SlideShare une entreprise Scribd logo
1  sur  5
1. Networking (Total marks for this question: 20)
       a) What is the purpose of Internet Protocol (IP)? Provide four (4) of its features. (4 Marks).
       b) You have purchased a domain name www.socit.net and set up the web server to only listen
           to port 3080. When users type www.socit.net into their browser, an error is reported saying
           that the server is not responding. Your server is definitely running. Why is the error message
           returned? How can the site be accessed successfully? (4 Marks).
       c) Assume you need to setup a network consists of about 1000 hosts and you were given
           192.160.128.0 segment as the initial IP address.
                i) Determine the most suitable netmask address (in both binary and decimal format)
                   to minimize the wastage of IP addresses. Show your working in obtaining the
                   netmask address.
               ii) How many IP addresses can be used in your answer to question c.i ?
              iii) What are the first usable IP address and the lass usable IP address on this network?
                   Show your workings to obtain the addresses. (6+2=4 = 12 Marks).
2. HTTP and Apache (Total marks for this question: 35)
       a) Explain briefly what the following HTTP Status codes mean:
                i) 200 OK.
               ii) 302 NOT MODIFIED.
              iii) 400 BAD REQUEST.
              iv) 500 INTERNAL ERROR (1+1+1+1 = 4Marks).
       b) Describe what the following server-level directives in Apache 2.0 do:
                i) AddType.
               ii) CustomLog.
              iii) DocumentRoot. (2+2+2=6 Marks).
       c) Describe what the following directory-leve directives in Apache 2.0 do:
                i) Allow from
               ii) AllowOverride.
              iii) DirectoryIndex. (2+2+2=6 Marks).
d) Answer the following question based on the sample HTTP request below:

   Connect to 203.176.151.15 on port 80 ... ok
   GET / HTTP / 1.1
   Host: m.taylors.edu.my
   Connections: close
   User-Agent: Mozilla/5.0 (windows; U; Windows NT 5.1; en-US;
   Rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1
   Accept-Encoding: gzip
   Accept-Charset: ISO-8859-1, UTF-8; q=0.7,*;q=0.7
   Cache-Control: no-cache
   Accept-Language: de,en-gb;q=0.7,en-us;q=0.3
   Referer: http://web-siffer.net


        i) Is the request using persistent connections? Provide the reasons that support your
           answer.
       ii) Identify all the request header fields in the above sample HTTP request.
       iii) Explain what the values of the Accept-Language in the above sample HTTP request
           indicate. (3+3+3=9 Marks).
e) Answer the following question based on the sample HTTP response below:

            Status: HTTP/1.1 301 Moved Permanently
            Date: Sat, 24 Sep 2011 15:46:43 GMT
            Server: Apache/2.2.11 (Win32) mode_ssl/2.2.11 OpenSSL/0.9.8i
            PHP/5.2.9
            Set-Cookies: MoodelSession=69d6469642e223c3aa23ad2d0667ed0f;
            path=/
            Cache-Control: private, pre-check=0, post-check=0, max-age=0
            Pragma: no-cache
            Content-Language: en
            Content-Script-Type: text/javascript
            Content-Style-Type: text/css
            Acceept-Ranges: none
            Connection: close
            Content-Type: text/html; charset=utf-8


                i) Explain what the status code in this example indicates.
                ii) What Operating System does the server reside on?
               iii) What is the function of the Set-Cookie header? (3+1+2=6 Marks).
       f)   Provide 2 advantages and 2 disadvantages of the event-driven web server architecture. (4
            Marks).
3. Web Security (Total marks for this question: 35)
       a) Differentiate between authentication and authorization. Provide suitable examples to
            support your answer. (4 Marks).
       b) You are the web server administrator for your organization. Due to security issues, your are
            required to provide digest authentication in your Apache server for the following directory:
            /www/private/management. Only the users that belong to the group manager are allowed
            to access this directory. The password file called digest is located in the following directory:
            /usr/local/apache/passwd. Show how the per-directory configuration directive in your
            httpd.conf file should look like, based on the information given. (6 Marks).
c) What directives would you add into your per-directory configuration in part (b) to only allow
            users     from    your     network        (called     www.acme.net)     to    access    the
            /www/private/management directory, and no one else can access the directory? (3 Marks).
       d) What is the utility program used to create the password file for digest authentication called?
            (1 Mark).
       e) Why is digest authentication more secure than basic authentication? Explain in detail. (4
            Marks).
       f)   Explain in detail how symmetric key encryption works. (5 Marks).
       g) Provide a concise definition for the following terms:
                i) SYN flooding.
                ii) Public Key Infrastructure (PKI).
               iii) Webjacking (2+2+2=6 Marks).
       h) Draw a diagram the depicts a screened host gateway firewall architecture, and provide a
            brief description on this architecture.




4. Web Server Performance (Total marks for this question: 20)
     a) When tuning a web server, allowing DNS lookups can add to network latency. Explain in
         detail why. (4 Marks).
b) The following is the performance configuration directives (and default values) for the
          prefork multi-processing module (MPM):

           <IfModule prefork.c>
           StartServers                 5
           MinSpareServers              5
           MaxSpareServers              5
           MaxClients                   150
           MaxRequestPerChild           0
           </IfModule>
                i) What does the StartServer directive specify?
               ii) What is the MinSpareServers directive responsible for?
               iii) Explain what the value of MaxRequestPerChild 0 means. (1+1+2 = 4 Marks).
       c) Provide on example of the type of web application that would benefit from using the
           prefork Multi-Processing Module and one type for the worker Multi-Processing Module.
           Briefly explain why as well. (4 Marks).
       d) Web server log files are very useful in measuring the performance of a web server.
                i) What type of data is recorded in server log files?
               ii) Why is the default log format for Apache the common log format?
               iii) Although log files help in measuring the performance of a web server, it can also
                   become a potential performance liability on the web server itself. Explain why. How
                   can this potential performance liability be overcome? (2+2+4 = 8 Marks).
5. Caching and Load Balancing (Total marks for this question: 10)
       a) Propagation delay and session persistence ('stickiness') are parameters that affect load
           balancing. Briefly explain what these two parameters refer to. (10 marks)

Contenu connexe

Tendances

Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckPaula Januszkiewicz
 
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat Security Conference
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Paula Januszkiewicz
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation SecurityAman Singh
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionDaniel Owens
 
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat Security Conference
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksChema Alonso
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]RootedCON
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Manich Koomsusi
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Bernardo Damele A. G.
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TIIsmail Fahmi
 
Adding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationAdding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationFernando Lopez Aguilar
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Paula Januszkiewicz
 
Art of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoArt of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoPichaya Morimoto
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentTeymur Kheirkhabarov
 
Http response splitting
Http response splittingHttp response splitting
Http response splittingSharath Unni
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smugglingApijay Kumar
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesZuzannaKornecka
 

Tendances (20)

Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality Check
 
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation Security
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural net
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
 
Flashack
FlashackFlashack
Flashack
 
Adding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationAdding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, Authorization
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
 
Art of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoArt of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya Morimoto
 
Cache poisoning
Cache poisoningCache poisoning
Cache poisoning
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Http response splitting
Http response splittingHttp response splitting
Http response splitting
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slides
 

Similaire à Web Server and Web Technology Exam paper

Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdfYogeshwaran R
 
Computer networking mcis 6163 project
Computer networking mcis 6163 projectComputer networking mcis 6163 project
Computer networking mcis 6163 projectAnakinzs
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE Engr. Md. Jamal Uddin Rayhan
 
Đề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechĐề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechNhân Châu KP
 
web component_development
web component_developmentweb component_development
web component_developmentbachector
 
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
C L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{WwwC L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{Www
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}guest3f9c6b
 
Perf test Eng interview preparation
Perf test Eng interview preparationPerf test Eng interview preparation
Perf test Eng interview preparationpratik mohite
 
Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerCisco Canada
 
Architecting big data solutions in the cloud
Architecting big data solutions in the cloudArchitecting big data solutions in the cloud
Architecting big data solutions in the cloudMostafa
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing Techglyphs
 
DotNet Introduction
DotNet IntroductionDotNet Introduction
DotNet IntroductionWei Sun
 
Vulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsVulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsPositive Hack Days
 
Dot Net Nuke Presentation
Dot Net Nuke PresentationDot Net Nuke Presentation
Dot Net Nuke PresentationTony Cosentino
 
Yogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh Kushwah
 
Vulnerabilities in data processing levels
Vulnerabilities in data processing levelsVulnerabilities in data processing levels
Vulnerabilities in data processing levelsbeched
 

Similaire à Web Server and Web Technology Exam paper (20)

Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdf
 
Computer networking mcis 6163 project
Computer networking mcis 6163 projectComputer networking mcis 6163 project
Computer networking mcis 6163 project
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
Đề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechĐề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ Aptech
 
gofortution
gofortutiongofortution
gofortution
 
web component_development
web component_developmentweb component_development
web component_development
 
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
C L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{WwwC L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{Www
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
 
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
 
Perf test Eng interview preparation
Perf test Eng interview preparationPerf test Eng interview preparation
Perf test Eng interview preparation
 
Was faqs
Was faqsWas faqs
Was faqs
 
Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data center
 
Architecting big data solutions in the cloud
Architecting big data solutions in the cloudArchitecting big data solutions in the cloud
Architecting big data solutions in the cloud
 
Web Security
Web SecurityWeb Security
Web Security
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing
 
DotNet Introduction
DotNet IntroductionDotNet Introduction
DotNet Introduction
 
Vulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsVulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing Levels
 
300 208 exam dumps
300 208 exam dumps300 208 exam dumps
300 208 exam dumps
 
Dot Net Nuke Presentation
Dot Net Nuke PresentationDot Net Nuke Presentation
Dot Net Nuke Presentation
 
Yogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’s
 
Vulnerabilities in data processing levels
Vulnerabilities in data processing levelsVulnerabilities in data processing levels
Vulnerabilities in data processing levels
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Dernier (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Web Server and Web Technology Exam paper

  • 1. 1. Networking (Total marks for this question: 20) a) What is the purpose of Internet Protocol (IP)? Provide four (4) of its features. (4 Marks). b) You have purchased a domain name www.socit.net and set up the web server to only listen to port 3080. When users type www.socit.net into their browser, an error is reported saying that the server is not responding. Your server is definitely running. Why is the error message returned? How can the site be accessed successfully? (4 Marks). c) Assume you need to setup a network consists of about 1000 hosts and you were given 192.160.128.0 segment as the initial IP address. i) Determine the most suitable netmask address (in both binary and decimal format) to minimize the wastage of IP addresses. Show your working in obtaining the netmask address. ii) How many IP addresses can be used in your answer to question c.i ? iii) What are the first usable IP address and the lass usable IP address on this network? Show your workings to obtain the addresses. (6+2=4 = 12 Marks). 2. HTTP and Apache (Total marks for this question: 35) a) Explain briefly what the following HTTP Status codes mean: i) 200 OK. ii) 302 NOT MODIFIED. iii) 400 BAD REQUEST. iv) 500 INTERNAL ERROR (1+1+1+1 = 4Marks). b) Describe what the following server-level directives in Apache 2.0 do: i) AddType. ii) CustomLog. iii) DocumentRoot. (2+2+2=6 Marks). c) Describe what the following directory-leve directives in Apache 2.0 do: i) Allow from ii) AllowOverride. iii) DirectoryIndex. (2+2+2=6 Marks).
  • 2. d) Answer the following question based on the sample HTTP request below: Connect to 203.176.151.15 on port 80 ... ok GET / HTTP / 1.1 Host: m.taylors.edu.my Connections: close User-Agent: Mozilla/5.0 (windows; U; Windows NT 5.1; en-US; Rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1 Accept-Encoding: gzip Accept-Charset: ISO-8859-1, UTF-8; q=0.7,*;q=0.7 Cache-Control: no-cache Accept-Language: de,en-gb;q=0.7,en-us;q=0.3 Referer: http://web-siffer.net i) Is the request using persistent connections? Provide the reasons that support your answer. ii) Identify all the request header fields in the above sample HTTP request. iii) Explain what the values of the Accept-Language in the above sample HTTP request indicate. (3+3+3=9 Marks).
  • 3. e) Answer the following question based on the sample HTTP response below: Status: HTTP/1.1 301 Moved Permanently Date: Sat, 24 Sep 2011 15:46:43 GMT Server: Apache/2.2.11 (Win32) mode_ssl/2.2.11 OpenSSL/0.9.8i PHP/5.2.9 Set-Cookies: MoodelSession=69d6469642e223c3aa23ad2d0667ed0f; path=/ Cache-Control: private, pre-check=0, post-check=0, max-age=0 Pragma: no-cache Content-Language: en Content-Script-Type: text/javascript Content-Style-Type: text/css Acceept-Ranges: none Connection: close Content-Type: text/html; charset=utf-8 i) Explain what the status code in this example indicates. ii) What Operating System does the server reside on? iii) What is the function of the Set-Cookie header? (3+1+2=6 Marks). f) Provide 2 advantages and 2 disadvantages of the event-driven web server architecture. (4 Marks). 3. Web Security (Total marks for this question: 35) a) Differentiate between authentication and authorization. Provide suitable examples to support your answer. (4 Marks). b) You are the web server administrator for your organization. Due to security issues, your are required to provide digest authentication in your Apache server for the following directory: /www/private/management. Only the users that belong to the group manager are allowed to access this directory. The password file called digest is located in the following directory: /usr/local/apache/passwd. Show how the per-directory configuration directive in your httpd.conf file should look like, based on the information given. (6 Marks).
  • 4. c) What directives would you add into your per-directory configuration in part (b) to only allow users from your network (called www.acme.net) to access the /www/private/management directory, and no one else can access the directory? (3 Marks). d) What is the utility program used to create the password file for digest authentication called? (1 Mark). e) Why is digest authentication more secure than basic authentication? Explain in detail. (4 Marks). f) Explain in detail how symmetric key encryption works. (5 Marks). g) Provide a concise definition for the following terms: i) SYN flooding. ii) Public Key Infrastructure (PKI). iii) Webjacking (2+2+2=6 Marks). h) Draw a diagram the depicts a screened host gateway firewall architecture, and provide a brief description on this architecture. 4. Web Server Performance (Total marks for this question: 20) a) When tuning a web server, allowing DNS lookups can add to network latency. Explain in detail why. (4 Marks).
  • 5. b) The following is the performance configuration directives (and default values) for the prefork multi-processing module (MPM): <IfModule prefork.c> StartServers 5 MinSpareServers 5 MaxSpareServers 5 MaxClients 150 MaxRequestPerChild 0 </IfModule> i) What does the StartServer directive specify? ii) What is the MinSpareServers directive responsible for? iii) Explain what the value of MaxRequestPerChild 0 means. (1+1+2 = 4 Marks). c) Provide on example of the type of web application that would benefit from using the prefork Multi-Processing Module and one type for the worker Multi-Processing Module. Briefly explain why as well. (4 Marks). d) Web server log files are very useful in measuring the performance of a web server. i) What type of data is recorded in server log files? ii) Why is the default log format for Apache the common log format? iii) Although log files help in measuring the performance of a web server, it can also become a potential performance liability on the web server itself. Explain why. How can this potential performance liability be overcome? (2+2+4 = 8 Marks). 5. Caching and Load Balancing (Total marks for this question: 10) a) Propagation delay and session persistence ('stickiness') are parameters that affect load balancing. Briefly explain what these two parameters refer to. (10 marks)