State the primary function of the Dynamic Host Configuration Protocol (DHCP) protocol.
List three characteristics of Internet Protocol version 6 (IP6).
Explain two ways in which an interpreter and a compiler are different.
Explain each of the strategies listed below.
(a) Phishing
(b) DoS
(a) Phishing
(b) DoS
List two primary functions of a domain name server.
When developing a network security policy, it is important to understand the threats that can be made against a network. ‘IP spoofing’ and ‘back doors’ are two techniques that can compromise the security of a network. Describe each of these techniques.
IP spoofing
A technique used to gain unauthorised access to a computer whereby an intruder sends messages to that computer from a false IP address
Back door:
An undocumented method of gaining access to a program, online service or an entire computer system
Explain, with examples where appropriate, the following five computer terms.
(a) Buffer
(b)batch processing
(c) e-commerce
(d) simulation
(a) Buffer
(b)batch processing
(c) e-commerce
(d) simulation
(e) Email
Describe three possible threats to the computers connected to the network and give one way each threat can be reduced or prevented
Virus / trojan / worm / malware
Prevention
Spyware / malware / keylogger
Prevention
Data interception / passive
Prevention
Phishing
Prevention
Pharming
Prevention
Hacker
Prevention
Give two other uses of hexadecimal in computer science.
A company has a website that is stored on a web server.
(a) The website data is broken down into packets to be transmitted to a user.
Describe the structure of a data packet.
A web server has an internet protocol (IP) address. Give three characteristics of an IP address.
Identify the network component that uses the IP address to send data only to its correct destination
Router
The website has a uniform resource locator (URL).
An example of a URL is given.
https://www.google.co.ke/index.html
Complete the table to identify the name of each section of the URL.
https : protocol
google.co.ke: domain name
/index.html: webpage/file name
State two advantages and one disadvantage of having a network of computers, rather than a series of stand-alone machines, in a school classroom.
Advantages
Disadvantages
Identify the protocol used to transfer data in networks.
Below is a labelled diagram of a star topology network.
(a) Other than the items labelled above state the hardware required by every computer to connect to a network
b) Describe how a packet is transmitted from computer A to computer D, including the role of the switch
(a)
(b)
State the function of a switch in a computer network
State five functions of network operating system
State email protocols
Many organisations provide free public access to a wireless network.
Explain three ethical, legal or data privacy issues that an organisation should be aware of when allowing this access