SlideShare ist ein Scribd-Unternehmen logo
1 von 5
1. Networking (Total marks for this question: 20)
       a) What is the purpose of Internet Protocol (IP)? Provide four (4) of its features. (4 Marks).
       b) You have purchased a domain name www.socit.net and set up the web server to only listen
           to port 3080. When users type www.socit.net into their browser, an error is reported saying
           that the server is not responding. Your server is definitely running. Why is the error message
           returned? How can the site be accessed successfully? (4 Marks).
       c) Assume you need to setup a network consists of about 1000 hosts and you were given
           192.160.128.0 segment as the initial IP address.
                i) Determine the most suitable netmask address (in both binary and decimal format)
                   to minimize the wastage of IP addresses. Show your working in obtaining the
                   netmask address.
               ii) How many IP addresses can be used in your answer to question c.i ?
              iii) What are the first usable IP address and the lass usable IP address on this network?
                   Show your workings to obtain the addresses. (6+2=4 = 12 Marks).
2. HTTP and Apache (Total marks for this question: 35)
       a) Explain briefly what the following HTTP Status codes mean:
                i) 200 OK.
               ii) 302 NOT MODIFIED.
              iii) 400 BAD REQUEST.
              iv) 500 INTERNAL ERROR (1+1+1+1 = 4Marks).
       b) Describe what the following server-level directives in Apache 2.0 do:
                i) AddType.
               ii) CustomLog.
              iii) DocumentRoot. (2+2+2=6 Marks).
       c) Describe what the following directory-leve directives in Apache 2.0 do:
                i) Allow from
               ii) AllowOverride.
              iii) DirectoryIndex. (2+2+2=6 Marks).
d) Answer the following question based on the sample HTTP request below:

   Connect to 203.176.151.15 on port 80 ... ok
   GET / HTTP / 1.1
   Host: m.taylors.edu.my
   Connections: close
   User-Agent: Mozilla/5.0 (windows; U; Windows NT 5.1; en-US;
   Rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1
   Accept-Encoding: gzip
   Accept-Charset: ISO-8859-1, UTF-8; q=0.7,*;q=0.7
   Cache-Control: no-cache
   Accept-Language: de,en-gb;q=0.7,en-us;q=0.3
   Referer: http://web-siffer.net


        i) Is the request using persistent connections? Provide the reasons that support your
           answer.
       ii) Identify all the request header fields in the above sample HTTP request.
       iii) Explain what the values of the Accept-Language in the above sample HTTP request
           indicate. (3+3+3=9 Marks).
e) Answer the following question based on the sample HTTP response below:

            Status: HTTP/1.1 301 Moved Permanently
            Date: Sat, 24 Sep 2011 15:46:43 GMT
            Server: Apache/2.2.11 (Win32) mode_ssl/2.2.11 OpenSSL/0.9.8i
            PHP/5.2.9
            Set-Cookies: MoodelSession=69d6469642e223c3aa23ad2d0667ed0f;
            path=/
            Cache-Control: private, pre-check=0, post-check=0, max-age=0
            Pragma: no-cache
            Content-Language: en
            Content-Script-Type: text/javascript
            Content-Style-Type: text/css
            Acceept-Ranges: none
            Connection: close
            Content-Type: text/html; charset=utf-8


                i) Explain what the status code in this example indicates.
                ii) What Operating System does the server reside on?
               iii) What is the function of the Set-Cookie header? (3+1+2=6 Marks).
       f)   Provide 2 advantages and 2 disadvantages of the event-driven web server architecture. (4
            Marks).
3. Web Security (Total marks for this question: 35)
       a) Differentiate between authentication and authorization. Provide suitable examples to
            support your answer. (4 Marks).
       b) You are the web server administrator for your organization. Due to security issues, your are
            required to provide digest authentication in your Apache server for the following directory:
            /www/private/management. Only the users that belong to the group manager are allowed
            to access this directory. The password file called digest is located in the following directory:
            /usr/local/apache/passwd. Show how the per-directory configuration directive in your
            httpd.conf file should look like, based on the information given. (6 Marks).
c) What directives would you add into your per-directory configuration in part (b) to only allow
            users     from    your     network        (called     www.acme.net)     to    access    the
            /www/private/management directory, and no one else can access the directory? (3 Marks).
       d) What is the utility program used to create the password file for digest authentication called?
            (1 Mark).
       e) Why is digest authentication more secure than basic authentication? Explain in detail. (4
            Marks).
       f)   Explain in detail how symmetric key encryption works. (5 Marks).
       g) Provide a concise definition for the following terms:
                i) SYN flooding.
                ii) Public Key Infrastructure (PKI).
               iii) Webjacking (2+2+2=6 Marks).
       h) Draw a diagram the depicts a screened host gateway firewall architecture, and provide a
            brief description on this architecture.




4. Web Server Performance (Total marks for this question: 20)
     a) When tuning a web server, allowing DNS lookups can add to network latency. Explain in
         detail why. (4 Marks).
b) The following is the performance configuration directives (and default values) for the
          prefork multi-processing module (MPM):

           <IfModule prefork.c>
           StartServers                 5
           MinSpareServers              5
           MaxSpareServers              5
           MaxClients                   150
           MaxRequestPerChild           0
           </IfModule>
                i) What does the StartServer directive specify?
               ii) What is the MinSpareServers directive responsible for?
               iii) Explain what the value of MaxRequestPerChild 0 means. (1+1+2 = 4 Marks).
       c) Provide on example of the type of web application that would benefit from using the
           prefork Multi-Processing Module and one type for the worker Multi-Processing Module.
           Briefly explain why as well. (4 Marks).
       d) Web server log files are very useful in measuring the performance of a web server.
                i) What type of data is recorded in server log files?
               ii) Why is the default log format for Apache the common log format?
               iii) Although log files help in measuring the performance of a web server, it can also
                   become a potential performance liability on the web server itself. Explain why. How
                   can this potential performance liability be overcome? (2+2+4 = 8 Marks).
5. Caching and Load Balancing (Total marks for this question: 10)
       a) Propagation delay and session persistence ('stickiness') are parameters that affect load
           balancing. Briefly explain what these two parameters refer to. (10 marks)

Weitere ähnliche Inhalte

Was ist angesagt?

Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
Apijay Kumar
 

Was ist angesagt? (20)

Dear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality CheckDear Hacker: Infrastructure Security Reality Check
Dear Hacker: Infrastructure Security Reality Check
 
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
BlueHat v17 || Detecting Compromise on Windows Endpoints with Osquery
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Web Exploitation Security
Web Exploitation SecurityWeb Exploitation Security
Web Exploitation Security
 
Application and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental EditionApplication and Website Security -- Fundamental Edition
Application and Website Security -- Fundamental Edition
 
BlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural netBlueHat v18 || Malicious user profiling using a deep neural net
BlueHat v18 || Malicious user profiling using a deep neural net
 
Connection String Parameter Pollution Attacks
Connection String Parameter Pollution AttacksConnection String Parameter Pollution Attacks
Connection String Parameter Pollution Attacks
 
Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]Carlos García - Pentesting Active Directory [rooted2018]
Carlos García - Pentesting Active Directory [rooted2018]
 
Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017Awesome_fuzzing_for _pentester_red-pill_2017
Awesome_fuzzing_for _pentester_red-pill_2017
 
Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)Advanced SQL injection to operating system full control (whitepaper)
Advanced SQL injection to operating system full control (whitepaper)
 
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TIMenggunakan Kali Linux Untuk  Mengetahui Kelemahan Implementasi TI
Menggunakan Kali Linux Untuk Mengetahui Kelemahan Implementasi TI
 
Flashack
FlashackFlashack
Flashack
 
Adding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, AuthorizationAdding Identity Management and Access Control to your Application, Authorization
Adding Identity Management and Access Control to your Application, Authorization
 
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
 
Art of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya MorimotoArt of Web Backdoor - Pichaya Morimoto
Art of Web Backdoor - Pichaya Morimoto
 
Cache poisoning
Cache poisoningCache poisoning
Cache poisoning
 
Hunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows EnvironmentHunting for Credentials Dumping in Windows Environment
Hunting for Credentials Dumping in Windows Environment
 
Http response splitting
Http response splittingHttp response splitting
Http response splitting
 
Http requesting smuggling
Http requesting smugglingHttp requesting smuggling
Http requesting smuggling
 
CQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slidesCQURE_BHAsia19_Paula_Januszkiewicz_slides
CQURE_BHAsia19_Paula_Januszkiewicz_slides
 

Ähnlich wie Web Server and Web Technology Exam paper

C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
C L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{WwwC L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{Www
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
guest3f9c6b
 
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
guest3f9c6b
 
DotNet Introduction
DotNet IntroductionDotNet Introduction
DotNet Introduction
Wei Sun
 
Vulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsVulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing Levels
Positive Hack Days
 
Yogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’s
Yogesh Kushwah
 
Vulnerabilities in data processing levels
Vulnerabilities in data processing levelsVulnerabilities in data processing levels
Vulnerabilities in data processing levels
beched
 

Ähnlich wie Web Server and Web Technology Exam paper (20)

Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdf
 
Computer networking mcis 6163 project
Computer networking mcis 6163 projectComputer networking mcis 6163 project
Computer networking mcis 6163 project
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
Đề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ AptechĐề thi lý thuyết DWSJ Aptech
Đề thi lý thuyết DWSJ Aptech
 
gofortution
gofortutiongofortution
gofortution
 
web component_development
web component_developmentweb component_development
web component_development
 
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
C L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{WwwC L I E N T   S E R V E R  C O M P U T I N G  J N T U  M O D E L  P A P E R{Www
C L I E N T S E R V E R C O M P U T I N G J N T U M O D E L P A P E R{Www
 
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}Client  Server Computing Jntu Model Paper{Www.Studentyogi.Com}
Client Server Computing Jntu Model Paper{Www.Studentyogi.Com}
 
Perf test Eng interview preparation
Perf test Eng interview preparationPerf test Eng interview preparation
Perf test Eng interview preparation
 
Was faqs
Was faqsWas faqs
Was faqs
 
Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data center
 
Architecting big data solutions in the cloud
Architecting big data solutions in the cloudArchitecting big data solutions in the cloud
Architecting big data solutions in the cloud
 
Web Security
Web SecurityWeb Security
Web Security
 
Bt0083 server side programing
Bt0083 server side programing Bt0083 server side programing
Bt0083 server side programing
 
DotNet Introduction
DotNet IntroductionDotNet Introduction
DotNet Introduction
 
Vulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing LevelsVulnerabilities on Various Data Processing Levels
Vulnerabilities on Various Data Processing Levels
 
300 208 exam dumps
300 208 exam dumps300 208 exam dumps
300 208 exam dumps
 
Dot Net Nuke Presentation
Dot Net Nuke PresentationDot Net Nuke Presentation
Dot Net Nuke Presentation
 
Yogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’sYogesh kumar kushwah represent’s
Yogesh kumar kushwah represent’s
 
Vulnerabilities in data processing levels
Vulnerabilities in data processing levelsVulnerabilities in data processing levels
Vulnerabilities in data processing levels
 

Kürzlich hochgeladen

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 

Kürzlich hochgeladen (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Web Server and Web Technology Exam paper

  • 1. 1. Networking (Total marks for this question: 20) a) What is the purpose of Internet Protocol (IP)? Provide four (4) of its features. (4 Marks). b) You have purchased a domain name www.socit.net and set up the web server to only listen to port 3080. When users type www.socit.net into their browser, an error is reported saying that the server is not responding. Your server is definitely running. Why is the error message returned? How can the site be accessed successfully? (4 Marks). c) Assume you need to setup a network consists of about 1000 hosts and you were given 192.160.128.0 segment as the initial IP address. i) Determine the most suitable netmask address (in both binary and decimal format) to minimize the wastage of IP addresses. Show your working in obtaining the netmask address. ii) How many IP addresses can be used in your answer to question c.i ? iii) What are the first usable IP address and the lass usable IP address on this network? Show your workings to obtain the addresses. (6+2=4 = 12 Marks). 2. HTTP and Apache (Total marks for this question: 35) a) Explain briefly what the following HTTP Status codes mean: i) 200 OK. ii) 302 NOT MODIFIED. iii) 400 BAD REQUEST. iv) 500 INTERNAL ERROR (1+1+1+1 = 4Marks). b) Describe what the following server-level directives in Apache 2.0 do: i) AddType. ii) CustomLog. iii) DocumentRoot. (2+2+2=6 Marks). c) Describe what the following directory-leve directives in Apache 2.0 do: i) Allow from ii) AllowOverride. iii) DirectoryIndex. (2+2+2=6 Marks).
  • 2. d) Answer the following question based on the sample HTTP request below: Connect to 203.176.151.15 on port 80 ... ok GET / HTTP / 1.1 Host: m.taylors.edu.my Connections: close User-Agent: Mozilla/5.0 (windows; U; Windows NT 5.1; en-US; Rv:1.9.0.1) Gecko/2008070208 Firefox/3.0.1 Accept-Encoding: gzip Accept-Charset: ISO-8859-1, UTF-8; q=0.7,*;q=0.7 Cache-Control: no-cache Accept-Language: de,en-gb;q=0.7,en-us;q=0.3 Referer: http://web-siffer.net i) Is the request using persistent connections? Provide the reasons that support your answer. ii) Identify all the request header fields in the above sample HTTP request. iii) Explain what the values of the Accept-Language in the above sample HTTP request indicate. (3+3+3=9 Marks).
  • 3. e) Answer the following question based on the sample HTTP response below: Status: HTTP/1.1 301 Moved Permanently Date: Sat, 24 Sep 2011 15:46:43 GMT Server: Apache/2.2.11 (Win32) mode_ssl/2.2.11 OpenSSL/0.9.8i PHP/5.2.9 Set-Cookies: MoodelSession=69d6469642e223c3aa23ad2d0667ed0f; path=/ Cache-Control: private, pre-check=0, post-check=0, max-age=0 Pragma: no-cache Content-Language: en Content-Script-Type: text/javascript Content-Style-Type: text/css Acceept-Ranges: none Connection: close Content-Type: text/html; charset=utf-8 i) Explain what the status code in this example indicates. ii) What Operating System does the server reside on? iii) What is the function of the Set-Cookie header? (3+1+2=6 Marks). f) Provide 2 advantages and 2 disadvantages of the event-driven web server architecture. (4 Marks). 3. Web Security (Total marks for this question: 35) a) Differentiate between authentication and authorization. Provide suitable examples to support your answer. (4 Marks). b) You are the web server administrator for your organization. Due to security issues, your are required to provide digest authentication in your Apache server for the following directory: /www/private/management. Only the users that belong to the group manager are allowed to access this directory. The password file called digest is located in the following directory: /usr/local/apache/passwd. Show how the per-directory configuration directive in your httpd.conf file should look like, based on the information given. (6 Marks).
  • 4. c) What directives would you add into your per-directory configuration in part (b) to only allow users from your network (called www.acme.net) to access the /www/private/management directory, and no one else can access the directory? (3 Marks). d) What is the utility program used to create the password file for digest authentication called? (1 Mark). e) Why is digest authentication more secure than basic authentication? Explain in detail. (4 Marks). f) Explain in detail how symmetric key encryption works. (5 Marks). g) Provide a concise definition for the following terms: i) SYN flooding. ii) Public Key Infrastructure (PKI). iii) Webjacking (2+2+2=6 Marks). h) Draw a diagram the depicts a screened host gateway firewall architecture, and provide a brief description on this architecture. 4. Web Server Performance (Total marks for this question: 20) a) When tuning a web server, allowing DNS lookups can add to network latency. Explain in detail why. (4 Marks).
  • 5. b) The following is the performance configuration directives (and default values) for the prefork multi-processing module (MPM): <IfModule prefork.c> StartServers 5 MinSpareServers 5 MaxSpareServers 5 MaxClients 150 MaxRequestPerChild 0 </IfModule> i) What does the StartServer directive specify? ii) What is the MinSpareServers directive responsible for? iii) Explain what the value of MaxRequestPerChild 0 means. (1+1+2 = 4 Marks). c) Provide on example of the type of web application that would benefit from using the prefork Multi-Processing Module and one type for the worker Multi-Processing Module. Briefly explain why as well. (4 Marks). d) Web server log files are very useful in measuring the performance of a web server. i) What type of data is recorded in server log files? ii) Why is the default log format for Apache the common log format? iii) Although log files help in measuring the performance of a web server, it can also become a potential performance liability on the web server itself. Explain why. How can this potential performance liability be overcome? (2+2+4 = 8 Marks). 5. Caching and Load Balancing (Total marks for this question: 10) a) Propagation delay and session persistence ('stickiness') are parameters that affect load balancing. Briefly explain what these two parameters refer to. (10 marks)