Please write clearly in block capitals.
Centre number Candidate number
Surname
Forename(s)
Candidate signature
Level 3 Technical Level
IT: NETWORKING
Unit 6 Network Security Management
Thursday 16 May 2019 Morning Time allowed: 2 hours
Materials
For this paper you must have:
For Examiner’s Use
a ruler
a scientific calculator (non-programmable) Question Mark
stencils or other drawing equipment (eg flowchart stencils). 1−5
Instructions 6
Use black ink or black ball-point pen. 7
Fill in the boxes at the top of this page.
Answer all questions. 8
You must answer each question in the space provided. Do not write outside 9
the box around each page or on blank pages. 10
Do all rough work in this book. Cross through any work you do not want to
11
be marked.
If you need more space use the additional pages at the back of this booklet. 12
13
Information
The marks for questions are shown in brackets. 14
The maximum mark for this paper is 80. There are 50 marks for Section A 15
and 30 marks for Section B.
16
Advice 17
In all calculations, show clearly how you work out your answer.
Use diagrams, where appropriate, to clarify your answers. TOTAL
You are expected to use a calculator where appropriate.
You are reminded of the need for good English and clear presentation in
your answers.
*jun19A507649501*
IB/M/Jun19/E6 A/507/6495
, 2
Do not write
outside the
Section A box
Answer all questions in this section.
0 1 Cloud computing enables users to
Tick () one box.
[1 mark]
access their files from home and college.
avoid malware infection.
encrypt everyone’s files.
share unlimited bandwidth.
0 2 User permissions
Tick () one box.
[1 mark]
define communication between two or more devices.
electronically confirm the user’s identity.
enable access to specific resources on a network.
validate data transfers.
*02*
IB/M/Jun19/A/507/6495
, 3
Do not write
outside the
box
0 3 Which of the following is a wireless networking standard?
Tick () one box.
[1 mark]
DNS
FTP
SMTP
TKIP
0 4 Which technique could an attacker use to create an inventory of a network?
Tick () one box.
[1 mark]
Banner grabbing
Eavesdropping
Pharming
Pivoting
Turn over for the next question
*03*
IB/M/Jun19/A/507/6495
, 4
Turn over ► Do not write
outside the
*03*
IB/M/Jun19/A/507/6495
Centre number Candidate number
Surname
Forename(s)
Candidate signature
Level 3 Technical Level
IT: NETWORKING
Unit 6 Network Security Management
Thursday 16 May 2019 Morning Time allowed: 2 hours
Materials
For this paper you must have:
For Examiner’s Use
a ruler
a scientific calculator (non-programmable) Question Mark
stencils or other drawing equipment (eg flowchart stencils). 1−5
Instructions 6
Use black ink or black ball-point pen. 7
Fill in the boxes at the top of this page.
Answer all questions. 8
You must answer each question in the space provided. Do not write outside 9
the box around each page or on blank pages. 10
Do all rough work in this book. Cross through any work you do not want to
11
be marked.
If you need more space use the additional pages at the back of this booklet. 12
13
Information
The marks for questions are shown in brackets. 14
The maximum mark for this paper is 80. There are 50 marks for Section A 15
and 30 marks for Section B.
16
Advice 17
In all calculations, show clearly how you work out your answer.
Use diagrams, where appropriate, to clarify your answers. TOTAL
You are expected to use a calculator where appropriate.
You are reminded of the need for good English and clear presentation in
your answers.
*jun19A507649501*
IB/M/Jun19/E6 A/507/6495
, 2
Do not write
outside the
Section A box
Answer all questions in this section.
0 1 Cloud computing enables users to
Tick () one box.
[1 mark]
access their files from home and college.
avoid malware infection.
encrypt everyone’s files.
share unlimited bandwidth.
0 2 User permissions
Tick () one box.
[1 mark]
define communication between two or more devices.
electronically confirm the user’s identity.
enable access to specific resources on a network.
validate data transfers.
*02*
IB/M/Jun19/A/507/6495
, 3
Do not write
outside the
box
0 3 Which of the following is a wireless networking standard?
Tick () one box.
[1 mark]
DNS
FTP
SMTP
TKIP
0 4 Which technique could an attacker use to create an inventory of a network?
Tick () one box.
[1 mark]
Banner grabbing
Eavesdropping
Pharming
Pivoting
Turn over for the next question
*03*
IB/M/Jun19/A/507/6495
, 4
Turn over ► Do not write
outside the
*03*
IB/M/Jun19/A/507/6495