SlideShare una empresa de Scribd logo
1 de 5
1. Networking (Total marks for this question: 20)
       a) What is the purpose of Internet Protocol (IP)? Provide four (4) of its features. (4 Marks).
       b) You have purchased a domain name www.socit.net and set up the web server to only listen
           to port 3080. When users type www.socit.net into their browser, an error is reported saying
           that the server is not responding. Your server is definitely running. Why is the error message
           returned? How can the site be accessed successfully? (4 Marks).
       c) Assume you need to setup a network consists of about 1000 hosts and you were given
           192.160.128.0 segment as the initial IP address.
                i) Determine the most suitable netmask address (in both binary and decimal format)
                   to minimize the wastage of IP addresses. Show your working in obtaining the
                   netmask address.
               ii) How many IP addresses can be used in your answer to question c.i ?
              iii) What are the first usable IP address and the lass usable IP address on this network?
                   Show your workings to obtain the addresses. (6+2=4 = 12 Marks).
2. HTTP and Apache (Total marks for this question: 35)
       a) Explain briefly what the following HTTP Status codes mean:
                i) 200 OK.
               ii) 302 NOT MODIFIED.
              iii) 400 BAD REQUEST.
              iv) 500 INTERNAL ERROR (1+1+1+1 = 4Marks).
       b) Describe what the following server-level directives in Apache 2.0 do:
                i) AddType.
               ii) CustomLog.
              iii) DocumentRoot. (2+2+2=6 Marks).
       c) Describe what the following directory-leve directives in Apache 2.0 do:
                i) Allow from
               ii) AllowOverride.
              iii) DirectoryIndex. (2+2+2=6 Marks).
d) Answer the following question based on the sample HTTP request below:

   Connect to 203.176.151.15 on port 80 ... ok
   GET / HTTP / 1.1
   Host: m.taylors.edu.my
   Connections: close
   User-Agent: Mozilla/5.0 (windows; U; Windows NT 5.1; en-US;
   Rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1
   Accept-Encoding: gzip
   Accept-Charset: ISO-8859-1, UTF-8; q=0.7,*;q=0.7
   Cache-Control: no-cache
   Accept-Language: de,en-gb;q=0.7,en-us;q=0.3
   Referer: http://web-siffer.net


        i) Is the request using persistent connections? Provide the reasons that support your
           answer.
       ii) Identify all the request header fields in the above sample HTTP request.
       iii) Explain what the values of the Accept-Language in the above sample HTTP request
           indicate. (3+3+3=9 Marks).
e) Answer the following question based on the sample HTTP response below:

            Status: HTTP/1.1 301 Moved Permanently
            Date: Sat, 24 Sep 2011 15:46:43 GMT
            Server: Apache/2.2.11 (Win32) mode_ssl/2.2.11 OpenSSL/0.9.8i
            PHP/5.2.9
            Set-Cookies: MoodelSession=69d6469642e223c3aa23ad2d0667ed0f;
            path=/
            Cache-Control: private, pre-check=0, post-check=0, max-age=0
            Pragma: no-cache
            Content-Language: en
            Content-Script-Type: text/javascript
            Content-Style-Type: text/css
            Acceept-Ranges: none
            Connection: close
            Content-Type: text/html; charset=utf-8


                i) Explain what the status code in this example indicates.
                ii) What Operating System does the server reside on?
               iii) What is the function of the Set-Cookie header? (3+1+2=6 Marks).
       f)   Provide 2 advantages and 2 disadvantages of the event-driven web server architecture. (4
            Marks).
3. Web Security (Total marks for this question: 35)
       a) Differentiate between authentication and authorization. Provide suitable examples to
            support your answer. (4 Marks).
       b) You are the web server administrator for your organization. Due to security issues, your are
            required to provide digest authentication in your Apache server for the following directory:
            /www/private/management. Only the users that belong to the group manager are allowed
            to access this directory. The password file called digest is located in the following directory:
            /usr/local/apache/passwd. Show how the per-directory configuration directive in your
            httpd.conf file should look like, based on the information given. (6 Marks).
c) What directives would you add into your per-directory configuration in part (b) to only allow
            users     from    your     network        (called     www.acme.net)     to    access    the
            /www/private/management directory, and no one else can access the directory? (3 Marks).
       d) What is the utility program used to create the password file for digest authentication called?
            (1 Mark).
       e) Why is digest authentication more secure than basic authentication? Explain in detail. (4
            Marks).
       f)   Explain in detail how symmetric key encryption works. (5 Marks).
       g) Provide a concise definition for the following terms:
                i) SYN flooding.
                ii) Public Key Infrastructure (PKI).
               iii) Webjacking (2+2+2=6 Marks).
       h) Draw a diagram the depicts a screened host gateway firewall architecture, and provide a
            brief description on this architecture.




4. Web Server Performance (Total marks for this question: 20)
     a) When tuning a web server, allowing DNS lookups can add to network latency. Explain in
         detail why. (4 Marks).
b) The following is the performance configuration directives (and default values) for the
          prefork multi-processing module (MPM):

           <IfModule prefork.c>
           StartServers                 5
           MinSpareServers              5
           MaxSpareServers              5
           MaxClients                   150
           MaxRequestPerChild           0
           </IfModule>
                i) What does the StartServer directive specify?
               ii) What is the MinSpareServers directive responsible for?
               iii) Explain what the value of MaxRequestPerChild 0 means. (1+1+2 = 4 Marks).
       c) Provide on example of the type of web application that would benefit from using the
           prefork Multi-Processing Module and one type for the worker Multi-Processing Module.
           Briefly explain why as well. (4 Marks).
       d) Web server log files are very useful in measuring the performance of a web server.
                i) What type of data is recorded in server log files?
               ii) Why is the default log format for Apache the common log format?
               iii) Although log files help in measuring the performance of a web server, it can also
                   become a potential performance liability on the web server itself. Explain why. How
                   can this potential performance liability be overcome? (2+2+4 = 8 Marks).
5. Caching and Load Balancing (Total marks for this question: 10)
       a) Propagation delay and session persistence ('stickiness') are parameters that affect load
           balancing. Briefly explain what these two parameters refer to. (10 marks)

Más contenido relacionado

La actualidad más candente

Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckPaula Januszkiewicz
 
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat Security Conference
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Paula Januszkiewicz
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation SecurityAman Singh
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionDaniel Owens
 
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat Security Conference
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksChema Alonso
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]RootedCON
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Manich Koomsusi
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Bernardo Damele A. G.
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TIIsmail Fahmi
 
Adding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationAdding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationFernando Lopez Aguilar
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Paula Januszkiewicz
 
Art of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoArt of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoPichaya Morimoto
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
 
Http response splitting
Http response splittingHttp response splitting
Http response splittingSharath Unni
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smugglingApijay Kumar
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesZuzannaKornecka
 

La actualidad más candente (20)

Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality Check
 
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation Security
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural net
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
 
Flashack
FlashackFlashack
Flashack
 
Adding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationAdding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, Authorization
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
 
Art of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoArt of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya Morimoto
 
Cache poisoning
Cache poisoningCache poisoning
Cache poisoning
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Http response splitting
Http response splittingHttp response splitting
Http response splitting
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slides
 

Similar a Web Server and Web Technology Exam paper

Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdfYogeshwaran R
 
Computer networking mcis 6163 project
Computer networking mcis 6163 projectComputer networking mcis 6163 project
Computer networking mcis 6163 projectAnakinzs
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE Engr. Md. Jamal Uddin Rayhan
 
Đề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechĐề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechNhân Châu KP
 
web component_development
web component_developmentweb component_development
web component_developmentbachector
 
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
C L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{WwwC L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{Www
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Perf test Eng interview preparation
Perf test Eng interview preparationPerf test Eng interview preparation
Perf test Eng interview preparationpratik mohite
 
Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerCisco Canada
 
Architecting big data solutions in the cloud
Architecting big data solutions in the cloudArchitecting big data solutions in the cloud
Architecting big data solutions in the cloudMostafa
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing Techglyphs
 
DotNet Introduction
DotNet IntroductionDotNet Introduction
DotNet IntroductionWei Sun
 
Vulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsVulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsPositive Hack Days
 
Dot Net Nuke Presentation
Dot Net Nuke PresentationDot Net Nuke Presentation
Dot Net Nuke PresentationTony Cosentino
 
Yogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh Kushwah
 
Vulnerabilities in data processing levels
Vulnerabilities in data processing levelsVulnerabilities in data processing levels
Vulnerabilities in data processing levelsbeched
 

Similar a Web Server and Web Technology Exam paper (20)

Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdf
 
Computer networking mcis 6163 project
Computer networking mcis 6163 projectComputer networking mcis 6163 project
Computer networking mcis 6163 project
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
Đề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechĐề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ Aptech
 
gofortution
gofortutiongofortution
gofortution
 
web component_development
web component_developmentweb component_development
web component_development
 
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
C L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{WwwC L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{Www
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
 
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
 
Perf test Eng interview preparation
Perf test Eng interview preparationPerf test Eng interview preparation
Perf test Eng interview preparation
 
Was faqs
Was faqsWas faqs
Was faqs
 
Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data center
 
Architecting big data solutions in the cloud
Architecting big data solutions in the cloudArchitecting big data solutions in the cloud
Architecting big data solutions in the cloud
 
Web Security
Web SecurityWeb Security
Web Security
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing
 
DotNet Introduction
DotNet IntroductionDotNet Introduction
DotNet Introduction
 
Vulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsVulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing Levels
 
300 208 exam dumps
300 208 exam dumps300 208 exam dumps
300 208 exam dumps
 
Dot Net Nuke Presentation
Dot Net Nuke PresentationDot Net Nuke Presentation
Dot Net Nuke Presentation
 
Yogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’s
 
Vulnerabilities in data processing levels
Vulnerabilities in data processing levelsVulnerabilities in data processing levels
Vulnerabilities in data processing levels
 

Último

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 

Último (20)

Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 

Web Server and Web Technology Exam paper

  • 1. 1. Networking (Total marks for this question: 20) a) What is the purpose of Internet Protocol (IP)? Provide four (4) of its features. (4 Marks). b) You have purchased a domain name www.socit.net and set up the web server to only listen to port 3080. When users type www.socit.net into their browser, an error is reported saying that the server is not responding. Your server is definitely running. Why is the error message returned? How can the site be accessed successfully? (4 Marks). c) Assume you need to setup a network consists of about 1000 hosts and you were given 192.160.128.0 segment as the initial IP address. i) Determine the most suitable netmask address (in both binary and decimal format) to minimize the wastage of IP addresses. Show your working in obtaining the netmask address. ii) How many IP addresses can be used in your answer to question c.i ? iii) What are the first usable IP address and the lass usable IP address on this network? Show your workings to obtain the addresses. (6+2=4 = 12 Marks). 2. HTTP and Apache (Total marks for this question: 35) a) Explain briefly what the following HTTP Status codes mean: i) 200 OK. ii) 302 NOT MODIFIED. iii) 400 BAD REQUEST. iv) 500 INTERNAL ERROR (1+1+1+1 = 4Marks). b) Describe what the following server-level directives in Apache 2.0 do: i) AddType. ii) CustomLog. iii) DocumentRoot. (2+2+2=6 Marks). c) Describe what the following directory-leve directives in Apache 2.0 do: i) Allow from ii) AllowOverride. iii) DirectoryIndex. (2+2+2=6 Marks).
  • 2. d) Answer the following question based on the sample HTTP request below: Connect to 203.176.151.15 on port 80 ... ok GET / HTTP / 1.1 Host: m.taylors.edu.my Connections: close User-Agent: Mozilla/5.0 (windows; U; Windows NT 5.1; en-US; Rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1 Accept-Encoding: gzip Accept-Charset: ISO-8859-1, UTF-8; q=0.7,*;q=0.7 Cache-Control: no-cache Accept-Language: de,en-gb;q=0.7,en-us;q=0.3 Referer: http://web-siffer.net i) Is the request using persistent connections? Provide the reasons that support your answer. ii) Identify all the request header fields in the above sample HTTP request. iii) Explain what the values of the Accept-Language in the above sample HTTP request indicate. (3+3+3=9 Marks).
  • 3. e) Answer the following question based on the sample HTTP response below: Status: HTTP/1.1 301 Moved Permanently Date: Sat, 24 Sep 2011 15:46:43 GMT Server: Apache/2.2.11 (Win32) mode_ssl/2.2.11 OpenSSL/0.9.8i PHP/5.2.9 Set-Cookies: MoodelSession=69d6469642e223c3aa23ad2d0667ed0f; path=/ Cache-Control: private, pre-check=0, post-check=0, max-age=0 Pragma: no-cache Content-Language: en Content-Script-Type: text/javascript Content-Style-Type: text/css Acceept-Ranges: none Connection: close Content-Type: text/html; charset=utf-8 i) Explain what the status code in this example indicates. ii) What Operating System does the server reside on? iii) What is the function of the Set-Cookie header? (3+1+2=6 Marks). f) Provide 2 advantages and 2 disadvantages of the event-driven web server architecture. (4 Marks). 3. Web Security (Total marks for this question: 35) a) Differentiate between authentication and authorization. Provide suitable examples to support your answer. (4 Marks). b) You are the web server administrator for your organization. Due to security issues, your are required to provide digest authentication in your Apache server for the following directory: /www/private/management. Only the users that belong to the group manager are allowed to access this directory. The password file called digest is located in the following directory: /usr/local/apache/passwd. Show how the per-directory configuration directive in your httpd.conf file should look like, based on the information given. (6 Marks).
  • 4. c) What directives would you add into your per-directory configuration in part (b) to only allow users from your network (called www.acme.net) to access the /www/private/management directory, and no one else can access the directory? (3 Marks). d) What is the utility program used to create the password file for digest authentication called? (1 Mark). e) Why is digest authentication more secure than basic authentication? Explain in detail. (4 Marks). f) Explain in detail how symmetric key encryption works. (5 Marks). g) Provide a concise definition for the following terms: i) SYN flooding. ii) Public Key Infrastructure (PKI). iii) Webjacking (2+2+2=6 Marks). h) Draw a diagram the depicts a screened host gateway firewall architecture, and provide a brief description on this architecture. 4. Web Server Performance (Total marks for this question: 20) a) When tuning a web server, allowing DNS lookups can add to network latency. Explain in detail why. (4 Marks).
  • 5. b) The following is the performance configuration directives (and default values) for the prefork multi-processing module (MPM): <IfModule prefork.c> StartServers 5 MinSpareServers 5 MaxSpareServers 5 MaxClients 150 MaxRequestPerChild 0 </IfModule> i) What does the StartServer directive specify? ii) What is the MinSpareServers directive responsible for? iii) Explain what the value of MaxRequestPerChild 0 means. (1+1+2 = 4 Marks). c) Provide on example of the type of web application that would benefit from using the prefork Multi-Processing Module and one type for the worker Multi-Processing Module. Briefly explain why as well. (4 Marks). d) Web server log files are very useful in measuring the performance of a web server. i) What type of data is recorded in server log files? ii) Why is the default log format for Apache the common log format? iii) Although log files help in measuring the performance of a web server, it can also become a potential performance liability on the web server itself. Explain why. How can this potential performance liability be overcome? (2+2+4 = 8 Marks). 5. Caching and Load Balancing (Total marks for this question: 10) a) Propagation delay and session persistence ('stickiness') are parameters that affect load balancing. Briefly explain what these two parameters refer to. (10 marks)