Reference no: EM132536606
ICTTEN611 Produce an ICT network architecture design - Australian Harbour International College
Question 1 Briefly describe how the following technologies work.
Access Networks
Core networks
Mobile cellular networks
RF technologies including Wi-Fi
Question 2 What is an Internet Protocol?
Question 3 What is an IP address and how does it work?
Question 4 What is a dynamic IP address?
Question 5 What is a subnet?
Question 6 What is RFID?
Question 7 How do RFID tags compare to barcodes?
Question 8 List 3 common issues that switched Ethernet networks have
Question 9 List 4 network operating systems that are used in current industry networks
Question 10 List 4 administrative features of a network operating system
Question 11 List 5 examples of Network Monitoring Platforms (NMPs)
Question 12 List 4 examples of useful data / information that can be obtained using a Network Monitoring Program
Question 13 What would be the most appropriate way to secure a closed wireless LAN network? Give reasons for your answer
Question 14 Explain in detail how anti-virus software operates. Include both the Virus Dictionary Approach and the Suspicious Behaviour Approach in your answer
Question 15 Why is it important to regularly update anti-virus software?
Question 16 Give 3 examples of problems anti-virus software will NOT protect a computer from
Question 17 List 5 ways a computer can become infected with a virus
Question 18 Outline how you would install anti-virus software
Question 19 What is a firewall? What is the purpose of a firewall?
Question 20 Describe how the following types of firewall techniques work:
a) Packet Filter
b) Application Gateway
c) Circuit-level Gateway
Question 21 What is a ‘perimeter network'? What is this used for?
Question 22 Explain the benefits of a Linux networking setup
Question 23 Consider the following permission types for folders and for each list what this enables a user to do with the folder and files within the folder
a) Read
b) Read & Execute
c) List folder contents
d) Full Control
Question 24 What is data redundancy
Question 25 What is Data Encryption Standard
Question 26 What is the difference between functional and non-functional requirements? Provide an example of each
Question 27 What is a business process?
Question 28 What is ‘Internet Control Message Protocol' (ICMP)? What are the functions of this?
Question 29 What is ‘User Datagram Protocol' used for?
Question 30 Outline the functions of the following protocols:
a) BOOT Protocol
b) AARP
Question 31 What is a gateway? What function(s) does this perform? Give specific examples in your answer
Question 32 Why is it important to isolate your wired and wireless networks?
Question 33 How can you ensure your network remains secure when you have clients with remote access?
Attachment:- network architecture design.rar