Anonymous

Register for more FREE stuff!

my subscriptions

Networks

Question 1

[Maximum mark: 2]



Identify two layers in the OSI seven-layer model.

Answers and Explanations

Question 2

[Maximum mark: 10]



Organizations often use Virtual Private Networks (VPNs) to allow remote employees to access files on the company's server.


(a) Name two essential technologies required to establish a VPN.


(b) List two factors that could impact the speed of data transmission over a network.


(c) Describe why data compression is beneficial during data transmission.


(d) Explain how encryption helps in protecting sensitive data stored online.


(e) What is the function of a firewall in network security?

Answers and Explanations

Question 3

[Maximum mark: 9]



The company’s IT department is evaluating different strategies to protect and manage their sensitive data more effectively.


(a) State two benefits of using a dedicated VPN server for the company’s network.


(b) Identify two measures to mitigate the risk of data breaches.


(c) Explain how a strong password policy helps in securing user accounts.


(d) Discuss one challenge associated with maintaining data backups.

Answers and Explanations

Question 4

[Maximum mark: 8]



A company operates a large networked computer system. While some data is non-sensitive and poses no risk if accessed, other data is highly sensitive, including financial records, trade secrets, and personal information about employees or clients.


(a) Describe two methods for managing access to sensitive data.


(b) Describe two approaches to enhance the security of the company's network.


(c) Explain the methods used to recover data from corrupted files.


(d) Explain one advantage of implementing a virtual private network (VPN) for the company.

Answers and Explanations

Question 5

[Maximum mark: 2]



Identify two differences between a wide area network (WAN) and a local area network (LAN).

Answers and Explanations

Question 6

[Maximum mark: 2]



Outline one reason why standards are important in network design.

Answers and Explanations

Question 7

[Maximum mark: 8]



A company manages a complex network with both sensitive and non-sensitive data.

a) Outline two methods for controlling access to sensitive information.

b) Describe two strategies to enhance the security of the company’s network.

c) Explain how data recovery is possible when files become corrupted.

d) State one advantage of implementing a virtual private network (VPN) for the company.

Answers and Explanations

Question 8

[Maximum mark: 2]



Identify two roles that a computer can fulfill within a networked environment.

Answers and Explanations

Question 9

[Maximum mark: 2]



List two reasons why fibre optic cables might be preferred over wireless connections.

Answers and Explanations

Question 10

[Maximum mark: 2]



Explain how data is transmitted by packet switching.

Answers and Explanations

Question 11

[Maximum mark: 2]



Explain the role of a router in a network.


Answers and Explanations

Question 12

[Maximum mark: 2]



List two advantages of using cloud storage.


Answers and Explanations

Question 13

[Maximum mark: 2]



Describe how a VPN enhances security for remote workers.


Answers and Explanations