MAC Address Filtering (2 marks)
Explain MAC address filtering and when it might be used as a security method.
MAC Address Filtering (2 marks) Read More »
Explain MAC address filtering and when it might be used as a security method.
MAC Address Filtering (2 marks) Read More »
What is a firewall, and how has its use evolved to enhance network security?
Firewall (3 marks) Read More »
Describe encryption and give an example of how it contributes to network security.
Encryption (2 marks) Read More »
Explain what authentication is and provide an example of when it would be used in a network.
Authentication (2 marks) Read More »
Why is network security crucial in modern computer networks?
Importance of Network Security (2 marks) Read More »
Explain the purpose of FTP, SMTP, and IMAP in the context of network protocols.
FTP, SMTP, and IMAP (3 marks) Read More »
Compare and contrast the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
TCP vs. UDP (4 marks) Read More »
What is the purpose of Wi-Fi and why is it referred to as a family of protocols?
Purpose and Use of Wi-Fi (2 marks) Read More »
Explain the purpose and use of Ethernet in networking.
Purpose and Use of Ethernet (2 marks) Read More »