Question 1
How did the top-secret computing technologies developed at Bletchley Park during World-War II impact computing technology after the war:
The computer scientists used their knowledge of electronic computers to build the first generation of general purpose computers
Question 2
What did Alan Turing contribute to Computer Science?
He founded the field of Artificial Intelligence
Question 3
What was the primary reason the Colossus computer was faster than the BOMBE computer?
The Colossus computer used vacuum tubes instead or gears and relays
Question 4
Which of the following was the greatest weakness of store-and-forward networks like BITNET?
If your message was behind a large message it would have to wait until the large message was completed before it was sent.
Question 5
Which of the following is most like a “packet” on the Internet?
A postcard
Question 6
What was the original “stated” intention of the National Science Foundation Network (NSFNet)?
To connect scientists to supercomputers
Question 7
Given the original five-year and 15 million dollar budget of the National Science Foundation Network (NSFNet), what was the expected speed of the national NSFNet backbone?
56 thousand bits per second
Question 8
Which of the following is the best explanation as to why the web was invented at CERN?
Well-funded smart people in a culture that was open and fun
Question 9
Which of the following is something that Robert Cailliau and Tim Berners-Lee did not do?
Invented the first object-oriented language (WWW++) Correct 1.00
Question 10
Where was the first web server in America in production on December 12, 1991?
Stanford Linear Accelerator (SLAC)
Question 11
What protocol was commonly used during 1990-1993 to organize and find information on the Internet that did not use the world-wide-web protocols?
Gopher
Question 12
Which of the following products could be thought of as the “early ancestor of the Mozilla Firefox browser”?
NCSA Mosaic
Question 13
Where was JavaScript developed at?
Netscape
Question 14
What is the purpose of the World-Wide-Web Consortium?
Define standards for the web and avoid proprietary balkanization of the web
Question 15
Why was the first product sold by Amazon books?
Because there are over 3 million books in print
Question 16
Which of the following is most similar to an Internet router?
A train station
Question 17
About how many separate physical connections (i.e. hops) will a packet cross on the Internet as it goes from University of Michigan to Stanford University?
15
Question 18
What is the value of a layered network model?
It allows a complex design problem to be broken into smaller manageable parts
Question 19
What is the IETF?
It is a coordinating body where the standards that define the inner workings of the Internet are developed and published
Question 20
Which is the lowest layer in the TCP/IP network model?
Link
Question 21
Which of the following is a Link Layer address?
00:1f:5b:81:62:e7
Question 22
Which of the following is *not* an attribute of the Internet (IP) Layer?
It makes sure that the same packet is never sent twice
Question 23
What is the purpose of the TTL value in an IP packet?
It ensures that a packet does not get stuck in an infinite loop in the Internet Correct 1.00
Question 24
Which of the following is a domain name?
http://www.coursera.org
Question 25
What problem did Van Jacobson solve in TCP?
He invented the slow-start algorithm to keep systems from overloading a slow link
Question 26
When we talk of the protocols that move data over the Internet, we talk of TCP/IP. Which of the following is false about TCP/IP?
TCP will retransmit data if it is lost in the Internet
Question 27
Secure TCP (TLS) is between which two layers?
Application and Transport
Question 28
When you are using secure http and sending data between your computer and your bank’s computer, where is the data encrypted and decrypted?
Encrypted in your computer and decrypted in the bank’s computer
Question 29
Which of the following is a TCP port (such as port 80 for HTTP) most like?
A telephone extension
Question 30
Which of the following commands is part of the Hypertext Transport Protocol (HTTP)?
GET
Question 31
What is the problem with secret key distribution via the internet?
We cannot all physically visit every web site and physically pick up a key book to work securely with that site
Question 32
What does a cryptographic hash function do?
It takes a block of data and computes a fixed-size bit string called the hash value
Question 33
Which of the following is credited as one of the inventors of Public Key Cryptograhy in the 1970’s
Whitfield Diffie
Question 34
Which historical figure is credited with encrypting military messages using a simple “shifted alphabet”?
Caesar
Question 35
Which of the following are the steps to sign and send a message to insure that the message came from the sender and was not modified in transit?
Append the shared secret to the message, compute the cryptographic hash of the message + secret, send the message + cryptographic hash across the internet
Question 36
Which of the following statements is false
Public key encryption cannot be broken
Question 37
What is the mathematical underpinnings of public key encryption?
Prime numbers
Question 38
Considering the four-layer TCP/IP model of Application / TCP / IP / Link, which two layers does Secure Sockets Layer (SSL) fit between?
Application and TCP
Question 39
If you are sending credit card information form a coffee shop WiFi to an Internet web site and later you find your credit card information has been stolen, which is the most likely scenario as to how your information was stolen?
You did not use secure HTTP (https) at a coffee shop with an open WiFi
Question 40
Which of the following would be major a warning sign that indicates lax security practices when dealing with a site where you have an ID and Password?
They can send you a mail message with the password you previously used to log in if you forget it