jun19a507649501 a5076495 ibmjun19e6 level 3 technical level it networking unit 6 network security management thursday 16 may 2019 morning time allowed 2 hours materials for this paper you mus
Written for
A/AS Level
AQA
ICT and Computer Science
IT: NETWORKING Unit 6 Network Security Management
Thursday 16 May 2019 Morning Time allowed: 2 hours
Materials
For this paper you must have:
For Examiner’s Use
a ruler
a scientific calculator (non-programmable) Question Mark
stencils or other drawing equipment (eg flowchart stencils). 1−5
Instructions 6
Use black ink or black ball-point pen. 7
Fill in the boxes at the top of this page.
Answer all questions. 8
You must answer each question in the space provided. Do not write outside 9
the box around each page or on blank pages. 10
Do all rough work in this book. Cross through any work you do not want to
11
be marked.
If you need more space use the additional pages at the back of this booklet. 12
13
Information
The marks for questions are shown in brackets. 14
The maximum mark for this paper is 80. There are 50 marks for Section A 15
and 30 marks for Section B.
16
Advice 17
In all calculations, show clearly how you work out your answer.
Use diagrams, where appropriate, to clarify your answers. TOTAL
You are expected to use a calculator where appropriate.
You are reminded of the need for good English and clear presentation in
your answers.
*jun19A507649501*
IB/M/Jun19/E6 A/507/6495
, 2
Do not write
outside the
Section A box
Answer all questions in this section.
0 1 Cloud computing enables users to
Tick () one box.
[1 mark]
access their files from home and college.
avoid malware infection.
encrypt everyone’s files.
share unlimited bandwidth.
0 2 User permissions
Tick () one box.
[1 mark]
define communication between two or more devices.
electronically confirm the user’s identity.
enable access to specific resources on a network.
validate data transfers.
*02*
IB/M/Jun19/A/507/6495
, 3
Do not write
outside the
box
0 3 Which of the following is a wireless networking standard?
Tick () one box.
[1 mark]
DNS
FTP
SMTP
TKIP
0 4 Which technique could an attacker use to create an inventory of a network?
Tick () one box.
[1 mark]
Banner grabbing
Eavesdropping
Pharming
Pivoting
Turn over for the next question
*03*
IB/M/Jun19/A/507/6495
, 4
Turn over ► Do not write
outside the
*03*
IB/M/Jun19/A/507/6495
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller keenstar. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.