January 2019 Weak Areas Tasmiyah. Flashcards
5 Which of the following is not part of the Internet of Things?
(a) Smart bulb
(b) Smart iron
(c) Smart refrigerator
(d) Smart thermostat
(b) Smart iron
10 Which of the following is not a feature of an Internet Protocol (IP)?
(a) Forwarding packets to individual computers.
(b) Putting packets back together in order.
(c) Sending packets to the Domain.
(d) Sending packets to the Gateway.
D - sending packets to the gateway
Which of the following is an element of a Class C network that will default to 255.255.255.0?
(a) Default gateway
(b) Host IP address
(c) Local IP address
(d) Subnet mask
D - Subnet Mask
Which of the following is not a characteristic of an ADSL connection?
(a) Faster upload than download rate
(b) Fibre optic connection
(c) Microfilter installed on the line
(d) Simultaneous voice and data connection
A - faster upload than a download rate
Monty Bella Retail operates five retail parks throughout the UK. After years of underinvestment,
the information technology (IT) of the company is aging and is no longer fit for purpose.
Monty Bella Retail has decided to move its IT infrastructure from its own data centre to the Cloud
using public cloud providers. Monty Bella Retail also wants to upgrade all IT in its retail parks.
Monty Bella Retail would like to use technology to improve the customer experience whilst
shopping. Each retail park will feature similar equipment to allow data about customers, their
purchases and shopping habits to be shared amongst the business. Shoppers will also be tracked
as they move through the retail parks. This information will be used for marketing purposes, to
create promotions and to ensure the items that shoppers are looking for can be easily located.
16) Monty Bella Retail would like to track shoppers as they move through the retail parks using
wireless technologies.
(a) Identify and describe two wireless technologies that could be used to track shoppers as
they move through the retail parks. - 4
- Bluetooth, because it pairs devices within 10m radius of receiver.
- RFID, it can be used on the shoppers cards/bags/trolleys to track them
What are the wireless technologies
- bluetooth
- wifi
- NFC
- RFID
bluetooth what does it do
it pairs devices within 10m radius of the receiver
infrared
it requires devices to be in direct line of sight
laser
sends data between devices that are in the line of sight with NO BARRIERS, 2km distance.
bad weather affects transmission.
satellite
- point to multipoint communication used. it uses the satellites above earth, receive transmission and rebroadcast it back to earth.
- DISADVANTAGE:
the distance causes delay in data transmission
GSM/5G
used to connect phones to networks for calls + messages.
how is microwave used?
it uses radio waves to send the signals to large areas by using microwave towers
to connect to a microwave connection, where should the device be?
NEEDS to be in LINE OF SIGHT
NO obstructions
what are the disadvantages of using microwave connections?
- it is affected by bad weather, it causes high attenuation. (more signal loss)
Data about the habits and location of shoppers must be kept secure.
(b) Identify and describe two digital security methods that could be used to keep the data
secure.
[6]
- Anti-Virus (1st) to scan and remove virus (1) that could create
a weakness that can allow access system (1) - Firewalls (1st) to block access to unauthorised packets (1) so
that data cannot be accessed (1)
Anti-Spyware (1st) to prevent spyware (1) so that the system
cannot be monitored (1)
Username/Passwords/Authentication (1st) so only authorised
users can log on (1) reducing the chances of others
accessing the system (1)
Permissions/Levels of Access (1st) so that only authorised
users can gain access to a file (1) reducing the chances of
others accessing the files (1)
Encryption (1st) scrambles data so it can’t be read without
(decryption) key (1) so even if gathered cannot be read (1)
what is virtualisation
- using one hardware to create multiple virtual machines.
- storing multiple guest operating systems (virtual machine) on a single host machine (dumb client/computer)
benefits of virtualisation
- no need to purchase server hardware
- can add capacity easily without having to purchase additional equipment
- can be flexible/on demand
- does not require large data centres
- if set up efficiently, it can be used for higher performance at LOWER cost - do more with less.
disadvantages of virtualisation
- it creates a loss of control, because the servers can not be physically managed.
- dependent on someone else to keep the hardware running
- it is easy for hackers to take info, because the data is located in the same place.
- if the physical hardware gets affected/goes down, it then impacts the work that is being done
-it has a recurring cost of the public cloud.
Monty Bella Retail has decided to use virtualisation technologies to replace hardware in its
data centre.
17* Discuss, using examples, the benefits and limitations to Monty Bella Retail of using
virtualisation technologies.
[10]
Monty Bella Retail using virtualisation technology has its benefits and limitations. By using virtualisation technology in its data centre, it then means they will not have to buy the server hardware. It saves their costs on cables and additional hardware. Therefore, it reduces the energy consumption for them that would typically be used by its hardware in the data centres. Additionally, they can add capacity/storage easily without having to purchase any other equipment as well because Monty Bella Retail will be using multiple virtual machines on one hardware by using the virtualisation technology making the capacity easily changed to their requirements and needs.
However, using virtualisation technology has its limitations. A limitation is that Monty Bella Retail control will have to be dependent on somebody else such as a network manager or IT technician to keep the hardware running. Moreover, it can raise security issues for them because all their data will be managed in the same place (on one hardware), it makes it easily accessible for hackers to then take their data from the data centres as it is all located in one area/place.
Shops in each retail park are all connected to a wired Local Area Network (LAN).
(a) Identify one piece of communications hardware needed to create a wired LAN.
[1]
- Switch (1)
- Hub (1)
Describe two ways Monty Bella Retail could use a wired LAN in its retail parks. (4)
- Data from stores (1) can be collected and stored centrally (1)
- Each user can log on (1) at any store in the centre (1)
- Peripherals (such as printers) (1) can be shared between
multiple users (1) - Files (1) can be shared/backed up (1)
- To send data (1) securely (1)
Protocol
set of RULES to allow DEVICES TO COMMUNICATE together
this is developed in layers.
each layer = has particular job.
what are the protocols
TCP - transmission control protocol
IP - internet protocol
UDP - User DATA protocol
HTTP - hyper text transfer protocol
HTTPS
FTP - file transfer protocol
ICMP - internet control message protocol
SNMP - simple network management protocol
SMTP - simple mail transfer protocol
POP - post office protocol
network management protocols
ICMP
SNMP
email protocols
- SMTP
- POP
TCP purpose
sending packets between computer system.
IP internet protocol
routing + addressing data packets
what layer is it in?
internet layer
UDP user data protocol
sending data but faster than tcp
used where low latency
what layer is it in?
transport
HTTP hyper text transfer protocol)
transfer webpages over the internet
so users can view the pages on a server
HTTPS
more secure than http, works with another protocol called SSL secure socket layer to TRANSFER ENCRYPTED (convert data into a code to prevent unauthorised access) DATA
FTP (file transfer protocol)
transfer files across network
ICMP internet control message protocol
collects status info .. e.g router errors
used - troubleshooting
what layer is it in? network layer
SNMP (Simple Network Management Protocol)
records network stats - e.g router usage
what layer is it in?
application layer
SMTP - simple mail transfer protocol
collects info from devices that are connected to network
POP - post office protocol
downloads emails from email server
Describe one protocol that could be used on the wired LAN - 2 marks
- HTTP (1) to transfer web pages (1)
- POP (1) to download email messages (1)
- SMTP (1) to transfer email between email servers (1)
- ICMP (1) for troubleshooting (1)
- SNMP (1) to get usage data from devices (1)
- FTP (1) to transfer files between hosts (1)
- TCP/IP (1) to transport data across a network (1)