SlideShare a Scribd company logo
1. Networking (Total marks for this question: 20)
       a) What is the purpose of Internet Protocol (IP)? Provide four (4) of its features. (4 Marks).
       b) You have purchased a domain name www.socit.net and set up the web server to only listen
           to port 3080. When users type www.socit.net into their browser, an error is reported saying
           that the server is not responding. Your server is definitely running. Why is the error message
           returned? How can the site be accessed successfully? (4 Marks).
       c) Assume you need to setup a network consists of about 1000 hosts and you were given
           192.160.128.0 segment as the initial IP address.
                i) Determine the most suitable netmask address (in both binary and decimal format)
                   to minimize the wastage of IP addresses. Show your working in obtaining the
                   netmask address.
               ii) How many IP addresses can be used in your answer to question c.i ?
              iii) What are the first usable IP address and the lass usable IP address on this network?
                   Show your workings to obtain the addresses. (6+2=4 = 12 Marks).
2. HTTP and Apache (Total marks for this question: 35)
       a) Explain briefly what the following HTTP Status codes mean:
                i) 200 OK.
               ii) 302 NOT MODIFIED.
              iii) 400 BAD REQUEST.
              iv) 500 INTERNAL ERROR (1+1+1+1 = 4Marks).
       b) Describe what the following server-level directives in Apache 2.0 do:
                i) AddType.
               ii) CustomLog.
              iii) DocumentRoot. (2+2+2=6 Marks).
       c) Describe what the following directory-leve directives in Apache 2.0 do:
                i) Allow from
               ii) AllowOverride.
              iii) DirectoryIndex. (2+2+2=6 Marks).
d) Answer the following question based on the sample HTTP request below:

   Connect to 203.176.151.15 on port 80 ... ok
   GET / HTTP / 1.1
   Host: m.taylors.edu.my
   Connections: close
   User-Agent: Mozilla/5.0 (windows; U; Windows NT 5.1; en-US;
   Rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1
   Accept-Encoding: gzip
   Accept-Charset: ISO-8859-1, UTF-8; q=0.7,*;q=0.7
   Cache-Control: no-cache
   Accept-Language: de,en-gb;q=0.7,en-us;q=0.3
   Referer: http://web-siffer.net


        i) Is the request using persistent connections? Provide the reasons that support your
           answer.
       ii) Identify all the request header fields in the above sample HTTP request.
       iii) Explain what the values of the Accept-Language in the above sample HTTP request
           indicate. (3+3+3=9 Marks).
e) Answer the following question based on the sample HTTP response below:

            Status: HTTP/1.1 301 Moved Permanently
            Date: Sat, 24 Sep 2011 15:46:43 GMT
            Server: Apache/2.2.11 (Win32) mode_ssl/2.2.11 OpenSSL/0.9.8i
            PHP/5.2.9
            Set-Cookies: MoodelSession=69d6469642e223c3aa23ad2d0667ed0f;
            path=/
            Cache-Control: private, pre-check=0, post-check=0, max-age=0
            Pragma: no-cache
            Content-Language: en
            Content-Script-Type: text/javascript
            Content-Style-Type: text/css
            Acceept-Ranges: none
            Connection: close
            Content-Type: text/html; charset=utf-8


                i) Explain what the status code in this example indicates.
                ii) What Operating System does the server reside on?
               iii) What is the function of the Set-Cookie header? (3+1+2=6 Marks).
       f)   Provide 2 advantages and 2 disadvantages of the event-driven web server architecture. (4
            Marks).
3. Web Security (Total marks for this question: 35)
       a) Differentiate between authentication and authorization. Provide suitable examples to
            support your answer. (4 Marks).
       b) You are the web server administrator for your organization. Due to security issues, your are
            required to provide digest authentication in your Apache server for the following directory:
            /www/private/management. Only the users that belong to the group manager are allowed
            to access this directory. The password file called digest is located in the following directory:
            /usr/local/apache/passwd. Show how the per-directory configuration directive in your
            httpd.conf file should look like, based on the information given. (6 Marks).
c) What directives would you add into your per-directory configuration in part (b) to only allow
            users     from    your     network        (called     www.acme.net)     to    access    the
            /www/private/management directory, and no one else can access the directory? (3 Marks).
       d) What is the utility program used to create the password file for digest authentication called?
            (1 Mark).
       e) Why is digest authentication more secure than basic authentication? Explain in detail. (4
            Marks).
       f)   Explain in detail how symmetric key encryption works. (5 Marks).
       g) Provide a concise definition for the following terms:
                i) SYN flooding.
                ii) Public Key Infrastructure (PKI).
               iii) Webjacking (2+2+2=6 Marks).
       h) Draw a diagram the depicts a screened host gateway firewall architecture, and provide a
            brief description on this architecture.




4. Web Server Performance (Total marks for this question: 20)
     a) When tuning a web server, allowing DNS lookups can add to network latency. Explain in
         detail why. (4 Marks).
b) The following is the performance configuration directives (and default values) for the
          prefork multi-processing module (MPM):

           <IfModule prefork.c>
           StartServers                 5
           MinSpareServers              5
           MaxSpareServers              5
           MaxClients                   150
           MaxRequestPerChild           0
           </IfModule>
                i) What does the StartServer directive specify?
               ii) What is the MinSpareServers directive responsible for?
               iii) Explain what the value of MaxRequestPerChild 0 means. (1+1+2 = 4 Marks).
       c) Provide on example of the type of web application that would benefit from using the
           prefork Multi-Processing Module and one type for the worker Multi-Processing Module.
           Briefly explain why as well. (4 Marks).
       d) Web server log files are very useful in measuring the performance of a web server.
                i) What type of data is recorded in server log files?
               ii) Why is the default log format for Apache the common log format?
               iii) Although log files help in measuring the performance of a web server, it can also
                   become a potential performance liability on the web server itself. Explain why. How
                   can this potential performance liability be overcome? (2+2+4 = 8 Marks).
5. Caching and Load Balancing (Total marks for this question: 10)
       a) Propagation delay and session persistence ('stickiness') are parameters that affect load
           balancing. Briefly explain what these two parameters refer to. (10 marks)

More Related Content

What's hot

Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality Check
Paula Januszkiewicz
 
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat Security Conference
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
Paula Januszkiewicz
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation Security
Aman Singh
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
Daniel Owens
 
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat Security Conference
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
Chema Alonso
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]
RootedCON
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017
Manich Koomsusi
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)
Bernardo Damele A. G.
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Ismail Fahmi
 
Flashack
FlashackFlashack
Adding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationAdding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, Authorization
Fernando Lopez Aguilar
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Paula Januszkiewicz
 
Art of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoArt of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya Morimoto
Pichaya Morimoto
 
Cache poisoning
Cache poisoningCache poisoning
Cache poisoning
AlexandraLacatus
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
Teymur Kheirkhabarov
 
Http response splitting
Http response splittingHttp response splitting
Http response splitting
Sharath Unni
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
Apijay Kumar
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slides
ZuzannaKornecka
 

What's hot (20)

Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality Check
 
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation Security
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural net
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
 
Flashack
FlashackFlashack
Flashack
 
Adding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationAdding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, Authorization
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
 
Art of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoArt of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya Morimoto
 
Cache poisoning
Cache poisoningCache poisoning
Cache poisoning
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Http response splitting
Http response splittingHttp response splitting
Http response splitting
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slides
 

Similar to Web Server and Web Technology Exam paper

Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdf
Yogeshwaran R
 
Computer networking mcis 6163 project
Computer networking mcis 6163 projectComputer networking mcis 6163 project
Computer networking mcis 6163 project
Anakinzs
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
 
Đề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechĐề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ Aptech
Nhân Châu KP
 
gofortution
gofortutiongofortution
gofortution
gofortution
 
web component_development
web component_developmentweb component_development
web component_development
bachector
 
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
guest3f9c6b
 
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
C L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{WwwC L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{Www
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
guest3f9c6b
 
Perf test Eng interview preparation
Perf test Eng interview preparationPerf test Eng interview preparation
Perf test Eng interview preparation
pratik mohite
 
Was faqs
Was faqsWas faqs
Was faqs
sruthilaya
 
Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data center
Cisco Canada
 
Architecting big data solutions in the cloud
Architecting big data solutions in the cloudArchitecting big data solutions in the cloud
Architecting big data solutions in the cloud
Mostafa
 
Web Security
Web SecurityWeb Security
Web Security
Chatree Kunjai
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing
Techglyphs
 
DotNet Introduction
DotNet IntroductionDotNet Introduction
DotNet Introduction
Wei Sun
 
Vulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsVulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing Levels
Positive Hack Days
 
300 208 exam dumps
300 208 exam dumps300 208 exam dumps
300 208 exam dumps
michealdeweese
 
Dot Net Nuke Presentation
Dot Net Nuke PresentationDot Net Nuke Presentation
Dot Net Nuke Presentation
Tony Cosentino
 
Yogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’s
Yogesh Kushwah
 
Vulnerabilities in data processing levels
Vulnerabilities in data processing levelsVulnerabilities in data processing levels
Vulnerabilities in data processing levels
beched
 

Similar to Web Server and Web Technology Exam paper (20)

Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdf
 
Computer networking mcis 6163 project
Computer networking mcis 6163 projectComputer networking mcis 6163 project
Computer networking mcis 6163 project
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
Đề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechĐề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ Aptech
 
gofortution
gofortutiongofortution
gofortution
 
web component_development
web component_developmentweb component_development
web component_development
 
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
 
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
C L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{WwwC L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{Www
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
 
Perf test Eng interview preparation
Perf test Eng interview preparationPerf test Eng interview preparation
Perf test Eng interview preparation
 
Was faqs
Was faqsWas faqs
Was faqs
 
Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data center
 
Architecting big data solutions in the cloud
Architecting big data solutions in the cloudArchitecting big data solutions in the cloud
Architecting big data solutions in the cloud
 
Web Security
Web SecurityWeb Security
Web Security
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing
 
DotNet Introduction
DotNet IntroductionDotNet Introduction
DotNet Introduction
 
Vulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsVulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing Levels
 
300 208 exam dumps
300 208 exam dumps300 208 exam dumps
300 208 exam dumps
 
Dot Net Nuke Presentation
Dot Net Nuke PresentationDot Net Nuke Presentation
Dot Net Nuke Presentation
 
Yogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’s
 
Vulnerabilities in data processing levels
Vulnerabilities in data processing levelsVulnerabilities in data processing levels
Vulnerabilities in data processing levels
 

Recently uploaded

BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 

Recently uploaded (20)

BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 

Web Server and Web Technology Exam paper

  • 1. 1. Networking (Total marks for this question: 20) a) What is the purpose of Internet Protocol (IP)? Provide four (4) of its features. (4 Marks). b) You have purchased a domain name www.socit.net and set up the web server to only listen to port 3080. When users type www.socit.net into their browser, an error is reported saying that the server is not responding. Your server is definitely running. Why is the error message returned? How can the site be accessed successfully? (4 Marks). c) Assume you need to setup a network consists of about 1000 hosts and you were given 192.160.128.0 segment as the initial IP address. i) Determine the most suitable netmask address (in both binary and decimal format) to minimize the wastage of IP addresses. Show your working in obtaining the netmask address. ii) How many IP addresses can be used in your answer to question c.i ? iii) What are the first usable IP address and the lass usable IP address on this network? Show your workings to obtain the addresses. (6+2=4 = 12 Marks). 2. HTTP and Apache (Total marks for this question: 35) a) Explain briefly what the following HTTP Status codes mean: i) 200 OK. ii) 302 NOT MODIFIED. iii) 400 BAD REQUEST. iv) 500 INTERNAL ERROR (1+1+1+1 = 4Marks). b) Describe what the following server-level directives in Apache 2.0 do: i) AddType. ii) CustomLog. iii) DocumentRoot. (2+2+2=6 Marks). c) Describe what the following directory-leve directives in Apache 2.0 do: i) Allow from ii) AllowOverride. iii) DirectoryIndex. (2+2+2=6 Marks).
  • 2. d) Answer the following question based on the sample HTTP request below: Connect to 203.176.151.15 on port 80 ... ok GET / HTTP / 1.1 Host: m.taylors.edu.my Connections: close User-Agent: Mozilla/5.0 (windows; U; Windows NT 5.1; en-US; Rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1 Accept-Encoding: gzip Accept-Charset: ISO-8859-1, UTF-8; q=0.7,*;q=0.7 Cache-Control: no-cache Accept-Language: de,en-gb;q=0.7,en-us;q=0.3 Referer: http://web-siffer.net i) Is the request using persistent connections? Provide the reasons that support your answer. ii) Identify all the request header fields in the above sample HTTP request. iii) Explain what the values of the Accept-Language in the above sample HTTP request indicate. (3+3+3=9 Marks).
  • 3. e) Answer the following question based on the sample HTTP response below: Status: HTTP/1.1 301 Moved Permanently Date: Sat, 24 Sep 2011 15:46:43 GMT Server: Apache/2.2.11 (Win32) mode_ssl/2.2.11 OpenSSL/0.9.8i PHP/5.2.9 Set-Cookies: MoodelSession=69d6469642e223c3aa23ad2d0667ed0f; path=/ Cache-Control: private, pre-check=0, post-check=0, max-age=0 Pragma: no-cache Content-Language: en Content-Script-Type: text/javascript Content-Style-Type: text/css Acceept-Ranges: none Connection: close Content-Type: text/html; charset=utf-8 i) Explain what the status code in this example indicates. ii) What Operating System does the server reside on? iii) What is the function of the Set-Cookie header? (3+1+2=6 Marks). f) Provide 2 advantages and 2 disadvantages of the event-driven web server architecture. (4 Marks). 3. Web Security (Total marks for this question: 35) a) Differentiate between authentication and authorization. Provide suitable examples to support your answer. (4 Marks). b) You are the web server administrator for your organization. Due to security issues, your are required to provide digest authentication in your Apache server for the following directory: /www/private/management. Only the users that belong to the group manager are allowed to access this directory. The password file called digest is located in the following directory: /usr/local/apache/passwd. Show how the per-directory configuration directive in your httpd.conf file should look like, based on the information given. (6 Marks).
  • 4. c) What directives would you add into your per-directory configuration in part (b) to only allow users from your network (called www.acme.net) to access the /www/private/management directory, and no one else can access the directory? (3 Marks). d) What is the utility program used to create the password file for digest authentication called? (1 Mark). e) Why is digest authentication more secure than basic authentication? Explain in detail. (4 Marks). f) Explain in detail how symmetric key encryption works. (5 Marks). g) Provide a concise definition for the following terms: i) SYN flooding. ii) Public Key Infrastructure (PKI). iii) Webjacking (2+2+2=6 Marks). h) Draw a diagram the depicts a screened host gateway firewall architecture, and provide a brief description on this architecture. 4. Web Server Performance (Total marks for this question: 20) a) When tuning a web server, allowing DNS lookups can add to network latency. Explain in detail why. (4 Marks).
  • 5. b) The following is the performance configuration directives (and default values) for the prefork multi-processing module (MPM): <IfModule prefork.c> StartServers 5 MinSpareServers 5 MaxSpareServers 5 MaxClients 150 MaxRequestPerChild 0 </IfModule> i) What does the StartServer directive specify? ii) What is the MinSpareServers directive responsible for? iii) Explain what the value of MaxRequestPerChild 0 means. (1+1+2 = 4 Marks). c) Provide on example of the type of web application that would benefit from using the prefork Multi-Processing Module and one type for the worker Multi-Processing Module. Briefly explain why as well. (4 Marks). d) Web server log files are very useful in measuring the performance of a web server. i) What type of data is recorded in server log files? ii) Why is the default log format for Apache the common log format? iii) Although log files help in measuring the performance of a web server, it can also become a potential performance liability on the web server itself. Explain why. How can this potential performance liability be overcome? (2+2+4 = 8 Marks). 5. Caching and Load Balancing (Total marks for this question: 10) a) Propagation delay and session persistence ('stickiness') are parameters that affect load balancing. Briefly explain what these two parameters refer to. (10 marks)