Ethical Hacking (1 mark)
What is ethical hacking, and how does it differ from malicious hacking?
Ethical Hacking (1 mark) Read More »
What is ethical hacking, and how does it differ from malicious hacking?
Ethical Hacking (1 mark) Read More »
List two methods of protecting networks that control access to network resources.
Protecting Networks (2 marks) Read More »
Explain why network security is essential for modern businesses.
Importance of Network Security (2 marks) Read More »
Describe penetration testing and how it helps in identifying network vulnerabilities.
Penetration Testing and Network Vulnerabilities (2 marks) Read More »
Explain one advantage and one disadvantage of using a star network topology compared to a bus network topology.
Advantages and Disadvantages of a Star Topology (2 marks) Read More »
A company is considering upgrading their network to a full mesh topology. Provide two reasons why a full mesh topology might be beneficial for a company that requires high availability and explain how a full mesh topology provides these benefits.
Mesh Topology Application (3 marks) Read More »
Compare and contrast a mesh network with a star network in terms of scalability and fault tolerance. Provide two points for comparison.
Comparing Topologies (4 marks) Read More »
Your school is currently using a star topology for its computer network but is considering moving to a wireless mesh network. Discuss the implications of such a change on network performance and management. Include three implications in your discussion.
Topology Choice – Practical Application (6 marks) Read More »
Explain the purpose of each layer in the TCP/IP model and how they rely on the layer below to handle data transmission over a network.
The Four Layers of the TCP/IP (5 marks) Read More »
Illustrate the function of the Internet layer in handling data packets. Include in your answer how this layer facilitates routing.
The Function of the Internet layer (3 marks) Read More »