100% found this document useful (5 votes)
2K views8 pages

Answers A/L ICT Competency-8 Model Questions

1. The document provides an overview of an ICT exam preparatory seminar held on July 27, 2015 at the Zonal Education Office in Kalmunai. 2. It includes topics covered in the seminar such as computer networking concepts, IP addressing, data communication methods, and network security threats. 3. Examples and explanations are provided for different types of network devices, network protocols, modulation techniques, and common security attacks like spoofing and denial of service attacks.

Uploaded by

Mohamed Irfan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
100% found this document useful (5 votes)
2K views8 pages

Answers A/L ICT Competency-8 Model Questions

1. The document provides an overview of an ICT exam preparatory seminar held on July 27, 2015 at the Zonal Education Office in Kalmunai. 2. It includes topics covered in the seminar such as computer networking concepts, IP addressing, data communication methods, and network security threats. 3. Examples and explanations are provided for different types of network devices, network protocols, modulation techniques, and common security attacks like spoofing and denial of service attacks.

Uploaded by

Mohamed Irfan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 8

7/27/2015

A/L ICT Exam preparatory


seminarr-2015
Zonal Education Office - Kalmunai

Nju;r;rp 8
tsg;gq;fL
P kw;Wk; juT> Fuy; vd;gtw;iw nraw;jpwDs;s
tifapy; njhlHghly; nra;tjw;fhf juT
gupkhw;wj;jpdJk; fzpdp gzpg;gpd;dy;
njhopy;El;gq;fspdJk; gad;ghl;il Muha;thu;.

7/27/2015

tpilfs;
1. i. A: Ftpak;(Hub)/khw;wp(switch)
B:ghyq;fs;(Bridge)
ii. a. topg;gLj;jpfs;(Router)
b. gpujpepjpj;Jt Nritafk;(proxy server)
c. jPr;Rtu;(firewall)

2. ai. guhkupg;G nryT mjpfk;.


ii. fl;likg;G rpf;fyhdJ.
iii. juTg; gupkhw;w Ntfk; Fiwtilayhk;
iv. tiyaikg;ig tp];jupg;gJ fbdk;.
b. tFg;G C
192.168.10.0
c. Ftpak;
ghyk;
d. 27 xd;Wfs;:
11111111.11111111.11111111.11100000
tpUe;Njhk;gp gFjpapy; cs;s 1 fspd;
vz;zpf;if= 3
/ 23 = 8 cgtiyfs;

7/27/2015

3. i.a. Amplitude Modulation (AM)

Frequency Modulation (FM)

Phase Modulation (PM)

b. Amplitude Shift Key (ASK

Frequency shift key (FSK

Phase shift key (PSK

7/27/2015

ii. a. xNu

ghijapD}lhf xNu miytupir nfhz;l juT


kw;Wk; xypr; rkpq;iQfis gupkhw;wk; nra;a trjpfspid
toq;Fk;.

b. Neug; gpupT gd;ikahf;fk;


A, B, C vDk; rkpq;iQfshdJ xU ghijapD}lhf xU
Fwpj;j Neuj;jpy; mDg;Gtjhf ,Ue;jhy; gpuahzpf;Fk;
NeukhdJ mr;rkpq;iQfSf;F ,ilNa gfpu;e;spf;fg;gl;L
mitfSf;fpilNa
ve;j
,ilA+Wk;
tuhj
tz;zk;
tpj;jpahrkhd
Neuq;fspy;
xt;nthU
rkpq;iQAk;
mg;ghijapD}lhf gpuahzpf;Fk.;

4. i.a. CSMA/CD (Carrier Sense Multiple Access with


Collision Detection)
CSMA/CD MdJ bus ,iztpapy; gad;gLj;jg;gLk; xU
cld;gL newpKiwahFk;
gupkhw;wj;ij
Nkw;nfhs;sTs;s
fUtpahdJ
Kjypy;
ghijapd;(Channel)
eltbf;iffspid
mwpa
eltbf;iffspid Nkw;nfhs;Sk; ghij gad;gLj;jg;glhJ
,Ug;gJ
fz;l
; wpag;gl;lhy;
kw;w
fUtpfSf;F
juTg;gupkhw;wj;jpy;
<LglNtz;lhk;
vd
rkpq;iQapid
mDg;gpa gpd;du; jdJ jftypid mDg;Gk;. Mdhy; fUtp,
ghij gad;ghl;by; ,Ug;gij mwpe;jhy; jdJ me;Neuj;jpw;fhd
jfty;
gupkhw;wj;jpid
iftpl;L
,d;DnkhU
Neuj;jpy;
mDg;Gk;.
,uz;L
nodefs; xNu Neuj;jpy; jfty; gupkhw;wj;jpy;
<LgLk;NghJ Nkhjy; Vw;gLk.; me;Neuj;jpy; ve;j fUtp Kjypy;
Nkhjiy
mwpfpd;wNjh
mf;fUtp
tiyaikg;gpw;F
newpry;(Jamming)
rkpq;iQia
mDg;Gk;.
mNjNeuk;
mt;tpuz;L fUtpfSk; juT gupkhw;wj;ij kPsg;ngw;W NtnwhU
Neuj;jpy; juTg;gupkhw;wj;ij kPs Nkw;nfhs;Sk;.

7/27/2015

b. Token Ring - IEEE 802.5


,it BUS kw;Wk; Ring tiyg;gpd;dy;fsp;y;
gad;gLj;jg;gLk;
Token I itj;jpUf;Fk; fzzp khj;jpuNk
tiyg;gpd;dypy; jutpid mDg;gKbAk;. ,J
Nkhjy; Vw;gLtjid jLf;Fk; xU Vw;ghlhFk;.
Token MdJ tpNrl mikg;igf; nfhz;l
bit
my;yJ
byte
fshFk;
,J
tiyg;gpd;dypy;
cs;s
xt;nthU
Node
,dhYk; Neubahf mwpag;glf; $baJ.
xU
fzzp
Token
I
itj;jpUe;jhy;
khj;jpuNk jftiy gupkhw KbAk;.

c. Post Office Protocol (POP)


,J TCP/IP Ald; ,ize;J njhopw;gLk;
,e;j cld;gL newpKiw MdJ Application
Layer ,y; gad;gLj;jg;gLk; xd;wFk;.
,J e-mail gadhsu; xUtu; TCP/IP
njhlu;ig ghtpj;J ve;jnthU e-mail server
,y; ,Ue;Jk; e-mail I ngw;Wf;
nfhs;Stjw;fhf gad;gLj;jg;gLk;.

7/27/2015

ii.a. gfpb tpisahLjy; (Spoofing)


xU egu; my;yJ fUtp tiyaikg;gpy; cs;s NtnwhU
eguhf, fUtpahf my;yJ ek;gfkhf eguhf, fUtpahf
jd;id
khw;wp
tiyaikg;gpDs;
Eioe;J
tiyaikg;gpid rPu;Fiyj;jy; my;yJ jfty;fis
jpUly; my;yJ tiyaikg;G fl;likg;ig jdf;fy;
,t;thwhd nraw;ghL gfpb tpisahLjy; vdg;gLk;.
nghJthf IP Spoofing tiyaikg;Gf;fspy; ,lk;ngwf;
$ba xU mr;RUj;jyhFk;. ,jd;NghJ NtnwhU egu;
tiyaikg;gpy; cs;s IP Kftupahf jd;idf; fhl;bf;
nfhz;L tiyaikg;gpDs; cs;Eioe;J ghjpg;Gf;fis
Vw;gLj;Jthu;.
,jpypUe;J ghJfhg;gG ngw
Packet Filtering
tiyaikg;gpy; kiwFwpaplg;gl;l newpKiwfis
gad;gLj;jy; (Cryptographic Network Protocol)

b. NritkWg;G (Denial of Service)

rl;luPjpahd my;yJ mDkjpaspf;fg;gl;l gadu;


xUtu;
tiyaikg;G
tsk;
my;yJ
,iza
tsj;jpid
mDf
Kaw;rpf;fpd;wNghJ
mtuhy;
mt;tsq;fspid my;yJ mtw;wpd; Nritapid
ngwKbahj epiyapid Vw;gLj;jNy ,JthFk;.

,e;epyik gpd;tUk; topfspy; Vw;gLj;jg;glyhk;.


,iza
Nrit toq;Fdupd; jfty; gupkhw;w
mfyg;gl;lilapid jkjpf;fr; nra;tjpD}lhf
gadupdhy;
toq;fg;gLk;
cs;sPl;bid
jtwhf
nghUs;gLk; gb jpUj;JtjpD}lhf
Nritaf
fzdpfSf;F
tof;fj;jpw;F
khwhd
newpriy Vw;gLj;JtjpD}lh rl;luPj;pahd gadu;
mjid mDf Kbahj epiy Vw;gLk;.

7/27/2015

c.
rYiffis
kpifg;gLj;jpf;
(Elevation of Privileges)

fhl;ly;

xU tiyaikg;gpy; cs;s kl;Lg;gLj;jg;gl;l


rYiffis cila gadu; xUtu; jd;id
tpl $Ljyhd rYifapid cila xU
gadupd; milahsj;ij jdjhff; fhl;b
tiyaikg;gpy;
$Ljy;
rYiffisg;
ngw;Wf; nfhs;tij ,J Fwpf;Fk;.

tFg;G

Mff; Fiwe;;j tiygpd;dy;


,yf;fk;

Mff; $ba tiyg;gpd;dy;


,yf;fk;

00000000
0

01111111
127

10000000.00000000
128.0

10111111.11111111
191.255

11000000.00000000.00000000
192.0.0

11011111.11111111.11111111
223.255.255

Back

7/27/2015

You might also like