Social Engineering Methods (2 marks)
Discuss two methods by which social engineering can be used to compromise computer security.
Social Engineering Methods (2 marks) Read More »
Discuss two methods by which social engineering can be used to compromise computer security.
Social Engineering Methods (2 marks) Read More »
Explain how weak and default passwords can pose a cyber security threat.
Weak Passwords. (2 marks) Read More »
Explain two main purposes of cyber security.
Purposes of Cyber Security. (4 marks) Read More »
Describe the function of any two protocols that operate at the Application layer.
Application Protocols (3 marks) Read More »
Identify the layer at which each of the following protocols operates: a) HTTPS b) TCP c) IP
Protocol Layers (3 marks) Read More »
Explain the main function of each of the following two layers in the TCP/IP model: a) Application layer b) Transport layer
Layer Functions (2 marks) Read More »
List the four layers of the TCP/IP model.
Identify the Network Layers (4 marks) Read More »
How can authentication, encryption, firewalls, and MAC address filtering be integrated to provide comprehensive network security?
Integrated Security Approach (4 marks) Read More »