Purpose of Penetration Testing (2 marks)
What is penetration testing and why is it important for network security?
Purpose of Penetration Testing (2 marks) Read More »
What is penetration testing and why is it important for network security?
Purpose of Penetration Testing (2 marks) Read More »
Give one advantage and one disadvantage of using wireless connections instead of wired ones. Then explain why encryption is especially important in wireless networks.
Wireless vs Wired Networks (3 marks) Read More »
Explain what happens when you type a URL into your browser until the correct website appears.
DNS and URL Resolution (4 marks) Read More »
Explain three different ways to protect a network from unauthorised access or attack.
Network Security Measures (6 marks) Read More »
Identify the type of malware described in each of the following scenarios: A. Slows a computer down by endlessly replicating B. Pretends to be a useful program but causes damage C. Secretly records your keystrokes D. Bombards you with unwanted advertisements
Features of Malware Types (4 marks) Read More »
Describe two ways to reduce the risk of a brute force attack. Then explain how one of them works.
Preventing Brute Force Attacks (3 marks) Read More »
What is phishing, and how does it trick users?
Security Threat: Phishing (2 marks) Read More »
Data is broken into packets when sent over a network. For the following components, explain their purpose in the packet: – Destination address (in the header) – Sequence number (in the header) – Return address (in the header) – Checksum – Data
Data Packet Structure (5 marks) Read More »
List three advantages of using a Local Area Network (LAN).
Advantages of LANs (3 marks) Read More »
Give one key difference between a LAN and a WAN. Then give one example of each.
LAN vs WAN (2 marks) Read More »