ch22 - Network Security 2
ch22 - Network Security 2
Name: _______________________________________________
1
Sayar Wai Phyo Aung Edexcel CS Past Paper
Questions
Q1.
The ability to share data via networks has many advantages, but there are also disadvantages.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q2.
The ability to share data via networks has many advantages, but there are also disadvantages.
The senior leadership team at a school is discussing different storage media. The administrative staff
want to use the 'cloud'. The technical team wants to use servers located on the school grounds.
Compare storing data in the 'cloud' with storing data on hard discs connected to the school's servers.
(6)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
2
Sayar Wai Phyo Aung Edexcel CS Past Paper
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q3.
(i) Identify the type of cyberattack from which HTTPS offers some protection.
(1)
A Phishing emails
B Unpatched software
C Denial of service
D Eavesdropping
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
3
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q4.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Discuss methods a movie streaming company could use to secure its network.
• physical security
• access control
• firewalls.
4
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q6.
Discuss the methods available to maintain network security and protect the data from cyberattacks.
(6)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
5
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q7.
Networks
Explain one type of access to the statistics file a student on work experience at the company should be
given.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q8.
Explain the best choice of penetration testing the company should use.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q9.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q10.
Answer the question with a cross in the box you think is correct . If you change your mind
about an answer, put a line through the box and then mark your new answer with a cross .
Identify one way in which cloud storage users can improve the security of their data.
(1)
A Authentication
B Compression
C Decomposition
D Virtualisation
Q11.
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
Q12.
.............................................................................................................................................
.............................................................................................................................................
Q13.
State one way in which providers of cloud storage could prevent security breaches by their own
employees.
(1)
.............................................................................................................................................
.............................................................................................................................................
Q14.
.............................................................................................................................................
Q15.
A company recycles digital devices. It uses computers and networks in its business.
Identify the term that refers to software that is out of date and vulnerable to cyberattack.
(1)
A Unaudited
B Untested
C Unstructured
D Unpatched
Q16.
A company recycles digital devices. It uses computers and networks in its business.
The company is concerned about the security of its own network. It employs a network specialist to
secure the network.
(i) Describe what is meant by the term 'penetration testing' when applied to networks.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
(ii) The network specialist uses a software tool to carry out a code review.
State two checks that are carried out during a code review.
(2)
1 ..........................................................................................................................................
.............................................................................................................................................
2 ..........................................................................................................................................
.............................................................................................................................................
9
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q17.
A company recycles digital devices. It uses computers and networks in its business.
The company stores details of its business such as recycling statistics on a server.
Users do not all have the same access to files stored on the server.
Explain the type of access to the statistics file a student on work experience at the company should be
given.
(2)
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
.............................................................................................................................................
10
Sayar Wai Phyo Aung Edexcel CS Past Paper
Mark Scheme
Q1.
Q2.
11
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q3.
12
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q4.
Q5.
13
Sayar Wai Phyo Aung Edexcel CS Past Paper
14
Sayar Wai Phyo Aung Edexcel CS Past Paper
15
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q6.
16
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q7.
Q8.
17
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q9.
Q10.
Q11.
18
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q12.
Q13.
Q14.
Q15.
19
Sayar Wai Phyo Aung Edexcel CS Past Paper
Q16.
Q17.
20
Sayar Wai Phyo Aung Edexcel CS Past Paper
21