Network Hardware (6 marks)
Describe the roles of routers, switches, and wireless access points in a network. For each device, provide one primary function and one additional function.
Network Hardware (6 marks) Read More »
Describe the roles of routers, switches, and wireless access points in a network. For each device, provide one primary function and one additional function.
Network Hardware (6 marks) Read More »
Compare and contrast star and mesh network topologies. Discuss one advantage and one disadvantage for each topology mentioned.
Network Topologies (4 marks) Read More »
Explain the advantages and disadvantages of using a network compared to standalone computers. Provide one advantage and one disadvantage.
Characteristics of Networks (2 marks) Read More »
Give one example of a backup procedure and explain how it contributes to the recovery process in the event of data loss.
Backup and Recovery Procedures (2 marks) Read More »
What is the role of acceptable use policies in the context of cyber security, and how should they be implemented effectively?
Implementation of Acceptable Use Policies (3 marks) Read More »
Explain how encryption can be used to protect sensitive data within a digital system.
Encryption for Data Protection (2 marks) Read More »
Discuss two methods of protecting digital systems and data from malware.
Methods of Protecting Against Malware (2 marks) Read More »
Describe one social engineering technique used by cyber attackers to trick users into compromising their own security.
Social Engineering Techniques (2 marks) Read More »
Explain how hackers can exploit unpatched software to carry out cyberattacks. Include one example of such a vulnerability in your answer.
Exploitation of Technical Vulnerabilities by Hackers (3 marks) Read More »
Outline two different ways in which malware such as ransomware can pose a threat to digital systems.
Understanding Malware Threats (2 marks) Read More »
Notifications