. Set of IP routers

Chapter 5: Networking and the Internet

ICS 351: Today's plan. IPv6 routing protocols (summary) HTML HTTP web scripting languages certificates (review) cookies

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

CSCI Networking Name:

IT6503 WEB PROGRAMMING. Unit-I

Hands-On Ethical Hacking and Network Defense

CS WEB TECHNOLOGY

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

OSI Transport Layer. objectives

Learning Objectives: IS Infrastructure: Standards and Protocols. Standards for Representing and Communicating Information. A Unified Framework

ch02 True/False Indicate whether the statement is true or false.

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS APRIL 2015 EXAMINERS REPORT

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Web Architecture Review Sheet

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

Introduction to TCP/IP networking

Defining Networks with the OSI Model. Module 2

Load Balancing Technology White Paper

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

BSc. (Hons) Web Technologies. Examinations for 2017 / Semester 1

Application Level Protocols

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

School of Engineering Department of Computer and Communication Engineering Semester: Fall Course: CENG415 Communication Networks

Birkbeck (University of London)

Read addressing table and network map

Computer Security 3e. Dieter Gollmann. Chapter 18: 1

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

CSCI 1680 Computer Networks Fonseca. Exam - Midterm. Due: 11:50am, 15 Mar Closed Book. Maximum points: 100

Network Protocols - Revision

General comments on candidates' performance

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Network Security. Thierry Sans

WEB TECHNOLOGIES CHAPTER 1

M3-R3: INTERNET AND WEB DESIGN

Birkbeck (University of London)

Internet Control Message Protocol (ICMP)

CS Final Exam Review Suggestions - Spring 2018

9. Wireshark I: Protocol Stack and Ethernet

Last Lecture. methods. ! How to send data from end to end: two switching. ! Packet loss and delay in a packet switched network. !

Sirindhorn International Institute of Technology Thammasat University

Networks Fall This exam consists of 10 problems on the following 13 pages.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

This is CS50. Harvard College Fall Quiz 1 Answer Key

Basics of Web. First published on 3 July 2012 This is the 7 h Revised edition

Internet Architecture

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT WEB ENGINEERING

Fachgebiet Technische Informatik, Joachim Zumbrägel

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

Firewalls, Tunnels, and Network Intrusion Detection

20-CS Cyber Defense Overview Fall, Network Basics

TCP/IP Networking Basics

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2015

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

4.0.1 CHAPTER INTRODUCTION

Cisco Exam Cisco Certified Network Associate (CCNA) Version: 14.7 [ Total Questions: 653 ]

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

CPSC 441 COMPUTER COMMUNICATIONS MIDTERM EXAM SOLUTION

6. Correspondence relationship between Educational goals and Course goals

CS 161 Computer Security

NAPIER UNIVERSITY SCHOOL OF COMPUTING

Transport Layer. The transport layer is responsible for the delivery of a message from one process to another. RSManiaol

HTTP (HyperText Transfer Protocol)

Application Design and Development: October 30

4. The transport layer

Chapter 2 Advanced TCP/IP

Comp 426 Midterm Fall 2013

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Volume INFOSEC4FUN/UNIX4FUN DOCS. IT Troubleshooting Documentation. Troubleshooting the Stack

Matt Terwilliger. Networking Crash Course

Transcription:

General Comments BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT March 2018 PRINCIPLES OF INTERNET TECHNOLOGIES EXAMINERS REPORT Firstly, a gentle reminder the candidates must only use black and/or blue pen. Pencil is fine for diagrams, but it can fade. Certainly do not use red pen for any element of the exam. Please also remember to write which questions were answered on the front of the exam answer booklet. Candidates generally favoured questions from section B. This year, approximately two-thirds of candidates answered, all three questions from section B. It has been previously commented that candidates were electing to weakly answer a question in section B, rather than attempt another section A question. Better preparation for the web programming elements would improve the overall outcomes Past exam papers should be the starting point to exam preparation. A1. Given the HTML Code Section A Answer Section A questions in Answer Book A <form name="myform" onsubmit="calculateaverage();"> <p> <label for="number1"> Input 1st mark here: </label> <input type="text" size="10" name="number1" id="number1"/> </p> <p> <label for="number2"> Input 2nd mark here: </label> <input type="text" size="10" name="number2" id="number2"/> </p> <p> <label for="number3"> Input 3rd mark here: </label> 1

<input type="text" size="10" name="number3" id="number3"/> </p> <input type="submit" value="calculate"/> </form> a) Write a JavaScript function calculateaverage(), that will: - read three numbers in from the HTML form as marks - output the total mark - output the average of the three marks. The average mark must be output as a real number. (15 marks) b) Why is JavaScript validation regarded as a potential security risk? c) What measures and technologies could be put in place to mitigate this potential security risk? Answer pointers a) var mark1=document.myform.number1.value; var mark2=document.myform.number2.value; var mark3=document.myform.number3.value; var thetotal = parsefloat(mark1)+parsefloat(mark2)+parsefloat(mark3); var theaverage = parsefloat(thetotal/3); window.alert("the total mark is: "+ thetotal + " and the average is: "+ theaverage); (15 marks total) b) Javascript can be overridden or bypassed in the browser and then malicious data can be sent into your system (SQL Injection attacks for example). 2

c) Must allow for server-side validation as well as client side (javascript). Serverside validation is very secure but does not lend itself well to a good user experience whereas client-side does. Server side technologies could include asp.net or PHP. A1 Examiner's Guidance Notes This was the least attempted question in Section A. Those who did answer it, received higher marks when compared to Questions A2 and A3. In part (a), most students understood how to read in a values into variables, perform a calculation with them, and output the results. But students need to be aware of the differences between whole numbers and real numbers. In parts (b) and (c), there was a tendency to guess the answers. A2. a) Describe how CSS allows separation of content and presentation for web pages? b) Describe a CSS rule, and what it consists of. Give an example to support your answer. c) What are modules in CSS3? (7 marks) d) Describe TWO disadvantages of using CSS, from a designer s perspective. e) What does the Cascading in CSS refer to? f) Where on an HTML page should a reference to an external CSS be placed? Answer pointers a) Content can be defined on the HTML document and styled by CSS in a separate file. b) It s a statement that tells your browser how to render particular elements on a HTML page. 3

It consists of a selector (selects the elements) and a declaration block (where you layout your rules and contains a property and a value). body {color: red}; selector declaration block (1 mark) (7 marks total) c) Modules in CSS3 are various sections of CSS2 split into their own specifications. d) Different browsers interpret CSS differently this has to be taken into account. CSS has different levels can be confusing. (4 marks total) e) It refers to the cascading order in the HTML page. CSS is sorted into order and the most specific rule is chosen (cascading down). f) In between the <head> tags A2 Examiner's Guidance Notes. The most attempted question by far in this section. Generally it was not answered well. General theory about CSS was repeated without an acknowledgement of what was being asked for in all parts of the question. Students need to research CSS theory more. A3. a) What problem might be present with the DOM if jquery is executed too early? b) How could this be avoided? Provide sample JavaScript code to support your answer. c) What is the difference between well-formed XML and valid XML? d) In relation to XML Data Modelling: - model a data source intended for a bank 4

- model the account number, customer name, customer email address for each bank account that is to be held in the bank - provide XML mark-up for a bank account (10 marks) e) What does SOAP stand for and how is it used with XML? (5 marks) Answer pointers a) If you execute your jquery code too early, then the DOM may not have loaded the elements you re referring to in your scripts. So errors may occur. b) To postpone the execution of your code until the DOM is ready, we use the ready function. $(document).ready(function() { //code added here is executed when the DOM is ready }); c) Well-formed XML is a document with correct syntax An XML document validated against a DTD (Document Type Definition) is valid (and well-formed) (4 marks total) d) <?xml version="1.0" encoding="utf-8"?> <bank> <account> <name>bob Smith</name> <accountnumber>123</accountnumber> <email>b.smith@testmailuk.com</email> </account> </bank> (10 marks) e) SOAP is Simple Object Access Protocol. It is an XML-based messaging protocol for exchanging information among computers. (5 marks) A3 Examiner's Guidance Notes. The second most attempted question in Section A. Students tended to answer part (d) extremely well. However there was a lot of guess work in the answers for parts (a) and (b). In part (c), there was a broad understanding of what XML was but most 5

students could not differentiate between well-formed XML and valid XML. In regards to part (e), there needs to be a better understanding of what SOAP is. 6

Section B Answer Section B questions in Answer Book B B4. a) Expand each of the following acronyms: i) DNS ii) UDP iii) ARP iv) IP v) DHCP vi) SMTP b) Map the six protocols given in part a) above to the layers of the TCP/IP model. c) TCP is described as a connection-oriented protocol. i) Expand the acronym TCP. (1 mark) ii) iii) What is meant by the term connection-oriented in reference to TCP? Draw a diagram that illustrates how TCP establishes a connection between a client and server. You must demonstrate the threeway handshake in your answer. d) Briefly describe the role of DNS in the operation of the Internet. A diagram may be helpful. Answer Pointers a) i) DNS - Domain Name System ii) UDP - User Datagram Protocol iii) ARP - Address Resolution Protocol iv) IP - Internet Protocol v) DHCP - Dynamic Host Configuration Protocol vi) SMTP - Simple Mail Transfer Protocol b) Protocol DNS TCP/IP Layer Application Layer 7

UDP ARP IP DHCP SMTP Transport Layer Internet Layer Internet layer Application Layer Application Layer c) i) Transmission Control Protocol (1 marks) ii) A connection is established beforehand iii) A suitable and well labelled diagram that shows SYN, SYN-ACK and ACK between the client and server. For full marks client (closed->syn-sent->established) and server state (closed->listen->syn-received->established) must also be shown. e) DNS Domain Name System A suitable explanation or diagram about DNS. An answer that will get top marks will point out worldwide distributed structure, address resolution, recursion and caching. B4 Examiners Guidance Notes This style of question has been set before and nearly every candidate attempted it. It was also the most well answered question in section B. Parts a) and b) were generally well answered, with many candidates scoring at least 10 marks for these two parts. Candidates would benefit from better knowledge of common protocols and how they map to the layers of the TCP/IP model. Part c) was split in terms of answers. Some candidates answered this part exceptionally well, and provided excellent diagrams illustrating the three-way handshake. Some candidates who attempted part c)iii draw a classic client-server architecture diagram, which isn t what this question was asking. Given the importance of the three-way handshake, it is recommended that candidates cover this area more thoroughly.. Part d) is tested relatively frequently, yet many candidates failed to obtain more than a couple of marks for it. Some candidates who had a clear understanding and drew exceptionally good diagrams received high marks. B5. a) Expand the acronym HTTP. b) Briefly explain the difference between HTTP and HTTPS. (1 mark) c) HTTP is described as a stateless protocol. In this context: i) Define what stateless means. (1 marks) 8

ii) Provide THREE examples of how a web application maintains state given that HTTP is stateless. d) Briefly describe what each of the following HTTP status codes represent, and why such a status code may be returned. i) 404 ii) 200 iii) 403 iv) 500 v) 401 (10 marks) e) Read the following simplified HTTP response header, then answer the following questions HTTP/1.1 200 Date: Mon, 02 Apr 2018 13:23:19 GMT Server: Apache/1.3.29 Last-Modified: Sat, 31 Mar 2018 Content-Length: 38 Content-Type: text/html <h1>bcs</h1> <p>welcome to the BCS</p> i) Briefly explain what the Content-Length field represents? ii) What is the protocol and status code of this HTTP response header? iii) The Content-Type field in this header is text/html. What would the header be if a portable network graphics image was the Content-Type? iv) A web browser made the request that generated this response. What would be displayed by the browser? (8 marks) Answer Pointers a) HyperText Transfer Protocol (1 mark) b) HTTPS (Hypertext Transfer Protocol Secure) transmits data securely in conjunction with TLS on TCP port 443, whereas HTTP is not secured and transmit over TCP port 80 9

c) HTTP is stateless as the connection between the server and client is lost once the transaction finishes. State is maintained by, for example, using server side sessions, HTTP cookies, encodes URLs, databases and programming variables d) Status Meaning Reason Code 404 Not Found Server is unable to find the requested file/resource 200 OK Request successful (OK) 403 Forbidden User does not have sufficient permission to access the requested resource 500 Internal Server Error Generic error that means the server was unable to process the request for whatever reason 401 Unauthorized The resource that was requested cannot be accessed because the user has not or cannot authenticate themselves. (10 marks) e) i) Content-Length: The number of bytes the body of the request is. In this instance, 38 bytes. ii) HTTP/1.1 200 iii) iv) image/png A header (H1) that says BCS and a paragraph (p) that says Welcome to the BCS (8 marks) B5 Examiners Guidance Notes Approximately three-quarters of candidates attempted this question. The responses were the weakest in the exam although some candidates did score very well. Part a) and b) were straightforward and tested rudimentary knowledge; most candidates scored full marks for these parts. Part c) was answered weakly by many candidates, despite a similar question appearing in a previous paper. Statelessness is a fundamental concept surrounding HTTP, and should be understood. Part d) was not answered particularly well, with candidates making uninformed guesses which were worth no marks. The status codes are extremely common and many candidates were not even aware of 404 (not found). 10

Part e) was answered acceptably, with many candidates getting at least some marks here. Part iv) was particularly well answered as was part ii). The content-type was a little tricky, with only several candidates correctly identifying that it was image/png. B6. a) Explain the difference between a packet switched and a circuit switched network. In your answer, state which type applies to the Internet. (5 marks) b) Internet Protocol (IP) is the main protocol that operates on the Network Layer. One of the fields within the IPv6 header is hop limit. i) Describe the reasons for including the hop limit field in the IPv6 header. In your answer, include examples of where this field is put to effective use by network administrators for network diagnostics. ii) In the IPv4 header, the hop limit field is called TTL. Describe what TTL stands for, and why the designers of IPv6 renamed this field? c) Compare and contrast IPv4 and IPv6. d) Explain the importance of NAT, and the role it plays in the context of IPv4 addressing. e) Provide an example of a private IPv4 address. Answer Pointers a) A packet switched network is one where there is no single unbroken connection between sender and receiver. Information is broken into packets which are sent over various routes and reassembled at the destination. A circuit switched network is one where once the connection is made, that part of the network is dedicated to the single connection. The Internet is packet switched. (5 marks) b) i) The hop field is an 8 bit field that is decremented by 1 each time the packet is forwarded through a network node (e.g. a router). When the hop field reaches zero, the packet is discarded. Hop limit is useful to an administrator because it may help identify a broken node. Hop limits are used in network administrative tools, such as traceroute. 11

ii) TTL = Time To Live. Theoretically, in IPv4, this field was meant to be measured in seconds. However, every node the packet went through decremented the TTL field. So in IPv6, the name changed to hop limit to reflect what was actually happening. c) There are many points that can be made, such as address length, address structure, header fields, IPSec. Any reasonable, justified point is good for a mark. d) With the expansion of the Internet, the IPv4 address space is becoming exhausted. NAT allows internal networks to share IP addresses. e) Any address that falls between these ranges: 10.0.0.0 10.255.255.255; 172.16.0.0 172.31.255.255; 192.168.0.0 192.168.255.255 B6 Examiners Guidance Notes This question covered core material which has been examined in previous papers. Although it was popular, it was not answered particularly well. Part a) was well answered with many candidates scoring top marks. Part b) was not well answered, with many candidates guessing their way to an answer. This rarely ever works in a technical field where answers are well established. Answers to Part c) were disappointing given that it is a core area. Many, candidates could only provide the difference in the address spaces that would only gain a few marks. Part d) was answered well by many candidates, with some producing an excellent diagram which demonstrated their understanding. In Part e) many candidates correctly identified a private IPv4 address, but some misread the question. 12