Application Protocols (3 marks)
Describe the function of any two protocols that operate at the Application layer.
Application Protocols (3 marks) Read More »
Describe the function of any two protocols that operate at the Application layer.
Application Protocols (3 marks) Read More »
Identify the layer at which each of the following protocols operates: a) HTTPS b) TCP c) IP
Protocol Layers (3 marks) Read More »
Explain the main function of each of the following two layers in the TCP/IP model: a) Application layer b) Transport layer
Layer Functions (2 marks) Read More »
List the four layers of the TCP/IP model.
Identify the Network Layers (4 marks) Read More »
How can authentication, encryption, firewalls, and MAC address filtering be integrated to provide comprehensive network security?
Integrated Security Approach (4 marks) Read More »
Explain MAC address filtering and when it might be used as a security method.
MAC Address Filtering (2 marks) Read More »
What is a firewall, and how has its use evolved to enhance network security?
Firewall (3 marks) Read More »
Describe encryption and give an example of how it contributes to network security.
Encryption (2 marks) Read More »
Explain what authentication is and provide an example of when it would be used in a network.
Authentication (2 marks) Read More »
Why is network security crucial in modern computer networks?
Importance of Network Security (2 marks) Read More »
Notifications