Non-Physical Network Protection (2 marks)
Identify and explain one method of non-physical network protection.
Non-Physical Network Protection (2 marks) Read More »
Identify and explain one method of non-physical network protection.
Non-Physical Network Protection (2 marks) Read More »
Discuss the role of physical security measures in protecting a network’s hardware and data.
Physical Security (3 marks) Read More »
Explain how firewalls contribute to network security.
Firewalls and Security (1 mark) Read More »
List two methods of protecting networks that control access to network resources.
Protecting Networks (2 marks) Read More »
What is ethical hacking, and how does it differ from malicious hacking?
Ethical Hacking (1 mark) Read More »
Describe penetration testing and how it helps in identifying network vulnerabilities.
Penetration Testing and Network Vulnerabilities (2 marks) Read More »
Explain why network security is essential for modern businesses.
Importance of Network Security (2 marks) Read More »
Your school is currently using a star topology for its computer network but is considering moving to a wireless mesh network. Discuss the implications of such a change on network performance and management. Include three implications in your discussion.
Topology Choice – Practical Application (6 marks) Read More »
Compare and contrast a mesh network with a star network in terms of scalability and fault tolerance. Provide two points for comparison.
Comparing Topologies (4 marks) Read More »
A company is considering upgrading their network to a full mesh topology. Provide two reasons why a full mesh topology might be beneficial for a company that requires high availability and explain how a full mesh topology provides these benefits.
Mesh Topology Application (3 marks) Read More »