Question 3
Question 3 of 10

Question image for Q3
Topics Tested

Methods of preventing network security issues, including: use of barriers, locks, surveillance, alarm systems, security guards, how software methods can prevent unauthorised access, including: o biometric methods o anti-malware o anti-virus and anti-spyware software for protecting data, files and systems o encryption o access rights/permissions for protecting data and files, how firewalls can be configured to control access to networks

The purposes and uses of protocols in the preparation, addressing, sending and receiving of data across networks, including: Transmission Control Protocol (TCP), Internet Protocol (IP), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP) and inverse address Resolution Protocol (InARP), Dynamic Host Configuration Protocol (DHCP), User Datagram Protocol (UDP), Hypertext Transfer Protocols (HTTP and HTTPS), File Transfer Protocol (FTP), tunneling protocol, for example, L2TP, Simple Mail Transfer Protocol (SMTP), Post Office Protocols, for example, POP3, Internet Message Access Protocol (IMAP), Telnet, SSH, Internet Protocol Security (IPsec), TLS/SSL