Page 219 - Computer_Science_F5
P. 219
Computer Science 10. If a company requires four subnets, 13. Cybersecurity threats are a growing
calculate the valid IP ranges for
host addresses are available per
subnet if subnetting with a mask
each subnet.
of 255.255.255.240?
concern. How does understanding
FOR ONLINE READING ONLY
each accommodating at least 30
identifying potential vulnerabilities
hosts, what is the minimum subnet the OSI and TCP/IP models aid in
mask that can be used, and what are and implementing security
the network addresses and valid measures at different network
host ranges for each subnet? layers?
11. In a network with the IP address 14. Explain the concept of social
engineering and how attackers
10.10.0.0/22, how many bits are exploit human psychology to gain
used for subnetting, and how many access to sensitive information or
subnets and hosts are available in systems. How can organisations
this configuration? raise awareness and mitigate social
12. Given the requirement to create engineering risks?
six subnets from the network 15. How can vulnerability scanning and
192.168.10.0/24, determine the patching help identify and address
appropriate subnet mask and potential security weaknesses?
Project: Designing a school network
Suppose you have been assigned to design a network for your school, which has
been allocated the IP address 198.50.60.0. Describe the procedures you could
undertake to complete this project.
In your project, make sure you deliver a comprehensive and detailed report
covering the analysis, design decisions, and implementation process including
screenshots of the Cisco Packet Tracer implementation.
210
for Advanced Secondary Schools
Computer Science Form 5.indd 210 23/07/2024 12:33

