Brute-force Attack. (2 marks)
What is a brute-force attack, and why is it effective against weak security systems?
Brute-force Attack. (2 marks) Read More »
What is a brute-force attack, and why is it effective against weak security systems?
Brute-force Attack. (2 marks) Read More »
Describe a Denial of Service (DoS) attack and discuss one method an organisation can use to protect against such attacks.
Denial of Service Attacks. (2 marks) Read More »
Explain the four-layer TCP/IP model used in networking. Describe each layer and its primary function.
TCP/IP Model. (4 marks) Read More »
Describe how malware can pose a threat to computer systems. Include in your answer an example of a specific type of malware and the impact it can have on a device.
Malware. (2 marks) Read More »
What is a MAC address and how is it used in a network?
MAC Address Usage. (2 marks) Read More »
Explain the concept of a standard in computing and why it is important for hardware and software from different manufacturers to adhere to recognised standards. Your answer should include specific examples of how standards facilitate compatibility.
Standards and Protocols (4 marks) Read More »
Describe the purpose and key features of the following protocols: a) HTTP b) HTTPS c) SMTP
Communication Protocols. (6 marks) Read More »
Explain how encryption can secure data transmitted over a network. Include an example of a situation where encryption is crucial.
Principles of Encryption. (2 marks) Read More »
Describe the format of IPv4 addresses and explain the differences between IPv4 and IPv6 addressing. Why is IPv6 increasingly important?
IP Addressing. (4 marks) Read More »
Discuss the advantages and disadvantages of using cloud-based services for data storage.
Advantages and Disadvantages of Cloud-Based Services for Data Storage. (4 marks) Read More »