School ICT Self Study
Absolutely Free Learning Opportunity! No Need to Spend Money! Study at Your Own Pace! Everything You Need is Right Here
UNLOCK YOUR DIGITAL FUTURE!
Free ICT Learning for Sri Lanka
🚀 Welcome to School ICT

Your Gateway to Digital Excellence

🌍
|

Network Security and ISP Technologies

234 viewsG12-06. AL ICT Computer Networking
0

  1. How is public key cryptography used in HTTPS, and what ensures the authenticity of a website’s public key?

  2. Design a strategy to protect users from phishing attacks in a corporate network, including technical and educational measures.

  3. Compare DSL and ADSL in terms of bandwidth allocation and suitability for home networks.

  4. Explain how NAT overload handles multiple devices in a home LAN and what happens if too many connections are active.

  5. How might emerging technologies like 5G fixed wireless access replace traditional ISP connections for home networks?

Ruwan Suraweera Changed status to publish
0

Answers

  1. Answer: HTTPS uses public keys to encrypt data and private keys to decrypt. Certificate Authorities (CAs) issue digital certificates to verify a website’s public key authenticity.
    Description: HTTPS secures web communication. Understanding certificate validation teaches students to implement secure protocols, protecting against man-in-the-middle attacks.

  2. Answer: Use email filters, two-factor authentication, and firewalls. Educate users on recognizing suspicious links and verifying sender authenticity. Regular training reinforces awareness.
    Description: Phishing is a prevalent threat. Designing comprehensive strategies teaches students to combine technical and human defenses, enhancing corporate network security.

  3. Answer: DSL provides symmetric bandwidth, suitable for balanced upload/download needs. ADSL allocates more bandwidth for downloads, ideal for home Internet usage like streaming.
    Description: ADSL’s asymmetry matches consumer patterns. Comparing DSL variants helps students select appropriate technologies for home networks, optimizing user experience.

  4. Answer: NAT overload maps multiple private IPs to one public IP using port numbers. Excessive connections cause port exhaustion, leading to dropped connections or delays.
    Description: NAT overload is common in home routers. Analyzing overload scenarios teaches students to manage network resources, preparing them for practical troubleshooting.

  5. Answer: 5G offers high-speed, low-latency wireless access, eliminating wired infrastructure needs. It supports IoT and high-bandwidth applications but requires reliable coverage.
    Description: 5G represents the future of connectivity. Evaluating its potential helps students anticipate technological shifts, preparing them for innovative network designs.

Ruwan Suraweera Changed status to publish
🔴 Lesson List
SIDE BUTTON ON
Sign In Register
×

👋 Welcome Back!

🚀
Ready to Learn?Pick up where you left off.
🔑
Forgot Password?Click the link below to reset.
📢
New FeaturesCheck out the new AI Voice tool.

Sign In

👤
🔒
or continue with
Google Facebook

Already have an account? Register Now

🖥️ View Desktop Version Switch to full website view.