Section 5 Summary Questions


Previous: 5.05 - Network Security



State two advantages of connecting computers together into networks. [2]

Tap/click to reveal Any two from:
• Sharing files and resources (including devices like printers) across the network is a lot easier ✓
• The computers can be centrally managed, so software can be updated remotely on all computers at once ✓
• Accounts can be stored centrally, so users can log in from any device on the network ✓
• Other reasonable advantage ✓



What does a switch do? [1]

Tap/click to reveal Sends data packets to devices on the network. ✓



Give three advantages of a star topology. [3]

Tap/click to reveal Any three from:
• There are less data collisions on star topology networks than on bus topology networks ✓
• Data transmission is usually quicker on star topology networks ✓
• Star topology networks are more secure because the data is only sent to its intended recipient ✓
• It is easier to add new devices to a star topology network ✓



Draw five computers connected in a bus topology network. [2]

Tap/click to reveal

Central bus cable ✓
Everything else correct ✓



What is a network protocol? [2]

Tap/click to reveal A set of rules ✓
for how devices communicate across a network ✓




Table 1 shows the protocols in three of the layers of the TCP/IP model.

Table 1

Layer Protocols
Application HTTP, HTTPS, FTP, SMTP, IMAP
Transport TCP and UDP
Internet IP

Describe in detail the role of one protocol from each layer in Table 1. [9]

Tap/click to reveal Three marks available per layer. In each layer: detailed description scores 3; some description scores 2; statements made scores 1.

Example of detailed description [3]:
HTTPS is an extension of HTTP and allows secure transfer of data between a browser and a website by encrypting data. The web browser will check the website server's security certificate and ensure it is legitimate. This means it's not possible to see or eavesdrop on what you're browsing or for your data to be stolen.

Example of some description [2]:
HTTPS allows secure transfer of data between a browser and a website by encrypting the data being transferred to stop your data being stolen. It does this by checking a security certificate to see if the website is legitimate.

Example of statements [1]:
In HTTPS the S stands for secure and stops your data being stolen on a website. It encrypts your data.


Indicative content:

HTTP
Provides a way for users to interact with web resources. Transmits messages between client and server using hypertext.

HTTPS
As HTTP but in addition uses an encryption protocol to ensure communications are secure.

SMTP
Enables users to send (and receive) email messages. Initiates sessions between user and mail server. Server then forwards messages. Uses a process called 'store and forward' to store messages and forward as necessary. The server decides which server to send the message to and the inbox provider then downloads the message and places it in the recipient's inbox. Often used in conjunction with IMAP.

IMAP
Stores email messages on an ISPs server but allows user to manipulate messages as though on a local device. Local devices access the ISP server to access the messages. IMAP works with desktop clients and webmail clients. Allows simultaneous logins from different devices to one account.

FTP
Allows secure transfer of files between client and server. Files are uploaded to and downloaded from the server using FTP.

TCP
Connects network devices to the Internet. It defines how applications can create channels of communication across a network. It manages how a message is assembled into smaller packets before transmission and reassembles packets in the correct order at destination.

UDP
Communications protocol that establishes low latency and loss-tolerating connections between applications. Enables the transfer of data before an agreement is provided by the receiving party. This speeds up transfers. Can start transferring data before agreement is received from receiving party.

IP
Relays data across network boundaries. It defines how to address and route each packet to make sure it reaches the right destination.



Explain how MAC address filtering works. [2]

Tap/click to reveal The switch or Wireless Access Point takes the unique MAC address of a device ✓
and only allows it to connect if it is in the list of allowed addresses (whitelist) ✓





Next: 6.01 - Cyber Security Threats



© Rujul Nayak 2024-