Data Interception and Theft. (3 marks)
Explain how data interception can occur and outline two measures that can be implemented to prevent data theft.
Data Interception and Theft. (3 marks) Read More »
Explain how data interception can occur and outline two measures that can be implemented to prevent data theft.
Data Interception and Theft. (3 marks) Read More »
Describe a Denial of Service (DoS) attack and discuss one method an organisation can use to protect against such attacks.
Denial of Service Attacks. (2 marks) Read More »
What is a brute-force attack, and why is it effective against weak security systems?
Brute-force Attack. (2 marks) Read More »
Explain the concept of phishing and describe how it can be used to compromise computer security.
Social Engineering – Phishing. (3 marks) Read More »
Describe how malware can pose a threat to computer systems. Include in your answer an example of a specific type of malware and the impact it can have on a device.
Malware. (2 marks) Read More »
Explain the four-layer TCP/IP model used in networking. Describe each layer and its primary function.
TCP/IP Model. (4 marks) Read More »
Describe the purpose and key features of the following protocols: a) HTTP b) HTTPS c) SMTP
Communication Protocols. (6 marks) Read More »
Explain the concept of a standard in computing and why it is important for hardware and software from different manufacturers to adhere to recognised standards. Your answer should include specific examples of how standards facilitate compatibility.
Standards and Protocols (4 marks) Read More »
What is a MAC address and how is it used in a network?
MAC Address Usage. (2 marks) Read More »
Describe the format of IPv4 addresses and explain the differences between IPv4 and IPv6 addressing. Why is IPv6 increasingly important?
IP Addressing. (4 marks) Read More »