0% found this document useful (0 votes)
9 views33 pages

Print

Uploaded by

skilzababy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views33 pages

Print

Uploaded by

skilzababy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Describe two differences between a PAN and a WAN.

1.
Difference 1 _____________________________________________________________

_______________________________________________________________________

Difference 2 _____________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Shade two lozenges to show which statements are true about LANs.
2.
A LANs always use the Ethernet protocol.

B LANs always use wireless technology.

C LANs are usually controlled or owned by a single organisation.

D LANs connect a maximum of 150 devices.

E LANs cover one room, building or site.

(Total 2 marks)

State two differences between a bus topology and a star topology.


3.
Difference 1 _____________________________________________________________

_______________________________________________________________________

Difference 2 _____________________________________________________________

_______________________________________________________________________
(Total 2 marks)

HTTP is an example of a network protocol.


4.
Define the term network protocol.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Dubai College Page 1 of 33


The application layer and the transport layer are two of the layers within the TCP/IP model.
5.
What are the names of the other two layers of the TCP/IP model?

1. _____________________________________________________________________

_______________________________________________________________________

2. _____________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Computer networks can be installed using wired or wireless technology.


6.
State one wireless method used to connect devices on a Personal Area Network (PAN).

_______________________________________________________________________

_______________________________________________________________________
(Total 1 mark)

Computer networks can be installed using wired or wireless technology.


7.
Describe two differences between a Local Area Network (LAN) and a Wide Area Network
(WAN).

1 _____________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

2 _____________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Dubai College Page 2 of 33


Computer networks can be installed using wired or wireless technology.
8.
Give three advantages of using a wireless network instead of a wired network.

1 _____________________________________________________________________

_______________________________________________________________________

2 _____________________________________________________________________

_______________________________________________________________________

3 _____________________________________________________________________

_______________________________________________________________________
(Total 3 marks)

Computer networks can be installed using wired or wireless technology.


9.
Shade one lozenge to indicate the application layer protocol used for sending emails from a
client device to a mail server.

A FTP

B HTTP

C SMTP

D UDP

(Total 1 mark)

Computer networks can be installed using wired or wireless technology.


10.
Explain the purpose of the HTTPS protocol.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Dubai College Page 3 of 33


Define the term computer network.
11.
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Explain how a firewall can be used to improve the security of a computer network.
12.
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Authentication and MAC address filtering can be used to improve network security.
13.
Explain how one of these security methods works.

Ring your chosen security method:

Authentication MAC address filtering

How it works ___________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Dubai College Page 4 of 33


Shade the two lozenges that are correct statements about network protocols.
14.

A A protocol is a set of rules.

B All protocols only work with specific hardware.

C All protocols transmit data securely.

D Ethernet is a family of protocols.

E Wi-Fi is a single protocol.

(Total 2 marks)

Explain one data privacy concern an organisation would need to consider when setting up a
15. wireless network.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

The table below shows three layers of the TCP/IP model and some protocols that operate at
16. each of these layers.

Layer Protocol

HTTP
HTTPS
Application layer SMTP
IMAP
FTP

TCP
Transport layer
UDP

Internet layer IP

Dubai College Page 5 of 33


Describe the role of one protocol from each layer in the table above. You must state which
protocol you are describing.

Application layer protocol _________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

Transport layer protocol ___________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

Internet layer protocol ____________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 9 marks)

Dubai College Page 6 of 33


Define the term ‘computer network’.
17.
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Computer networks can be wired or wireless.


18.
Discuss the advantages and disadvantages of wired and wireless networks.

In your answer you should:

• discuss the advantages and disadvantages of each network type


• compare the security of wired and wireless networks.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 9 marks)

Dubai College Page 7 of 33


State which layer of the TCP/IP model each of the network protocols operates at by ticking one
19. box in each row of the table.

Network Application Transport


Internet layer Link layer
Protocol layer layer

HTTP

UDP

IP

IMAP

(Total 4 marks)

Draw a simple diagram to show a star network topology containing four desktop computers.
20.

(Total 2 marks)

Draw a simple diagram to show a bus network topology containing four desktop computers.
21.

(Total 2 marks)

State two advantages of using a star topology instead of a bus topology.


22.
1______________________________________________________________________

_______________________________________________________________________

2______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)
Dubai College Page 8 of 33
State one disadvantage of using a star topology instead of a bus topology.
23.
_______________________________________________________________________

_______________________________________________________________________
(Total 1 mark)

Discuss the benefits and risks of using a computer network.


24.
(Total 9 marks)

Define the term network protocol.


25.
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Which two of the following are email protocols?


26.
Shade two lozenges.

A FTP

B HTTP

C IMAP

D SMTP

E TCP

F UDP

(Total 2 marks)

Explain why a firewall improves network security.


27.
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Dubai College Page 9 of 33


The four layers of the TCP/IP network model are shown below.
28.
For each row in the table below, write the letter A, B, C or D that matches the description.

Each letter should only be used once.

A Application layer
B Transport layer
C Internet layer
D Link layer

Description Letter

Addresses data for transmission

Sets up the communication between the two hosts

Where the network hardware is located

Where the user software, such as web browsers or email


programs, operates

(Total 2 marks)

Most schools have a computer network.


29.
Some schools allow teachers to access the school network from their home computers.

Give one reason why some schools allow this and one reason why some schools do not allow
this.

Reason for: _____________________________________________________________

_______________________________________________________________________

Reason against: __________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Dubai College Page 10 of 33


State three advantages of using a computer network.
30.
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 3 marks)

PANs and LANs are two different types of network.


31.
(a) Describe one difference between a PAN and a LAN.

___________________________________________________________________

___________________________________________________________________
(1)

(b) Give one example of where a PAN could be used.

___________________________________________________________________

___________________________________________________________________
(1)
(Total 2 marks)

When two computers on a network communicate with each other they need to use the same
32. protocol.

Define the term network protocol.

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Dubai College Page 11 of 33


For questions (a) to (c) shade one lozenge to indicate the most suitable protocol to use in the
33. situation described.

(a) Used to retrieve email stored on a server.

A HTTP

B HTTPS

C FTP

D SMTP

E IMAP

(1)

(b) Used to make a payment securely when purchasing goods from a website.

A HTTP

B HTTPS

C FTP

D SMTP

E IMAP

(1)

(c) Used to send an email from a client machine to an email server.

A HTTP

B HTTPS

C FTP

D SMTP

E IMAP

(1)
(Total 3 marks)

Dubai College Page 12 of 33


TCP/IP is a protocol used in networking. There are 4 layers in the TCP/IP stack.
34.
Complete the table by placing the four layers of the TCP/IP stack into order (1-4) where 1 is the
top layer and 4 is the bottom layer.

Layer Order (1-4)

Transport

Link

Internet

Application

(Total 3 marks)

A games café is evaluating the security for their network.


35.
(a) State two reasons why using a biometric authentication measure is better than password
authentication for staff accounts.

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________
(2)

Dubai College Page 13 of 33


(b) Explain why it would not be appropriate for the café to use MAC address filtering on their
wireless network.

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________
(2)
(Total 4 marks)

Explain two differences between a LAN and a WAN.


36.
Difference 1: ____________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

Difference 2: ____________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 4 marks)

HTTP and HTTPS are two application layer protocols.


37.
Explain why HTTPS is often used rather than HTTP.

_______________________________________________________________________

_______________________________________________________________________
(Total 1 mark)

Dubai College Page 14 of 33


The application layer and the network (internet) layer are two of the layers within the TCP/IP
38. stack.

What are the names of the other two TCP/IP stack layers?

1. _____________________________________________________________________

_______________________________________________________________________

2. _____________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

What is the purpose of the network (internet) layer within the TCP/IP stack?
39.
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Explain how MAC address filtering works.


40.
_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________

_______________________________________________________________________
(Total 2 marks)

Dubai College Page 15 of 33


Mark schemes
2 marks for AO1 (understanding)
1.
Maximum of 2 marks from:

• PAN centred round a person / up to 10 metres, WAN is (spread) over a large area; NE
personal on its own
• PAN and WAN use different protocols ( A. examples);
• PAN (typically) has one user, WAN has many users;
• PAN connects a few devices, WAN connects many devices;
• PAN owned by one person; WAN owned / managed by multiple large organisations;

Both PAN and WAN must be referred to (accept implicit


comparisons) for each mark.
e.g. WAN connects more devices (the more acts as an implicit
comparison).
[2]

2 marks for AO1 (recall)


2.
C. LANs are usually controlled or owned by a single organisation.
E. LANs cover one room, building or site.

R. if more than two lozenges shaded


[2]

2 marks for AO1 (understanding)


3.
Maximum of 2 marks from:

• A bus network has all computers connected to a backbone / main cable, computers on a
star network connect to a central device / switch / hub;
• All devices / computers on a bus network see all data transmitted, on a (switched) star
network the data is only seen by the intended device;
• If the backbone / main cable on a bus network fails the whole network fails, on a star
network a single cable breaking is unlikely to affect the whole network;
• Bus backbone / main cable has a terminator at each end, network cards in star act as
terminators;
• Data collisions are less frequent on a star network;
[2]

2 marks for AO1 (recall)


4.
(A set of) rules;
that allow devices / networks to communicate / transfer data;

R. instructions in place of rules


[2]

Dubai College Page 16 of 33


2 marks for AO1 (recall)
5.
1 mark for each correct answer.

• Internet (layer);
• Link (layer) // Network interface (layer) // Network access (layer);

R. Network Layer on its own


[2]

Mark is for AO1 (recall)


6.
Maximum of one mark from:

• Bluetooth;
• Near-field Communication/NFC;
• IrDA/Infrared;
• Zigbee;
• Wireless USB;
• Ultra-wideband/UWB;
[1]

2 marks for AO1 (understanding)


7.
Maximum of two marks from:

• LANs cover relatively small geographical areas // WANs usually cover a wide
geographic area;
• LANs often owned and controlled/managed by a single person/organisation //
WANs often under collective/distributed ownership;
• WANs are (usually) several LANs connected together;
• WANs (usually) have a much larger number of devices/users than LANs;
• LAN has a lower latency // WAN has higher latency;
• WANs are (usually) slower than LANs;
• the cost-per-byte for transmission is much higher on a WAN;
• LANs and WANs use different protocols;
[2]

3 marks for AO1 (understanding)


8.
Maximum of three marks from:

• flexibility to expand network/add users/add own devices to the network;


• there is no need to drill holes/install cabling;
• mobility of user/devices;
• modern devices are more likely to (be designed to) connect wirelessly;
• guest access;
• no trip hazards;

A. cost if valid explanation given


[3]

Dubai College Page 17 of 33


Mark is for AO1 (recall)
9.
C SMTP;

R. if more than one lozenge shaded


[1]

2 marks for AO1 (recall)


10.
Maximum of two marks from:

• sending/receiving web pages;


• using an encrypted connection // provides an encrypted version of HTTP;
• more secure web transactions;
• authentication of the website being visited;
• encryption of the data between the server and the client;
• reduces likelihood of man-in-the-middle attacks;
[2]

2 marks for AO1 (recall)


11.
1 mark for each of the following points:

• two or more computers;


• connected together (to allow communication);
[2]

2 marks for AO1 (understanding)


12.
1 mark for each of the following points (maximum of two marks):

• acts as a barrier / interface between a computer (network) and external connections /


devices;
• inspects incoming and / or outgoing packets of data;
• to see if packets may be malicious;
• to see if packets may be allowed / disallowed by firewall settings / criteria;
• restricts use of certain services / ports;
[2]

Dubai College Page 18 of 33


2 marks for AO1 (understanding)
13.
Marks can only be awarded for one of the two security methods.

1 mark for any of the following points (maximum of two marks):

Authentication:

• takes one or more pieces of data specific to the user;


• and compares them to known / stored credentials // and only allows access to the
system if the credentials are valid;

MAC address filtering:

• takes the (unique / specific) MAC address for a device;


• and checks to see if it is in the list of allowed / blocked addresses // and only allows
device to connect to the system if it has permission to do so;
[2]

2 marks for AO1 (recall)


14.
A A protocol is a set of rules;
D Ethernet is a family of protocols;

R. If more than two lozenges shaded.


[2]

2 marks for AO1 (understanding)


15.
1 mark for any of the following concerns and 1 mark for relevant expansion:

• spoofing or session hijacking; where the attacker assumes the identity of an


authorised user;
• eavesdropping; all network data is broadcast and can be intercepted by third party;
• encrypting data; making sure that data is not transmitted in plain text; by ensuring
that routers have encryption turned on;
• malware infiltration; a Wi-Fi network is more exposed to attack because it’s visible;
• malicious hotspots; unofficial access points that look like they are part of the network;
[2]

Dubai College Page 19 of 33


9 marks for AO1 (understanding)
16.
Level Description Marks

3 There is a good description of the role of one named protocol in 7-9


each layer.
Correct technical language is used throughout.

2 There is some description of the role of one named protocol in each 4-6
layer.
Some correct technical language is used though there may be
errors.

1 Statements are made about the role of one named protocol in each 1-3
layer.
Little or no technical language is used or is used incorrectly.

0 No creditworthy material 0

Guidance to examiners

Good description of protocol role might be:

HTTPS is an extension of HTTP and allows secure transfer of data between a browser and
a website by encrypting data. The web browser will check the website server’s security
certificate and ensure it is legitimate. This means it’s not possible to see or eavesdrop on
what you’re browsing or for your data to be stolen.

Some description of protocol role might be:

HTTPS allows secure transfer of data between a browser and a website by encrypting the
data being transferred to stop your data being stolen. It does this by checking a security
certificate to see if the website is legitimate.

Statements about protocol role might be:

In HTTPS the S stands for secure and stops your data being stolen on a website. It
encrypts your data.

Dubai College Page 20 of 33


Indicative content (role of protocols listed in question)

HTTP Provides a way for users to interact with web resources.


Transmits messages between client and server using hypertext.

HTTPS As HTTP but in addition uses an encryption protocol to ensure


communications are secure.

SMTP Enables users to send (and receive) email messages.


Initiates sessions between user and mail server. Server then
forwards messages. Uses a process called ‘store and forward’ to
store messages and forward as necessary. The server decides
which server to send the message to and the inbox provider then
downloads the message and places it in the recipient’s inbox.
Often used in conjunction with IMAP.

IMAP Stores email messages on an ISPs server but allows user to


manipulate messages as though on a local device. Local devices
access the ISP server to access the messages. IMAP works with
desktop clients and webmail clients. Allows simultaneous logins
from different devices to one account

FTP Allows secure transfer of files between client and server. Files are
uploaded to and downloaded from the server using FTP.

TCP Connects network devices to the Internet. It defines how


applications can create channels of communication across a
network. It manages how a message is assembled into smaller
packets before transmission and reassembles packets in the correct
order at destination.

UDP Communications protocol that establishes low latency and


loss-tolerating connections between applications. Enables the
transfer of data before an agreement is provided by the receiving
party. This speeds up transfers.
Can start transferring data before agreement is received from
receiving party.

IP Relays data across network boundaries. It defines how to address


and route each packet to make sure it reaches the right destination.

[9]

2 marks for AO1 (recall)


17.
A maximum of 2 marks can be awarded.

• a collection/group of computers;
• connected/joined together;

A. references to allowing the sharing of resources if context is correct


[2]

Dubai College Page 21 of 33


9 marks for AO1 (understanding)
18.
Level Description Marks

Responses at the upper end of the level will contain a thorough


discussion of the advantages and disadvantages of both wired and
wireless networks. The security of both types of network are compared
in detail. The response is well structured and coherent.
3 Responses at the lower end of the level will mostly contain 7-9
discussions, but may also include some thorough explanations, of
the advantages and disadvantages of both wired and wireless
networks. The security of at least one type of network is explained in
detail. The response is well structured and coherent.

Responses at the upper end of the level will contain detailed


explanations of the advantages and disadvantages of both wired and
wireless networks. The security of at least one type of network is
explained. The response makes sense when read as a whole and a
logical trail of thought is apparent.
2 4-6
Responses at the lower end of the level will mostly contain
explanations, but may also include some descriptions, of the
advantages and/or disadvantages of both wired and wireless networks.
The security of at least one type of network is described. The
response makes some sense when read as a whole.

Responses at the upper end of the level will contain descriptions of the
advantages and/or disadvantages of wired and/or wireless networks.
The security of at least one type of network is described. The
1 response makes some sense when read as a whole. 1-3
Responses at the lower end of the level will include a few statements
related to one or more of the required points. The response might be
disjointed and without any cohesion.

No creditworthy material. 0

Dubai College Page 22 of 33


Indicative Content
Wired Network Wireless Network
• Connection speeds are typically • Typically lower setup costs
faster • No wires/cables are required
• They typically have higher • It is easy to connect new devices
bandwidth • Users not confined to a single
• They typically have better location // Users can connect to
Advantages security/fewer security risks the network as long as they are
within range
• Can connect multiple devices
without the need for extra
hardware
• Cables can be hazardous and • Connection speeds can be
unsightly slower
• Not all devices can connect via • Connection speeds can reduce
cable eg some tablets the further from the WAP you are
• Can be expensive to set up • They can be subject to
Disadvantages interference from walls, objects
and other nearby electronic
devices
• They are typically less secure
• Connections are not as stable as
wired networks and can 'drop off'
• Risk of theft of bandwidth by
• Typically more secure than
neighbouring users within range
wireless as need physical
• Risk of data loss/data being
access to the network to
stolen unless encryption is used
intercept data
Security • Typically easier to intercept
data/‘hack’ network // Wireless
transmissions can be intercepted
by anyone within range of the
router

[9]

Dubai College Page 23 of 33


4 marks for AO1 (understanding)
19.
A maximum of 4 marks can be awarded.
Award 1 mark for each correct tick.

Network Application Transport


Internet layer Link layer
Protocol layer layer

HTTP ✓

UDP ✓

IP ✓

IMAP ✓

R. any row that contains more than one tick.


[4]

2 marks for AO2 (apply)


20.
The diagram should clearly show that:
• There are four or more computers / laptops / desktop computers in the diagram;
• Each computer is connected only to a central hub / switch;

I. Other connected devices.


I. Representation / symbol used for computer or hub / switch.

Dubai College Page 24 of 33


Examples:

[2]

2 marks for AO2 (apply)


21.
The diagram should clearly show that:

• There is a central bus;


• All computers are individually connected to a single central bus
• There are four or more computers / laptops / desktop computers

2 marks for all three points, 1 mark for one or two of the three points.

I. Representation / symbol used for computer


I. Other connected devices.

Dubai College Page 25 of 33


Example answers:

Dubai College Page 26 of 33


[2]

2 marks for AO1 (understanding)


22.
1 mark for each point to a maximum of 2 marks.

• Less likely to experience transmission errors / data traffic problems (contention issues);
• Faster transmission of data;
• A faulty connection only disables one computer (unless it’s the hub / switch);
• Fewer / no collisions (if a switch is used rather than a hub);
• Better security (potentially as data is not broadcast to all machines if a switch is used);

R. Easy to connect other devices.


[2]

1 mark for AO1 (understanding)


23.
1 mark for any valid point.

• It is more expensive to install (more cable required, more hardware needed);


• It is harder to install (it requires more cable);
• Switch / hub / central device may fail (breaking the entire network);
[1]

Dubai College Page 27 of 33


9 marks for AO1 (understanding)
24.
Level Marks Description

3 7-9 The student has explained all or discussed


some risks and benefits of using computer
networks. A clear understanding of both is
shown.
Technical language is used accurately
throughout the response.

2 4-6 The student has described or explained some


risks and benefits. Some understanding is
shown of both or a good understanding is shown
of one.
Some technical language is mostly used
accurately in the response.

1 1-3 The student has stated or described some


risks or benefits. Little understanding is shown
of either.
Technical language is never / rarely used and
where present may lack accuracy.

0 0 Nothing worthy of credit.

Sample guidance

Benefits:

• Sharing of resources such as printers, storage space


• Managed / central backing up of data
• Central installation and management of software by network admin
• Monitoring of users and network activity centrally by network admin
• Hot desking / users can login to any machine
• Ability to use communication tools between computers
• Centrally managed access rights
• Rapid data sharing
• Allows decentralised / home working

Risks:

• Security of data – requires correct settings or anyone can see restricted data
• Spreading of malware
• Cost of infrastructure
• Cost of network admin required to run network
• Dependency on network hardware
[9]

Dubai College Page 28 of 33


2 marks for AO1 (recall)
25.
A set of rules; that allow devices / networks to communicate / transfer data
[2]

2 marks for AO1 (recall)


26.
C IMAP;
D SMTP;

If more than two lozenges shaded then marks are not awarded.
[2]

2 marks for AO1 (understanding)


27.
Max 2 marks for one of the points below well explained OR two points stated from the list below.

• It prevents unauthorised access into the network (by checking IP / MAC address / packet
content);
• It prevents unauthorised transmissions from inside the network to external locations;
• It monitors network traffic;
• It makes sure that only the right / authorised traffic is allowed;
• It opens / closes ports as necessary

R. Prevents unauthorised users accessing network.


R. Prevents access to unauthorised websites.
[2]

2 marks for AO1 (recall)


28.
2 marks for all four correct ;;
1 mark for any two correct ;

Definition Letter

Adresses data for transmission C

Sets up the communication between the two hosts B

Where the network hardware is located D

Where the user software, such as web browsers or


A
email programs, operates

R. Duplicate answers.
[2]

Dubai College Page 29 of 33


All marks AO1 (understanding)
29.
Reasons for allowing:
Teachers can access resources on the school network to allow them to
plan lessons at home;
Teachers can teach lessons from home (using videoconferencing) if they
are not able to get into work (eg travel difficulties);
Teachers can access electronic copies of student work so that they do not
have to carry marking home;

Reasons for not allowing:


Data protection issues – schools may not want potentially sensitive
student information to be accessed outside of school;
To try to help teachers have a work-life balance;
Increased security risks as teachers may not have fully-protected
computers at home (eg if a teacher does not have anti-virus software on
their home computer this may cause problems when they connect their
computer to the school network);

Max 1 mark: if only described reasons for allowing access

Max 1 mark: if only described reasons for not allowing access


[2]

All marks AO1 (understanding)


30.
Share hardware; A. by example
Share data/files;
Easier to work collaboratively;
Use of communication tools
Central management for machines A. by example: centralised software
deployment, centralised back-ups;
Files not stored on local machine so can be accessed from multiple
machines;
Can monitor computer users;
Increase available storage;

Max 3 marks
[3]

(a) 1 mark for AO1 (understanding)


31. PANs are centred around one person, LANs cover a limited
geographical area / LANs cover a larger area;
PANs have one user, LANs (normally) have more than one user;
PAN uses Bluetooth, LAN uses alternative protocols / connection
methods (A. by example);

Note: answer must cover both PAN and LAN to be awarded a mark

Max 1
1

Dubai College Page 30 of 33


(b) 1 mark for AO1 (understanding)

Wearable computing devices;


Connecting headphones to a music player; Connecting pedometer
to a mobile phone;

A. any suitable example

Max 1
1
[2]

All marks AO1 (recall)


32.
a set of rules;
that allow two devices to communicate;
[2]

(a) Mark is for AO1 (recall)


33.
E IMAP;

R. If more than one lozenge shaded


1

(b) Mark is for AO1 (recall)

B HTTPS;

R. If more than one lozenge shaded


1

(c) Mark is for AO1 (recall)

D SMTP;

R. If more than one lozenge shaded


1
[3]

All marks AO1 (recall)


34.
Layer Order (1 – 4)

Transport 2

Link 4

Network 3

Application 1

Dubai College Page 31 of 33


Mark as follows:
1 mark: any row correct;
2 marks: any two rows correct;
3 marks: all four rows correct;
[3]

(a) All marks AO2 (apply)


35.
Staff could forget their password // staff can’t forget biometric
measure;
Shouldering risk when staff entering their password // no risk of
shouldering when using biometric data;
Lower risk of hacking;

Max 2
2

(b) All marks AO2 (apply)

Network is made available to members of the public;


Won’t know the MAC addresses for (most) of the devices
connecting to the network;
2
[4]

4 marks for AO1 (understanding)


36.
1 mark for each explanation point.

Example answers

• A WAN is a Wide Area Network that links more than one remote geographical site /
location to another;
• A LAN is a Local Area Network that links together devices that are within one site \
location;
• The speed of data transmission across a LAN is likely to be higher than across a
WAN;
• WANs are typically public networks (and so data encryption is likely to be used);
• LANs (may not need data encryption) as they are typically private;
• LANs typically carry less traffic than WANs;
• This is because the number of users on a LAN can be controlled by the administrator
whereas public WANs could have an unlimited number of users;
• LAN Connections are generally more reliable as they are under the control and
maintenance of the network administrators;
• On a WAN it is possible that heavy traffic, peak usage times, viruses, weather or
physical damage could affect the connection reliability;
• WANs are typically under shared ownership;
• LANs are typically owned by a single person or organisation;
• LANs use different protocol suites (accept protocols) to WANs;

Dubai College Page 32 of 33


R. Simple expansion of acronyms.
R. Any reference to cost comparisons.
R. Reference to cable types.
R. WAN is a collection of LANs / LANs joined together (if only a simple statement).
[4]

Mark is for AO1 (understand)


37.
Max 1 mark for any of the following:

• HTTPS is secure / encrypted;


• Data transmitted using HTTP could be easily read if intercepted;
• Data transmitted using HTTPS can only be seen / read / understood by the
(intended) recipient;
[1]

2 marks for AO1 (recall)


38.
1 mark for each correct answer. Accept any of:

• Transport (layer);
• Data Link (layer);
• Link (layer);
• Network Interface / access (layer)

R. Any name that is not correct.


I. the order that the answers are written in.
[2]

2 marks for AO1 (understanding)


39.
Max 2 marks:

• packages / unpackages data (for / after transmission);


• adds address(es) (for transmission);
• routes the packets (across the network);
• provides error checking;

R. It provides access to the Internet


[2]

2 marks for AO1 (understanding)


40.
1 mark for each of the following points to a maximum of 2 marks.

• Each device connected to the network has a (unique) reference ID / physical /


physical address (called the MAC Address);
• There is a list of allowed / denied addresses;
• The network device / router looks at the address of the device trying to connect (and
blocks / allows appropriately);
[2]

Dubai College Page 33 of 33

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy