0% found this document useful (0 votes)
10 views

IT For all

This document is a question bank for a third-grade IT course focused on networking and cybersecurity for the academic year 2023-2024. It includes various units covering topics such as APIs, RESTful services, network automation, and Python programming. The document contains multiple-choice questions, fill-in-the-blank exercises, and true/false statements designed to assess students' understanding of the material.

Uploaded by

lewoce6803
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

IT For all

This document is a question bank for a third-grade IT course focused on networking and cybersecurity for the academic year 2023-2024. It includes various units covering topics such as APIs, RESTful services, network automation, and Python programming. The document contains multiple-choice questions, fill-in-the-blank exercises, and true/false statements designed to assess students' understanding of the material.

Uploaded by

lewoce6803
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

‫بنك أسئلة‬

‫المادة‪:‬تكنولوجيا المعلومات – شعبة شبكات وامن معلومات‬


‫الصف‪ :‬الثالث‬
‫العام الدراسي‪2024-2023 :‬‬
‫الوحدة‪24 :‬‬
‫مدارس تكنولوجيا التطبيقية‬ ‫المسار الفني‬
‫فني شبكات و امن معلومات‬ Program Name
‫طالب الصف الثالث‬ ‫المستهدف من التقييم‬
Unit 17 : Introduction to Cybersecurity ‫الوحدات التدريبية‬
Unit 18 : Advanced Cybersecurity-1
Unit 19: Advanced Cybersecurity-2
Unit 20: Virtual Private Network and Mikrotik
Unit21: Cloud and Virtualization Technology
Unit22: Microsoft Azure Fundamentals -1
Unit23: Microsoft Azure Fundamentals -2
Unit24: Cisco Dev Net
‫اكواد المعارف‬
Unit24: Cisco Dev Net
Different Routing Protocols and protocols used to exchange data on TPK18
a network
program flow and control. TPK23
The benefits behind migration to the cloud TPK25

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


‫المعرفة‬ ‫الكود‬
Different Routing Protocols and protocols used to exchange data on a
TPK18
network

What is the primary purpose of an API? C


A) To store data
B) To enhance graphics
C) To facilitate communication between software components
D) To increase computer speed
The Google Maps API allows you to: B
A) Track user's personal data
B) Interface with Google Maps in an application
C) Increase your device's processing power
D) Create new internet browsers
Which of these is not a characteristic of a Hardware API? C
A) Accessing GPS locations
B) Interacting with sensors
C) Enhancing application graphics
D) Gathering real-time data
A Public API is characterized by being: B
A) Private and secure
B) Available to everyone
C) Used only in specific countries
D) Used only on certain devices
A Partner API is: C
A) Open to all developers
B) Used for internal purposes only
C) Shared with specific business partners
D) Used exclusively for data storage
Which API type is used to interact with hardware devices? C
A) Service API
B) Information API
C) Hardware API
D) Graphics API
What is a Private API? C
A) An API that can be used by any developer
B) An API designed for a specific hardware
C) An API used internally within a company
D) An API used for public internet services

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


An Information API is used to: B
A) Enhance security
B) Ask another application for information
C) Control hardware devices
D) Render 3D graphics
What is a Service API mainly used for? B
A) Providing hardware access
B) Solving a specific problem by calling another application
C) Displaying graphical interfaces
D) Storing data in databases
Which of the following is an example of an API? B
A) Google Chrome
B) Google Maps API
C) Microsoft Word
D) Intel Processor
Which of the following is an example of a Northbound API? A

A) Cisco DNA Center


B) HTTP Protocol
C) Southbound API
D) TLS Encryption
What is the main benefit of making responses cacheable in a B
REST API?

A) To increase data security


B) To improve performance
C) To manage client data
D) To encrypt data
Which method is commonly used in REST APIs to retrieve data? D

A) POST
B) PUT
C) DELETE
D) GET
What characterizes an API as RESTful? C

A) Using TLS encryption


B) Operating on TCP protocol
C) Client/server architecture and stateless interactions
D) Being cacheable only
In a REST API, what does 'stateless' mean? A

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


A) The server does not store any client data between requests
B) The client and server are not connected
C) The API does not maintain any state of the network
D) Data is not encrypted
REST APIs operate on top of which protocol? B

A) TCP
B) HTTP
C) SNMP
D) FTP
Which of these is NOT a component that Southbound APIs C
interact with?

A) Routers
B) Switches
C) Smartphones
D) Wireless access points
What is the primary use of Northbound APIs in network B
management?

A) To connect different networks


B) To communicate between a network controller and its
management software
C) To secure data in transit
D) To manage client data
What does TLS primarily provide in the context of Northbound C
APIs?

A) Data management
B) User interface
C) Encryption for data in transit
D) API functionality
Southbound APIs are used for: B

A) Encrypting data
B) Pushing changes to individual network devices
C) Managing client data
D) Connecting different networks

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


Dear Learner Complete the following sentences
Question Answer
An API allows software components to __________ with communicate
each other.
Private APIs are intended for __________ use within a internal
company.
Partner APIs are shared with specific __________ partners. business
______APIs are available to everyone. Public
Google Maps API is commonly used for __________ and displaying
querying locations. maps
Service APIs can exist __________ of each other. independently
Hardware APIs typically involve __________ or sensors. hardware
Hardware APIs allow applications to access __________ data real-time
from sensors.
A Service API helps an application to __________ a solve
particular problem.
Information API is used for asking for __________ from information
another application.

Complete the following table

RESTful HTTP Answer


Action
Operation Method
Create new data POST
Create ……..
structures and variables
Read (retrieve) variable READ
names, structures, and …….. GET
values
Update or replace Update
……. ……..
values of some variable PATCH/PUT
Delete some variables Delete
Delete …….
and data structures

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


Question Answer
https://www.weschools.com/courses/IT.html#page155 URN
Uniform
www.weschools.com/courses/IT.html is called resource
name
https://www.weschools.com/courses/IT.html is called URL
Uniform
resource
locator
https://www.weschools.com/courses/IT.html#page155 URI
is called Uniform
resource
Identifier

‫المعرفة‬ ‫الكود‬
program flow and control TPK23

Dear learner: Choose the correct answer.


Question Answer
What is an architectural constraint to which a true RESTful API web C
service must adhere?
A. It must support the XML data format.
B. It operates as a cloud service.
C. It runs as client/server model.
D. It uses HTTPS to transport data.
In the RESTful API request example, http://ww B
w.mapquestapi.com/directions/v2/route?outFormat=json&key=KEY&fro
m=San+Jose,Ca&to=Monterey,Ca, which term describes the component
directions/v2/route?

A. parameters
B. resources
C. API server
D. query
Which statement describes an API? A

A. It is a set of functions and procedures that allows a client application to


access the data of the service application.
B. It is a programming language for creating a web-based application.

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


C. It is a set of functions and subroutines to be used in a comprehensive
application.
D. It is a set of rules that filter network traffic for web-based applications.
Which web service API can use multiple data formats including JSON, B
XML, and YAML?

A. JSON-RPC
B. REST
C. SOAP
D. XML-RPC
A programmer is using Ansible as the configuration management tool. D
Which term is used to describe a set of instructions for execution?
A. Pillar
B. Manifest
C. Cookbook
D. Playbook
Which character is used to separate JSON key/value pairs? C

A. (semi colon) ;
B. (dash) –
C. (comma) ,
D. (forward slash) /
What are two benefits of network automation? (Choose two.) B
A. reduced hardware footprint C
B. reduced operational costs
C. faster changes with more reliable results
D. fewer network failures
E. increased network security.
Which two encoding methods are supported by REST APIs? (Choose C
two.) D
A. SGML
B. YAML
C. XML
D. JSON
E. EBCDIC.
What are two characteristics of a controller-based network? (Choose two.) C
A. It uses Telnet to report system issues. E
B. The administrator can make configuration updates from the CLI.
C. It uses northbound and southbound APIs to communicate between
architectural layers.

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


D. It decentralizes the control plane, which allows each device to make its
own forwarding decisions.
E. It moves the control plane to a central point.
Which two capabilities of Cisco DNA Center make it more extensible? A
(Choose two.) C
A. REST APIs that allow for external applications to interact natively with
Cisco DNA Center
B. adapters that support all families of Cisco IOS software
C. SDKs that support interaction with third-party network equipment
D. modular design that is upgradable as needed
E. customized versions for small, medium, and large enterprises.
What software-defined architecture plane assists network devices with B
making packet-forwarding decisions by providing Layer 2 reachability and
Layer 3 routing information?
A. management plane
B. control plane
C. data plane
D. policy plane.
What are two benefits of controller-based networking compared to B
traditional networking? (Choose two.) D
A. controller-based increases network bandwidth usage, while traditional
lightens the load on the network
B. controller-based reduces network configuration complexity, while
traditional increases the potential for errors
C. controller-based allows for fewer network failures, while traditional
increases failure rates
D. controller-based provides centralization of key IT functions, while
traditional requires distributed management functions
E. controller-based inflates software costs, while traditional decreases
individual licensing costs.
Which type of API allows SDN controllers to dynamically make changes D
to the network?
A. northbound API
B. REST API
C. SOAP API
D. southbound API.
Which option about JSON is true - B
A. uses predefined tags or angle brackets () to delimit markup text
B. used to describe structured data that includes arrays
C. used for storing information
D. similar to HTML, it is more verbose than XML.

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


Which option best describes an API? A
A. a contract that describes how various components communicate and
exchange data with each other
B. an architectural style (versus a protocol) for designing applications
C. a stateless client-server model
D. request a certain type of data by specifying the URL path that models
the data.
Which of the following is the JSON encoding of a dictionary or hash? A
A. {key: value}
B. [key, value]
C. {key, value}
D. (key: value)
In software defined architectures, which plane is distributed and C
responsible for traffic forwarding?
A. management plane
B. policy plane
C. data plane
D. control plane.
What does an SDN controller use as a communication protocol to relay C
forwarding changes to a southbound API?
A. Java
B. REST
C. OpenFlow
D. XML.
Which plane is centralized by an SDN controller? D
A. management-plane
B. data-plane
C. services-plane
D. control-plane.
Which statement compares traditional networks and controller-based D
networks?
A. Only traditional networks natively support centralized management.
B. Traditional and controller-based networks abstract policies from device
configurations.
C. Only traditional networks offer a centralized control plane.
D. Only controller-based networks decouple the control plane and the data
plane.
Which of the following is a task performed in the data plane? B

A) Routing table management


B) Encrypting data

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


C) Access control management
D) Network topology mapping
Which of these is not a function of the management plane? B

A) Network device access using SSH


B) Data forwarding
C) Configuration updates
D) Monitoring network status
What does Cisco DNA Center primarily offer? C

A) Internet connectivity
B) Email server management
C) Network automation and analytics
D) Web hosting
What is Object-Oriented Programming (OOP)? B

A) A programming style based on functions.


B) A paradigm where real-world entities are represented as objects.
C) A way to structure a database.
D) A method for writing web applications.
What is a module in Python? C

A) A collection of variables.
B) A built-in Python function.
C) A separate file containing Python code, such as classes and functions.
D) A data type.
How can you access a method of a Python object? A

A) By using the dot notation.


B) By calling it directly from the class.
C) By importing it as a module.
D) By using a special keyword.
What is the purpose of methods in a Python class? B

A) To store data.
B) To perform operations on the object's data.
C) To create new classes.
D) To document the class.
How do you create a new attribute for an object in Python? B

A) By defining it inside a method.

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


B) By assigning it a value outside of the class.
C) By importing it as a module.
D) By using a special function.
In Python OOP, what does 'self' refer to? C

A) The class being defined.


B) The method being called.
C) The instance of the class.
D) The parent class.
What does the __init__ method in a Python class do? A

A) Initializes a new instance of a class.


B) Deletes an instance of a class.
C) Updates an instance of a class.
D) Returns the value of an instance.
What is Inheritance in Python OOP? B

A) Copying data from one object to another.


B) A class taking on attributes and methods from another class.
C) Changing the functionality of an existing method.
D) Hiding internal details of an object from others.
Which keyword is used to define a class in Python? C

A) object
B) def
C) class
D) struct
In Python, what is a class? B

A) A function that executes a task.


B) A blueprint for creating objects.
C) A module for storing data.
D) A variable type.

Dear learner: Put "True" in front of the correct statement and "False" in front of
the incorrect statement.
Question Answer
Attributes in Python are always private and cannot be False
accessed outside the class.
The __init__ method is optional in a Python class. True

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


In Python, a class and an object are the same things. False
OOP allows real-world entities to be modeled True
programmatically.
Inheritance allows a new class to use methods of an True
existing class.
In Python, 'self' is a reserved keyword. False
You can create multiple instances of a class in Python. True
Modules in Python can only contain functions, not classes. False
JSON is a data structure specific only to Python. False
Methods in Python classes cannot return values. False

Dear Learner: Drage and Drop from column A what is correct for column B.

No Column A No Column B

1 Fundamental configuration A Anisible


elements are stored in a manifest
2 Uses TCP port 10002 for
configuration push jobs
3 Uses Ruby for fundamental B Chef
configuration elements
4 Uses SSH for device
configuration
5 Uses TCP 8140 for C Puppet
communication
6 Uses YAML for fundamental
configuration elements

No Answer
A 4
6
B 2
3
C 1
5

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


No Column A No Column B

1 Implements changes via an SSH A Cisco DNA Center


terminal
2 Manages device configuration on
a per-device basis
3 Monitors the cloud for software
updates
4 Security is managed near the B Traditional Device
perimeter of the network with Management
firewalls
5 Uses CLI templates to apply a
consistent configuration to
multiple devices at an individual
location
6 Uses NetFlow to analyze
potential security threats
throughout the network

No Answer
A 3
5
6
B 1
2
4

Dear Learner: Match the correct answer for column A what is right in column B.

No Column A Column B Answer

1 Class A) Function within a class B

2 Object B) Blueprint for objects C

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


3 Method C) Instance of a class A

4 Inheritance D) Deriving a new class D


from an existing one

5 init E) Initializes an object E

6 Module F) A file with Python code F

7 self G) Refers to the current G


instance of the class

8 Attribute H) A variable within a H


class

9 import I) Used to include a I


module

10 JSON J) Data format for storing J


and exchanging data

No Column A No Column B Answer

1 load(): A This will import JSON data D


from a string for parsing and
manipulating within your
program.
2 loads(): B This is used to write JSON A
data from Python objects to a
file.
3 dump(): C This allows you to take B
JSON dictionary data and
convert it into a serialized
string for parsing and
manipulating within Python.
4 dumps(): D This allows you to import C
native JSON and convert it
to a Python dictionary from a
file.

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


Dear Learner: Answer the following
questions.

Question What are the features for an API to be considered “RESTful” ?


Answer Client/server
Stateless
Cacheable

Question compare between Traditional networks and software defined networks.


Answer Traditional networks combine control and data, while SDNs separate them
for easier management.
SDNs are more flexible and programmable compared to manually-
configured traditional networks.
SDNs scale and innovate faster than hardware-reliant traditional networks.

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


‫المعرفة‬ ‫الكود‬
The benefits behind migration to the cloud. TPK25
Dear learner: Choose the correct answer.
Question Answer
What is the first stage of the Software Development Life Cycle (SDLC)? C
a) Designing
b) Defining
c) Planning
d) Building
Which SDLC model is known for its rigid, step-by-step process? B
a) Agile
b) Waterfall
c) Spiral
d) V-Model
In which SDLC stage is the software actually constructed? B
a) Testing
b) Building
c) Planning
d) Designing
Which SDLC stage involves checking for defects and verifying B
functionality?
a) Deployment
b) Testing
c) Designing
d) Defining
What is a key feature of Agile methodology? C
a) Long project timelines
b) Sequential development
c) Frequent iterations or sprints
d) Complete planning before development
In the Waterfall model, each phase: C
a) Can overlap with others
b) Is iterative
c) Must be completed before the next begins
d) Can be revisited frequently
The main focus of the SDLC's 'Defining' stage is: C

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


a) Writing code
b) Testing the product
c) Gathering requirements
d) Deploying the software
In Agile, a 'sprint' typically lasts: B
a) 6 months
b) 2 weeks
c) 1 year
d) 3 days
Agile methodology is best suited for projects that: B
a) Require little to no customer involvement
b) Are small and require quick delivery
c) Are large with defined requirements
d) Do not change over time
What is the main disadvantage of the Waterfall model? B
a) Too fast-paced
b) Lack of flexibility
c) Too many iterations
d) Overemphasis on testing
What is an SDK in software development? B
A. A security protocol
B. A set of development tools
C. A type of network device
D. A cloud service
Which feature is a part of Cisco DNA Center's capabilities? B
A. Malware analysis
B. Network automation
C. Photo editing
D. Game development
In the context of Cisco SDKs, what is an API? B
A. A type of computer hardware
B. An Application Programming Interface
C. An Automated Protocol Installation
D. A form of AI technology

Dear learner: Put "True" in front of the correct statement and "False" in front of
the incorrect statement.
Question Answer
An SDK is only used for developing computer games. False
SDKs typically contain sample code and documentation True

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


Cisco DNA Center does not support API integration. False
Cisco's SDKs are available in multiple programming True
languages.
Cisco Meraki's management is cloud-based. True
Cisco Umbrella primarily focuses on network switching. False
Cisco Umbrella is a tool for managing cloud storage. False
Meraki Dashboard API's structure mirrors the Meraki True
dashboard GUI.
Cisco DNA Center is used for email management. False
Cisco Meraki products can only be managed on-site. False

Dear Learner: Match the correct answer for column A what is right in column B.

No Column A Column B Answer


628
1 SDK A. Cloud-based network B
management
2 Cisco Meraki B. Set of development A
tools
3 Cisco DNA Center C. Cloud-based security E
gateway
4 Cisco Umbrella D. Application C
Programming Interface
5 API E. Network management D
and automation

‫ شعبة الشبكات و امن المعلومات‬2024-2023 ‫بنك أسئلة الصف الثالث‬


‫بنك أسئلة الصف الثالث ‪ 2024-2023‬شعبة الشبكات و امن المعلومات‬

You might also like