THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

Similar documents
Shankersinh Vaghela Bapu Institue of Technology

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

EEC-682/782 Computer Networks I

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Training UNIFIED SECURITY. Signature based packet analysis

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Objectives. Connecting with Computer Science 2

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

CSC Network Security

Step-by-Step Configuration

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.

CS WEB TECHNOLOGY

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

Web Foundations Series Internet Business Associate

Step-by-Step Configuration

Step-by-Step Configuration

Alpha College of Engineering and Technology. Question Bank

Security SSID Selection: Broadcast SSID:

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

Session 2: HTML and CSS (And Computing Tradeoffs, Networking)

1. Web Technology... 6

Chapter 7. The Application Layer. DNS The Domain Name System. DNS Resource Records. The DNS Name Space Resource Records Name Servers

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

BCS Higher Education Qualifications. Level 6 Web Engineering Syllabus

MikroWall Hotspot Router and Firewall System

Resource:

Using the Internet and the World Wide Web

Why Firewalls? Firewall Characteristics

Birkbeck (University of London)

IT2353 WEB TECHNOLOGY Question Bank UNIT I 1. What is the difference between node and host? 2. What is the purpose of routers? 3. Define protocol. 4.

Chapter 11: It s a Network. Introduction to Networking

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Java Applets, etc. Instructor: Dmitri A. Gusev. Fall Lecture 25, December 5, CS 502: Computers and Communications Technology

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT. March 2018 PRINCIPLES OF INTERNET TECHNOLOGIES

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

4. The transport layer

Network Protocols - Revision

Local area network (LAN) Wide area networks (WANs) Circuit. Circuit switching. Packets. Based on Chapter 2 of Gary Schneider.

Contents 1 INTRODUCTION TO COMPUTER NETWORKS...

CyberP3i Course Module Series

Introduction. WWW history. Application concepts, WWW and HTTP Perspectives on (mobile) communications. Fredrik Alstorp Torbjörn Söderberg

Time: 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups as directed. Group A.

WEB TECHNOLOGIES CHAPTER 1

Acknowledgments... xix

Barracuda Link Balancer

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES

VG422R. User s Manual. Rev , 5

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT. March 2017 PRINCIPLES OF INTERNET TECHNOLOGIES

UNIBOX. Hotspot Management Application. Quick Start Guide

Chapter 11: Networks

Application Layer: OSI and TCP/IP Models

Chapter 1 B: Exploring the Network

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

Future-ready security for small and mid-size enterprises

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

3. WWW and HTTP. Fig.3.1 Architecture of WWW

M3-R3: INTERNET AND WEB DESIGN

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Which one of the following terms describes the physical components of a computer system?

M3-R3: INTERNET AND WEB PAGE DESIGN

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Your computer, the internet, and the web. A brief overview

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

CHAPTER 7 ADVANCED ADMINISTRATION PC

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Web 2.0, AJAX and RIAs

Chapter 4 The Internet

CompTIA i-net+ Certification Exam Objectives (

How A Website Works. - Shobha

idor Mobile Setup idor Mobile : idor Mobile System Manual V1.1 1

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

The Library Res-Net Troubleshooting Guide

Developing Web Applications

Lesson 4: Web Browsing

Birkbeck (University of London)

Networks and Communications MS216 - Course Outline -

AIM. 10 September

SonicWALL Security Appliances. SonicWALL SSL-VPN 200 Getting Started Guide

Full file at

Detects Potential Problems. Customizable Data Columns. Support for International Characters

Publishing Technology 101 A Journal Publishing Primer. Mike Hepp Director, Technology Strategy Dartmouth Journal Services

Chapter 02 Technology Infrastructure The Internet and the World Wide Web

Chapter 5 Advanced Configuration

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

Lecture : 3. Practical : 2. Course Credit. Tutorial : 0. Total : 5. Course Learning Outcomes

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

HTML, XHTML, and CSS. Sixth Edition. Chapter 1. Introduction to HTML, XHTML, and

Web Engineering (CC 552)

CS 120 Digital Literacy, Chapter 5: p

Lecture Overview. IN5290 Ethical Hacking. Lecture 4: Web hacking 1, Client side bypass, Tampering data, Brute-forcing

Browser behavior can be quite complex, using more HTTP features than the basic exchange, this trace will show us how much gets transferred.

APPLICATION NOTE # 036

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce

Transcription:

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES Specimen Answers Question 1 DOM Document Object Model CSS Cascading Style Sheets XSL extensible Stylesheet Language b) <link rel="stylesheet" type="text/css" href=" refstyle.css"> c) Within the style tag the style required should be: body {background:red} body {color:white} h2 {font-size:12; font-family:arial; color:blue} p { text-align: right; font-size:12; font-weight:bold; font-familytahoma;} d) XML allows the creation of data formats for specific situations XSL describes how the XML stream will be displayed DTD - Document Type Definition used to define the structure, elements and attributes that can be used in a XML document Question 2 i)

ii) b) 78 26 32 30 94 83 101 49 55 53 117 106 E 1 7 5 U J b) If authentication is controlled on the client side then the password must be embedded in the HTML or an external.js file. If so, the client user can either directly read the password or decrypt it. More robust methods require use of the server-side CGI. This can be achieved using: programming language like PERL or PHP possible inclusion of a database with passwords Issues also occur if the client can access pages after the main login page if the URL is known. Use of cookies and or sessions help control access to these pages. This will also help with audit tracking of the site and particular pages with in the site. Question 3 Security policies/privacy/identification/authentication/access control. Hardware and software attacks Denial of Service (DoS), Vulnerabilities operating system and browser related. Typical threats and attack via: Viruses Spam Root kits phishing Issues with performance due to downtime to fix problems. Recommendations to use Firewalls, antivirus and spyware plug-ins. Question 4 i) Mobile Computing is a generic term describing your ability to use technology to wirelessly connect to and use centrally located information and/or application software through the application of small, portable, and wireless computing and communication devices. This includes devices like laptops with wireless LAN technology, mobile phones, wearable computers and Personal Digital Assistants (PDAs) with Bluetooth or IRDA interfaces, and USB flash drives. (Wikipedi

ii) Developments could include: Wireless networking Hardware miniaturisation Growth of the Internet Adoption of mobile phone networks for data Bluetooth b) Types of website include: Educational Governmental Support (Help, drivers etc) Commercial Entertainment Community/Informational c) A weblog, which is usually shortened to blog, is a type of website where entries are made (such as in a journal or diary), displayed in a reverse chronological order. Blogs often offer commentary or news on a particular subject, such as food, politics, or local news; some function as more personal online diaries. (Wikipedi. A wiki is a type of website that allows users to easily add, remove, or otherwise edit and change most available content, sometimes without the need for registration. This ease of interaction and operation makes a wiki an effective tool for collaborative writing. (Wikipedi Common features: They are web sites Usually open to anyone Allow comments Differences: Authorship Wiki collaborative, blog personal Purpose Wiki to develop a document, blog to provide a commentary d) RSS is a format for facilitating the sharing of content on the web. The acronym RSS can variously stand for 'Rich Site Summary', 'RDF Site Summary' or 'Really Simple Syndication'. The format is based on XML and is frequently associated with the syndication of newsfeeds. Question 5 i) Transmission Control Protocol / Internet Protocol A set of two communications protocols which offer reliable delivery (c.f. UDP/IP) across diverse networks. IP defines the underlying network layer, whilst TCP is the transport layer, providing the reliable delivery over IP. ii) File Transfer Protocol A protocol used for efficient transfer of files to/from a remote machine. iii) Hypertext Transfer Protocol A protocol used for the transfer of web files across a network. iv) Internet Mail Access Protocol A mail protocol that interfaces with mail stored on a server, rather than fetching and storing mail on the local host machine. v) Hypertext Markup Language A markup language used to create web pages. b)

IPv4 worked on 32-bit addressing. IPv6 (Internet Protocol version 6) uses 128-bit addresses, allowing for 3.4 x 1038 addresses. This is in the order of 1029 times greater than IPv4. NAT (Network address translation) allows private networks to share a limited number of external IP addresses. Traffic inside the network uses internal IP addresses (in the ranges 10.x.x.x, or 192.168.x.x) which do not have to be unique across the entire Internet, only on the local network. Traffic heading outside of the network has its IP address rewritten to one of the external IP addresses. c) These are computers on the Internet which perform the address translation from IP to the more common addresses such as www.bcs.org.uk. These allow the Internet to function without the need for hierarchical structure. Each ISP/company will maintain its own local name server. As well as maintaining details of the local network it will also cache recent requests. If it doesn t have the information required, then it will contact the root domain server. This will tell it which primary name server and secondary name server have the information about the requested URL. d) 1. The user types the URL into the browser 2. The browser users the DNS to identify the host web server 3. The browser uses HTTP to transmit the following request to the server: "GET /request-uri HTTP/version", where version tells the server which HTTP version is used. 4. When the server receives the HTTP request it locates the appropriate document and returns it. However, an HTTP response is required to have a particular form. It must look like this: HTTP/[VER] [CODE] [TEXT] Field1: Value1 Field2: Value2...Document content here... The first line shows the HTTP version used, followed by a three-digit number (the HTTP status code) and a reason phrase meant for humans. Usually the code is 200 (which basically means that all is well) and the phrase "OK". The first line is followed by some lines called the header, which contains information about the document. The header ends with a blank line, followed by the document content. A SMTP server on the Internet is used for the transfer of email using the Simple Mail Transfer Protocol. It takes connections from email clients and transfers messages to other SMTP servers. A proxy server sits between client Web browsers and a Web server to filter and cache Web content and improve network performance. The primary purpose is the security function to inspect incoming and outgoing traffic and determining what should be denied transmission, reception or access. A pop3 server on the Internet is used in the last stage of email delivery. It accepts connections from email clients and handles the delivery of email using the Post Office Protocol Version 3. A DNS server provides the address resolution function of the domain name system. A DHCP server manages the allocation of dynamic IP addresses on internal networks. It provides each network client with an IP address, subnet mask, default gateway, an IP address for a WINS server and an IP address for a DNS server. b) Webmail is a way to read and send email messages using a web browser. Webmail does not require the use of any email client software. Webmail uses a web browser, web server, and mail server instead of an email client program to read and send messages. Webmail is a web application that uses a web server for both the user interface and to communicate with a mail server for reading and sending messages. This means that it uses the HTTP protocol rather than

POP3/IMAP. SMTP is still used for the transportation of email from the web server to other email hosts. c) Methods could include: Wireless hotspots Mobile phones Satellite technology d) Japan is currently the country with the highest uptake of 3G. Their experience has been that video telephony is not the killer application. Music downloads appear to be more important and this experience is being repeated in other countries.