0% found this document useful (0 votes)
26 views21 pages

ch22 - Network Security 2

Uploaded by

phone pyae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views21 pages

ch22 - Network Security 2

Uploaded by

phone pyae
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

Sayar Wai Phyo Aung Edexcel CS Past Paper

Name: _______________________________________________

Chapter 22 - Network Security

1
Sayar Wai Phyo Aung Edexcel CS Past Paper

Questions
Q1.

The ability to share data via networks has many advantages, but there are also disadvantages.

A patch for an instant messaging application is available.

Explain why users of the application should apply the patch.


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q2.

The ability to share data via networks has many advantages, but there are also disadvantages.

The senior leadership team at a school is discussing different storage media. The administrative staff
want to use the 'cloud'. The technical team wants to use servers located on the school grounds.

Compare storing data in the 'cloud' with storing data on hard discs connected to the school's servers.
(6)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

2
Sayar Wai Phyo Aung Edexcel CS Past Paper

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 6 marks)

Q3.

One of the main concerns when connecting devices to a network is security.

HTTPS is a version of HTTP with increased protection against cyberattacks.

(i) Identify the type of cyberattack from which HTTPS offers some protection.
(1)
A Phishing emails

B Unpatched software

C Denial of service

D Eavesdropping

(ii) Explain how HTTPS provides increased security.


(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)

3
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q4.

A computer stores images online.

This notification appears on a computer screen.

Describe how this cyber attack operates.


(3)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)


Q5.

Discuss methods a movie streaming company could use to secure its network.

Your answer should consider:

• physical security
• access control
• firewalls.

(Total for question = 6 marks)

4
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q6.

A company stores data about employees on networked computers.

Discuss the methods available to maintain network security and protect the data from cyberattacks.
(6)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 6 marks)

5
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q7.

Networks

A company stores statistics about its business on a server.

Explain one type of access to the statistics file a student on work experience at the company should be
given.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q8.

A company needs to secure its network from attacks by its employees.

Explain the best choice of penetration testing the company should use.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q9.

The internet is the world's largest network.

Explain why it is important to review network and user policies.


(2)
.............................................................................................................................................
6
Sayar Wai Phyo Aung Edexcel CS Past Paper

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q10.

Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .

There are security concerns associated with cloud storage.

Identify one way in which cloud storage users can improve the security of their data.
(1)
A Authentication
B Compression
C Decomposition
D Virtualisation

(Total for question = 1 mark)

Q11.

Describe the role of an ethical hacker.


(3)

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 3 marks)


7
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q12.

A school implements two-part user authentication as a network security measure.

State the names of these two parts.


(2)

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Q13.

There are security concerns associated with cloud storage.

State one way in which providers of cloud storage could prevent security breaches by their own
employees.
(1)
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 1 mark)

Q14.

A computer stores images online.

A code review is an important stage in software development.

State the purpose of a code review.


(1)
.............................................................................................................................................

.............................................................................................................................................

(Total for question = 1 mark)


8
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q15.

A company recycles digital devices. It uses computers and networks in its business.

Identify the term that refers to software that is out of date and vulnerable to cyberattack.
(1)
A Unaudited

B Untested

C Unstructured

D Unpatched

(Total for question = 1 mark)

Q16.

A company recycles digital devices. It uses computers and networks in its business.

The company is concerned about the security of its own network. It employs a network specialist to
secure the network.

(i) Describe what is meant by the term 'penetration testing' when applied to networks.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(ii) The network specialist uses a software tool to carry out a code review.
State two checks that are carried out during a code review.
(2)
1 ..........................................................................................................................................

.............................................................................................................................................

2 ..........................................................................................................................................

.............................................................................................................................................

(Total for question = 4 marks)

9
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q17.

A company recycles digital devices. It uses computers and networks in its business.

The company stores details of its business such as recycling statistics on a server.

Users do not all have the same access to files stored on the server.

Explain the type of access to the statistics file a student on work experience at the company should be
given.
(2)
.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

.............................................................................................................................................

(Total for question = 2 marks)

Results Plus: Examiner Comments


In this response, 'blocks you from accessing them' is not enough for MP2 because it does not
state how.
Credit is given for:
• '(forcing you to pay money) to unlock' (1)
1 mark

10
Sayar Wai Phyo Aung Edexcel CS Past Paper

Mark Scheme
Q1.

Q2.

11
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q3.

12
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q4.

Q5.

13
Sayar Wai Phyo Aung Edexcel CS Past Paper

14
Sayar Wai Phyo Aung Edexcel CS Past Paper

15
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q6.

16
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q7.

Q8.

17
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q9.

Q10.

Q11.

18
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q12.

Q13.

Q14.

Q15.

19
Sayar Wai Phyo Aung Edexcel CS Past Paper

Q16.

Q17.

20
Sayar Wai Phyo Aung Edexcel CS Past Paper

21

You might also like