April 22, 2019

Cloud Computing - MCQS

Question
Which of these is not a major type of cloud computing usage?

Select one:
a. Hardware as a Service
b. Platform as a Service
c. Software as a Service
d. Software as a Service

The correct answer is: Hardware as a Service

Question
Virtualization facilitates multiple machines on the same physical machine with

Select one:
a. Same OS & different versions
b. All of the above
c. Same OS & same versions
d. Different OS & different versions

The correct answer is: All of the above

Question
Which is not an approach to virtualization

Select one:
a. Partial virtualization
b. Lightweight virtualization
c. Full virtualization
d. Para virtualization

The correct answer is: Partial virtualization

Question
Live migration of VMs helps in

Select one:
a. Maintenance
b. Load balancing
c. All of the above
d. Availability

The correct answer is: All of the above

Question
Live migration involves

Select one:
a. Downtime of a few minutes
b. Loss of service
c. Downtime of a few milliseconds
d. No downtime

The correct answer is: Downtime of a few milliseconds

Question
Full virtualization

Select one:
a. Simulates hardware within software
b. Has VMs with the same OS
c. Clones images
d. Alters the guest OS

The correct answer is: Simulates hardware within software

Question
VMM is

Select one:
a. A virtual machine
b. Hardware
c. Host OS
d. A layer of software

The correct answer is: A layer of software

Question
VMM facilitates sharing of

Select one:
a. Memory & I/O
b. CPU, memory & I/O
c. CPU & memory
d. I/O & CPU

The correct answer is: CPU, memory & I/O

Question
The BEST way to define Virtualization in cloud computing is

Select one:
a. Virtualization enables simulating compute, network, and storage service platforms from the underlying virtual hardware
b. Virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware
c. Virtualization enables realization of compute, network, and storage service platforms from the underlying virtual hardware
d. Virtualization enables emulating compute, network, and storage service platforms from the underlying virtual hardware

The correct answer is: Virtualization enables abstracting compute, network, and storage service platforms from the underlying physical hardware

Question
Which one of these statement is NOT fully correct

Select one:
a. Cloud is an exact equivalent of grid computing
b. Cloud makes notion of “Pay for what you use”, “infinite availability- use as much you want”.
c. Cloud can exist without Virtualization, although it will be difficult and inefficient.
d. As per NIST, one of the essential charecteristics of a cloud computing infrastructure is "Measured Service".

The correct answer is: Cloud is an exact equivalent of grid computing

Question
Which one of the followings is NOT an essential charecteristics of cloud infrastructure as per NIST?

Select one:
a. Broad Network Access
b. Resources Pooling
c. Rapid Elasticity
d. Independent of devices'form factor

The correct answer is: Independent of devices'form factor

Question
Cloud service consist of

Select one:
a. Software, Hardware, Infrastructure
b. Platform, Software, Infrastructure
c. Platform, Hardware, Infrastructure

The correct answer is: Platform, Software, Infrastructure

Question
What does Virtualization do? Select the BEST answer.

Select one:
a. Each “guest” OS is managed by a Virtual Machine Monitor (VMM), also known as a hypervisor.
b. It is a means of separating hardware from a single operating system.
c. All of the above
d. Virtualization allows multiple operating system instances to run concurrently on a single computer

The correct answer is: All of the above

Question
Which one is NOT generally a change after Virtualization?

Select one:
a. Virtual machines can be provisioned to any system
b. Hardware-independence of operating system and applications
c. Can manage OS and application as a single unit by encapsulating them into virtual machines.
d. Software and hardware tightly coupled

The correct answer is: Software and hardware tightly coupled

Question
A configured client server network is required to be provisioned. You would go for

Select one:
a. SaaS
b. IaaS
c. NaaS
d. PaaS

The correct answer is: IaaS

Question
What are the goals of Hypervisor design?

Select one:
a. Scalability
b. All of the above
c. Reliability
d. Isolation

The correct answer is: All of the above

Question
Which one of the statement is generally NOT correct for Microkernelized Hypervisor?

Select one:
a. Drivers run within guests
b. Simple partitioning functionality
c. Increase reliability and minimize lowest level of the TCB
d. Contains its own drivers model

The correct answer is: Contains its own drivers model

Question
In multiple VM processing, CPU is alloted to the different processes in form of:

Select one:
a. Space slices by the OS
b. Different CPUs are allocated to different processes
c. Time slices by the OS
d. Frequecy slices by the OS

The correct answer is: Time slices by the OS

Question
Which of the statement is generally NOT correct for Full Virtualization?

Select one:
a. This is known as hardware-assisted virtualization, and improves performance significantly
b. The biggest advantage to this approach is its flexibility.
c. There are significant performance problems in trying to emulate a complete set of hardware in software
d. Hypervisor provides a fully emulated machine in which an operating system can run

The correct answer is: This is known as hardware-assisted virtualization, and improves performance significantly

Question
Which of the following is true of cloud computing?

Select one:
a. It's always going to be less expensive and more secure than local computing.
b. Only a few small companies are investing in the technology, making it a risky venture.
c. You can access your data from any computer in the world, as long as you have an Internet connection.

The correct answer is: You can access your data from any computer in the world, as long as you have an Internet connection.

Question
Which of the following is deployment model?

Select one:
a. Public
b. Private
c. All of the above
d. Hybrid

The correct answer is: All of the above

Question
The ________ cloud infrastructure is operated for the exclusive use of an organization.

Select one:
a. All of the mentioned
b. Public
c. Community
d. Private

The correct answer is: Private

Question
Following is not a feature of Cloud Computing:

Select one:
a. Rapid Provisioning
b. On Demand
c. None of the above
d. Unambiguous
e. Shared Pool

The correct answer is: Unambiguous

Question
Cloud computing is

Select one:
a. Utility computing
b. Peer to peer computing
c. Mobile computing
d. All of these

The correct answer is: Utility computing

Question
Bare metal hypervisor sits on top of

Select one:
a. None of the above
b. Physical Hardware
c. Virtualized hardware
d. Operating System

The correct answer is: Physical Hardware

Question
In Amdahl'S law, maximum speedup of a system can be achieved using the following parameters:

Select one:
a. Number of Processors and the number of nodes in a cluster
b. Number of Processors and the amount of Memory System added
c. Number of Processors and fraction of application that needs sequential calculation
d. Number of Processors and the number of servers

The correct answer is: Number of Processors and fraction of application that needs sequential calculation

Question
Which is generally NOT a Multi-tenants Deployment Modes for Application Server

Select one:
a. Fully isolated Application server
b. Optimized Application Server
c. Virtualized Application Server
d. Shared Application Server

The correct answer is:Optimized Application Server

Question
Best-effort preemptable leases are generally defined as:

Select one:
a. A preemptable lease can be safely paused without disrupting the computation that takes place inside the lease
b. Best effort lease cannot preempted
c. A preemptable lease cannot be safely paused without disrupting the computation that takes place inside the lease
d. A preemptable lease can be paused while disrupting the computation that takes place inside the lease

The correct answer is: A preemptable lease can be safely paused without disrupting the computation that takes place inside the lease

Question
Which of the following is most refined and restrictive service model?

Select one:
a. PaaS
b. All of the mentioned
c. CaaS
d. IaaS

The correct answer is: PaaS

Question
All cloud computing applications suffer from the inherent _______ that is intrinsic in their WAN connectivity.

Select one:
a. All of the mentioned
b. Propagation
c. noise
d. latency

The correct answer is: latency

Question
Most security problems in cloud stem from
i) Loss of Control   ii) Lack of trust    iii) Multi-tenancy   iv) Private cloud

Select one:
a. ii, iii & iv
b. i, iii & iv
c. i, ii & iii
d. i, iii & iv

The correct answer is:i, ii & iii

Question
Appear IQ, Mendix, Amazon Web Services (AWS) Elastic Beanstalk, Google App Engine and Heroku, are some of the example of providing services for:

Select one:
a. IaaS
b. None
c. SaaS
d. PaaS

The correct answer is:PaaS

Question
Multi-tenancy deployment mode is

Select one:
a. Shared Application Server
b. All of the above
c. Shared  Virtual Server
d. Virtualized Application Server

The correct answer is:All of the above

Question
A threat model helps in

Select one:
a. Evaluate Solutions
b. Analysing security problems
c. Design Mitigation strategies
d. All of the above

The correct answer is:All of the above

Question
Which one is NOT a purchase model of SaaS?
Select one:
a. Subscription
b. Purchase of licenses
c. Rent
d. Lease

The correct answer is:Purchase of licenses

Question
Best-effort preemptable leases are generally defined as:

Select one:
a. A preemptable lease can be paused while disrupting the computation that takes place inside the lease
b. A preemptable lease cannot be safely paused without disrupting the computation that takes place inside the lease
c. A preemptable lease can be safely paused without disrupting the computation that takes place inside the lease
d. Best effort lease cannot be preempted

The correct answer is:A preemptable lease can be safely paused without disrupting the computation that takes place inside the lease

Question
How 'Best-Effort Lease' can be scheduled even if there are not enough resources?

Select one:
a. The use of Server suspension/resumption allows this to happen
b. The use of API allows this to happen
c. The use of VM suspension/resumption allows this to happen.
d. The use of Hypervisor suspension allows this to happen

The correct answer is:The use of VM suspension/resumption allows this to happen.

Network Security - MCQS

Question
Consider these statements and state which are true.
i)   Encoding and encryption change the data format.
ii)  Encoding is a reversible process, while encryption is not.
iii) Both Encoding and Encryption are reversible processes.
iv)  Any third party will be able to reverse an encoded data,but not an encrypted data.

Select one:
i), iii) and iv)
ii) and iv)
i) and iv)
i), ii) and iv)

The correct answer is: i), iii) and iv)

Question
Which of the following attacks is not an attack on Integrity?

Select one:
Modification
Replay
Denial Of Service
Masquerading

The correct answer is:: Denial Of Service

Question
I sent a data set {A,B,C,D} to a recipient which got received as {B,A,D,C}.

Select one:
Data security is compromised
Data integrity is lost
Confidentiality is lost
Data availability is compromised

The correct answer is:: Data integrity is lost

Question
A website login mechanim employs both password and verifying a PIN number sent via SMS to registered mobile.

This scenario provides ______
Select one:
High convenience but low security
High convenience and good security
Low convenience and low security
Low convenience but good security

The correct answer is:: Low convenience but good security

Question
A fake email posing as a legitimate email from bank is 

Select one:
Attack on Availability
Masquerading attack
Denial of Service (DOS) attack
Attack on Confidentiality

The correct answer is:: Masquerading attack

Question
Which of these mechanims provide data integrity ?
i) DES Encryption
ii) Asymmetric encryption
iii) SHA Hashing
iv) Hashed-MAC

Select one:
i and iv
i and iii
ii and iii
iii and iv

The correct answer is:: iii and iv

Question
Email attachments typically employ

Select one:
Base64 encoding
Base16 encoding
UTF-8 encoding
URL encoding

The correct answer is:: Base64 encoding

Question
The combination of key exchange, hash and encryption algorithms is termed as _______ in SSL/TLS.     

Select one:
TLS Handshake
Protocol suite
Cipher suite
TLS Records

The correct answer is:: Cipher suite

Question
The protocol ‘POP’ stands for-

Select one:
Personal Office Protocol
Post Office Protocol
Privacy Overall Protocol
Privacy Over Protocol

The correct answer is:: Post Office Protocol

Question
Which is the most secure way to remote login?

Select one:
SSH with public keys
Telnet with password
SSH with password
Telnet with public keys

The correct answer is:: SSH with public keys


Question
The Application layer protocol required for Electronic Mail is:

Select one:
SMTP
HTTP
FTP
SIP

The correct answer is: SMTP

Question
Which of these statements regarding HTTP is true.

Select one:
HTTPS adds security to HTTP POST and PUT messages as this is where password exchange is done.
HTTPS uses the same HTTP message format but  adds a handshake+encryption mechanism.
HTTPS introduces new messages HANDSHAKE and ALERT for bringing in security in HTTP.
HTTPS does not add security to HTTP GET and HEAD messages

The correct answer is: HTTPS uses the same HTTP message format but  adds a handshake + encryption mechanism.

Question
Which of these statements is true?

Select one:
a. IMAP provides security, but is optional in email
b. SMTP has a mechanism to enable TLS mode to enforce security.
c. Email mandates use of IMAP so that security is enforced
d. If TLS mode in SMTP is set forwarding will fail

The correct answer is:  SMTP has a mechanism to enable TLS mode to enforce security.

Question
For SSL which is the advised cryptographic algorithm?

Select one:
twofish 128
aes 192
aes 128
blowfish

The correct answer is:: aes 128

Question
In SSL handshake, Server Hello message typically contains

Select one:
List of ciphers for the session and extensions list
Selected cipher for the session and random bytes
Selected cipher for the session and public key of server
Random bytes and public key of server

The correct answer is: Selected cipher for the session and random bytes

Question
Pretty Good Privacy (PGP) is employed in

Select one:
FTP and WWW Security
Email and FTP Security
Email security
Email and WWW Security

The correct answer is:: Email security

Question
What is the common term present in HTTP request and status line?

Select one:
HTTP version number
URL
Method
None of the mentioned

The correct answer is:: HTTP version number

Question
A session symmetric key between two keys is used:

Select one:
Only once
Two times
Multiple times
Dependent on other conditions

The correct answer is:: Only once

Question
Which one of the following is a cryptographic protocol used to secure HTTP connection?

Select one:
Stream Control Transmission Protocol (SCTP)
Pretty Good Privacy (PGP)
Secure Mime(SMIME)
Transport Layer Security (TLS)

The correct answer is:: Transport Layer Security (TLS)

Question
The services provided by application layer are:

Select one:
Network virtual terminal
File transfer, access, and management
Mail service
All of the mentioned

The correct answer is:: All of the mentioned

Question
A group having 30 members uses Symmetric Key Encryption for message transmission.   How many secret keys are needed if all the members need to send secret messages to each other?

Select one:
30
60
435
900

The correct answer is: 435

Question
DES is no longer a recommended cipher because...

Select one:
A. it produces reflexive keys in pairs which are weak
B. it requires more computing power
C. it can be brute forced as it is 56-bit
D. major flaws were found in the rounds of DES

The correct answer is: it can be brute forced as it is 56-bit

Question
I - me@gmail.com - tried to email a .jar file to Dinesh. dinesh@company.com . But it got blocked by gmail while attaching.Then I tried sending a .txt file to Dinesh which went through fine. What do you infer? .jar files cannot be sent as

Select one:
A. it is blocked by gmail as .jar files are bigger in size
B. Email uses SMTP which is a Text protocol
C. it is blocked by company.com
D. it is blocked by gmail as it could contain viruses.

The correct answer is: it is blocked by gmail as it could contain viruses.

Question
What is the protocol used between Message User Agent (MUA) and Message Transfer Agent (MTA) in email system.

Select one:
A. HTTP
B. SMTP
C. IMAP
D. POP3

The correct answer is: SMTP


Question
IPSec defines these two protocols:

Select one:
A. PGP; ESP
B. AH; ESP
C. AH; SSL
D. PGP: SSL

The correct answer is: AH; ESP

Question
HTTPS implicitly uses Server certificates. These Server certificates contain ______

Select one:
A. Server's public key, algorithm used and digital signature
B. Server's public key and private key
C. Server's private key, algorithm used and digital signature
D. Server's public key and digital signature

The correct answer is: Server's public key, algorithm used and digital signature

Question
Asymmetric encryption has

Select one:
A. one key for encryption and another key for decryption
B. two keys - one key for public encryption and another for private encryption
C. one public key for doing encryption and decryption and another private key only for decryption
D. only one public key which is shared

The correct answer is: one key for encryption and another key for decryption

Question
Instead of storing plaintext passwords, AES encrypted passwords are stored in database.

In such a system, Which of these statements is true ?

Select one:
a. if database admin knows the key, there is no security
b. Password Authentication becomes slow
c. Changing passwords will not be possible
d. even if database admin knows the key, original passwords cannot get revealed.


The correct answer is: if database admin knows the key, there is no security

Question
IP Header contains

Select one:
A. Source and destination IP addresses and priority numbers
B. Source and destination IP addresses and IP version number
C. Source and destination IP addresses and Port numbers
D. Source and destination IP addresses and sequence numbers

The correct answer is: Source and destination IP addresses and IP version number



Question
Pick the most relevant option. I sent a data set {J,K,L,M,N} to a recipient which got received as {J,K,N}.

Select one:
A. Data integrity is lost
B. Data availability is compromised
C. Both Confidentiality and integrity are compromised
D. Data Confidentiality is compromised

The correct answer is: Data integrity is lost

Question
A data center is secured with 3 outer gates - Og1, Og2, Og3    locked by separate keys - Kog1, Kog2, Kog3 - given to    three personnel - P1, P2, P3.
These 3 outer gates lead to 2 inner gates - Ig1, Ig2 - which provide main corridor access. The matching keys - Kig1, Kig2 are given to P2 and P4. The order of acessibility from most access to least access for the personnel is ____________

Select one:
A. P2, P1, P3, P4
B. P1, P2, P3, P4
C. P4, P3, P2, P1
D. P2, P4, P1, P3

The correct answer is: P2, P1, P3, P4

Question
Pick the closest in meaning to non-repudiation. Manu sends data to Naren. Paari is sniffing the data transfer.

Select one:
A. Naren can verify that data was indeed sent by Manu.
B. Paari is unable to get the original data.
C. Manu can verify if data reached Naren without any change.
D. Naren can verify if the data got changed by Paari

The correct answer is: Naren can verify that data was indeed sent by Manu.

Question
The modes  of IP-Sec are

Select one:
A. Padding mode and Non-padding mode.
B. Secure and Unsecure Mode
C. Tunnel Mode and Transport Mode
D. SPD and SAD mode

The correct answer is: Tunnel Mode and Transport Mode

Question
Of these, Which is the most secure way to remote login?

Select one:
A. SSH with public keys
B. Telnet with password
C. Telnet with public keys
D. SSH with password

The correct answer is: SSH with public keys

Question
Megha's uses a 4-digit bank ATM PIN. Guna peeped in,as Megha keyed-in and found the last two digits of her PIN. Knowing that Megha does not use 0 in her PIN, what is the maximum attempts for Guna to get her PIN correct ?

Select one:
A. 18
B. 81
C. 19
D. 90

The correct answer is: 81

Question
When using HTTPS, a sniffer in a local LAN will be able to

Select one:
A. sniff only the websites/domain but not the URLs
B. sniff only the websties/domain but not the IP addresses
C. sniff only the URLs in the data exchange but not the posted/downloaded data contents.
D. sniff only the HTTP headers in the requests and response

The correct answer is: sniff only the websites/domain but not the URLs


Question
Pick the statement which is true. A network application

Select one:
A. can use both TCP and UDP at the same time, but only maximum of 256 ports. Incorrect
B. cannot use both TCP and UDP at the same time.
C. can use both TCP and UDP at the same time
D. can use both TCP and UDP at the same time, but only maximum of 1024 ports.

The correct answer is: can use both TCP and UDP at the same time

Question
Find the modular inverse of a number in mod arithmetic using

Select one:
a. Extended Euclidean Algorithm
b. Diffie Hellmann Algorithm
c. El-Gamal Algorithm
d. Euclids Algorithm

The correct answer is: Extended Euclidean Algorithm

Question
Which is the generator for modulo base 11 ?

Select one:
A. 2
B. 5
C. 3
D. 1

The correct answer is: 2

Question
399915 ^ 505021 mod 9 = ?

Select one:
a. 1
b. 0
c. 3
d. 6

The correct answer is: 0

Question
210031 ^ X mod 19 = 1

Here the matching values for X are
Select one:
a. 6, 9, 18
b. 18, 9, 36
c. 8, 18, 27
d. 6, 12, 18

The correct answer is: 18, 9, 36

Question
Euler’s Totient Function Φ (10) is:

Select one:
2
5
4
8

The correct answer is: 4

Question
Which of the following algorithms do not make use of primitive roots in its computations?
Select one:
RC4
Diffie Hellman Key Exchange
Elgamal Cryptographic System
None of the above

The correct answer is: RC4

Question
BBS generator is used for generating:

Select one:
Symmetric keys
Asymmetric keys
Random Numbers
All of above

The correct answer is: Random Numbers

Question 4
-22 mod 11 equals

Select one:
0
5
2
3

The correct answer is: 0

Question 5
Which of the following is not a criteria for design in DES cipher?

Select one:
Varying the block size
Varying the number of rounds of the cipher
Varying the key size for each round of the cipher
Varying the algorithm for generation of the subkey

The correct answer is: Varying the key size for each round of the cipher

Question
Consider Hashed Message Authentication Code (HMAC) scheme.
Pick which statement is true.

Select one:
A. HMAC output depends on the size of the input message
B. HMAC output size is not fixed
C. HMAC output size is same as the input key size
D. HMAC output size depends on the hashing tool chosen

The correct answer is: HMAC output size depends on the hashing tool chosen

Question
Public key encryption/decryption is not preferred because

Select one:
it is slow
it is hardware/software intensive
it has a high computational load
all of the mentioned

The correct answer is: all of the mentioned

Question
A real number that cannot be represented as a ratio of two integers is known as:

Select one:
Whole Number
Prime Number
Irrational Number
Recurring decimal

The correct answer is: Irrational Number

Question
Which one of the following is not a legitimate entropy source for TRNG algorithm?

Select one:
Disk rotation in RPM
Clock speed
Key strokes
Screen size

The correct answer is: Screen size

Question
The first 8 bits for BBS bit generator when seed = 101355 and n=192649 is

Select one:
10101010
11100010
11001011
11001110

The correct answer is: 11001110

Question
Statistical relationship between the rule to encrypt and the ciphertext produce should be as complex as possible.  This principal is known as:

Select one:
Diffusion
Confusion
Complex encryption
None of the above

The correct answer is: Confusion

Question
What is the GCD (1701, 3768)?

Select one:
4
1
3
7

The correct answer is: 3

Question
Pick the valid MIME header, when sending an image in email.

Select one:
A. Content-type: image/gif
Content-Disposition: attachment; filename="star.gif"
B. Content-type: image/gif/jpeg/jpg; name="star.gif"
Content-Disposition: attachment; filename="star.gif"
C. Content-type: image/gif; name="star.gif"
Content-Disposition: base64; filename="star.gif"
D. Content-type: image/gif; name="star.gif"
Content-Disposition: image; filename="star.gif"

The correct answer is: Content-type: image/gif
Content-Disposition: attachment; filename="star.gif"

Question
Let m be a message consisting of 64 blocks which Anubhav transmits to Bani using block mode of encryption.  Due to a network error, the 12th block gets corrupted, but all other cipher text blocks are transmitted ly.  Once Bani decrypts the cipher text, how many plaintext blocks will be affected,
assuming CFB and ECB modes of operations?

Select one:
53 for CFB, 1 for ECB
1 for CFB, 53 for ECB
52 for CFB, 1 for ECB
52 for both CFB & ECB

The correct answer is: 53 for CFB, 1 for ECB

Question
Disadvnatge of Vernam Cipher over RC4 is:

Select one:
Can’t decrypt large size message
Key needs to be same as plain text size
Complex Encryption approach
All of the above

The correct answer is: Key needs to be same as plain text size

Question
An Asymmetric –key (public-key) cipher uses:

Select one:
1 Key
2 Key
3 Key
4 Key

The correct answer is: 2 Key

Question
3 and 19 are congruent in:

Select one:
Z10
Z7
Z8
Z11

The correct answer is: Z8

Question
What is multiplicative invers of 20 with arithmetic modulo 73

Select one:
11
17
37
21

The correct answer is: 11

April 17, 2019

Network Security - Mid Sem Solution

Mid-Sem Paper Solutions:


Question:
What are the different types of active security attack ?

Answer:
Security Attack: Any action that compromises the security of information owned by an organization. There are 2 types of attack as shown below.

Active Attack:
An Active attack attempts to alter system resources or effect their operations. The attacker changes the data or harms the system.

Passive Attacks:
The attacker’s goal is to just obtain the information. The attack does not harm the system.

Types of active attacks include:
  • Denial of service (DoS) - It prevents normal use of communication facilities. Slowing down or totally interrupt the service of the system. E.g. multiple requests to bring an exam result server down.
  • Session replay - Subsequent retransmission of a captured message to produce an unauthorized effect. E.g. Bill payment fake reminders.
  • Masquerade - Masquerade attack takes place when one entity pretends to be different entity. E.g. Hoax bank sites. 
  • Message modification - It means that some portion of a message is altered or that message is delayed or reordered to produce an unauthorized effect.
  • Repudiation - Sender denies that it sent the message or the receiver denies that it received the message.
  • Trojans - A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network.
Types of passive attack include:
  • Snooping - Data is intercepted by an unauthorized person. E.g. Tapping
  • Traffic Analysis - May be the data is masked, so no information can be extracted but some patterns like - sender, receiver, message length, time of the message etc. can be extracted to make intelligent guesses.

April 15, 2019

Office 365 Admin Center - Digital Skill (TrendNXT L1)

Marks: 10
Set: 1
Question:62



Note: Kindly prepare yourself to score good marks in Office 365 Admin Center L1. This is for TrenDNXT level 1 dumps.

MCQS:




Hope you all guys do well in your exam, Feel free to post your concern in comment box in case of any changes in required question/answer template. 

Software Architecture - Mid Sem Solution

Mid-Sem Paper Solutions:



Question:
Q.1 Choose the most appropriate architectural pattern (one) for the 5 descriptions below. Give reasons for choosing the pattern (in 1-2 line maximum)

1. Wants to split a system into a number of computationally independent execution structures (groups of software and hardware) such as database, business logic, web interface and client, connected by some communication media. The structure is chosen to provide a specific server environment optimized for operational requirements and resource usage.

2. A set of heterogeneous specialized modules which dynamically change their strategies as a response to unpredictable events, and the system has to deal with uncertain knowledge.

3. Wants a system that can be divided into reusable, loosely coupled components that can be flexibly combined and arranged to transform between various data formats.

4. Wants a distributed system with a structure that enables that service users do not need to know the nature or location of service providers.  

5. A program relationship in which one program requests a service or resource from another Program.

Nominees:
(a) Layered 
(b) Broker 
(c) Model-view-controller
(d) Pipe-and-Filter 
(e) Client-Server 
(f) Blackboard 
(g) Service-Oriented 
(h) Publish-Subscribe 
(i)  Map-Reduce

For Practice:
  • Wants a system that quickly can analyze enormous volumes of data by sorting the data and then analyzing the grouped data. -> Map-Reduce
  • Wants to set up a set of equal distributed computational entities that are connected via a common protocol to share their services and provide high availability and scalability. -> Peer-to-peer
Answer:

1. Multi-tier
2. Blackboard
3. Pipe-and-Filter 
4. Broker
5. Client-Server

Question:
Q.2. Write brief notes on followings:

2.1  Discuss whether this statement is true or false: “Architecture is a transferable and reusable model”.
Answer:
Yes, it is true. Architecture can be created as transferable, reusable model that forms the heart of a product line.
Below is some key-point which does prove the importance of this.
Architecture can provide the basis for evolutionary prototyping.
Architecture is the key artifact that allows the architect and project manager to reason about cost and schedule.
By restricting design alternatives, architecture channels the creativity of developers, reducing design and system complexity.
Architecture defines a set of constraints on subsequent implementation.

2.2 What parameters (inputs) are typically used in models for analyzing performance
Answer:
Parameters (inputs) for analytic modeling of performance (candidates):
Arrival rate of events
queuing discipline
scheduling algorithm
service time for events
network topology 
network bandwidth
routing algorithm 

2.3 What is the difference between reference architecture and an architectural pattern? 
Answer:

An important difference between a pattern and reference architecture is that a pattern must be a recurrent solution that was already used on existing implementations. On the other hand, reference architecture can propose new, innovative solutions in its structure, whose usage was not yet proven in existing software. As a consequence, reference architecture is more suitable to propose a structure for new domains, which are not still well established.

Patterns and reference architectures document solutions in different levels of granularity. While a pattern focus on a single problem and in a single recurrent solution, reference architecture usually considers the target domain as a whole.

Question:
Q.3. Write any five availability tactics for fault detection. Explain each one briefly. 

Answer
Below are the 5 availability tactics for fault detection:
Ping
– Client (or fault-detector) pings the server and gets response back
– To avoid less communication bandwidth- use hierarchy of fault-detectors,
the lowest one shares the same h/w as the server
Heartbeat
– Server periodically sends a signal
– Listeners listen for such heartbeat. Failure of heartbeat means that the server is dead
– Signal can have data (ATM sending the last txn)
Exception Detection
– Adding an Exception handler means error masking
Voting (TMR)
– Three identical copies of a module are connected to a voting system which compares outputs from all the three components. If there is an inconsistency in their outputs when subjected to the same input, the voting system reports error/inconsistency.
– Majority voting, or preferred component wins
Timer and Time-stamping
– If the running process does not reset the timer periodically, the timer triggers off and announces failure
- Time-stamping: assigns a timestamp (can be a count, based on the local clock) with a message in a decentralized message passing system. Used to detect inconsistency.