5 Networks
1 Which one of these connects a LAN to a WAN? (1)
A Switch
B Gateway
C Modem
D Server
B Gateway
2 Explain why public key encryption is more secure than symmetric key encryption. (2)
Public key encryption uses two mathematically related keys called a key pair. One key is used to encrypt the data and a different key is used to decrypt it but symmetric key encryption uses the same key at the both ends of the process. That's why, public key encryption is more secure than symmetric key encryption.
3 State which security device controls the traffic entering a network. (1)
A firewall is a security device that controls the traffic entering a network by examining and filtering incoming and outgoing network traffic based on a set of predefined security rules.
4 State two methods by which devices are identified to each other on a network. (2)
a) Internet Protocol (IP) address, a unique address that networked devices use to send data to each other.
b) Media Access Control (MAC) address, universally unique identifier given to the network interface card (NIC).
5 Explain why IPv6 was used to replace IPv4. (2)
IPv6 was developed to address the limitations of IPv4 and to ensure that the internet can continue to grow and evolve to meet the needs of users and applications in the future.
6 State two uses for a VPN. (2)
a) An individual might use a VPN to access their employer's network when working from home.
b) An individual might use a VPN to make secure payments.
7 State the reason why a booster is used in a network. (1)
A booster is used in a network to amplify the signal in a network so that its range can be extended.
8 Describe how encryption secures data. (3)
Encryption involves applying a mathematical algorithm to original data using a secret key to produce encrypted data that can only be decrypted by someone with the correct key. This technique is widely used to protect the confidentiality and integrity of sensitive data during transmission or storage. It is important to keep the encryption key secure and share it only with authorized users to ensure the data remains protected.
9 List three methods of securing data on networks. (3)
a) Encryption, involves scrambling data using a mathematical algorithm and key to protect sensitive data during transmission or storage.
b) Firewall, a security system that controls incoming and outgoing network traffic to prevent unauthorized access and protect against security threats.
c) Access control, restricts access to data, applications, or resources based on user identity, role, or other criteria, ensuring that only authorized users have access to sensitive data.
10 State three benefits of users of using a local area network. (3)
a) Access to shared peripherals
b) Access to shared storage and data
c) Shared access to the internet
11 Draw and label a network diagram for a home that includes: (4)
Two smartphones
One tablet device
Two desktop Ps
Internet access

Comments
Post a Comment