VU23213 Assessment 1 v1.0
VU23213 Assessment 1 v1.0
VU23213 Utilise basic network concepts and protocols required in cyber security
1. Which of the following cyber security vulnerabilities are related to network security?
(Place the word “Yes” in the Your Response column next to all that apply)
5. How many unique host addresses are available on the subnet 192.168.0/24?
7. Complete the following table to identify which protocols belong to the TCP/IP
protocol suite:
Protocol
TCP/IP Suite?
Yes / No
SMTP
PHP
Named Pipes
UDP
eDirectory
IP
X.25
POP3
9. Which of the following Wi-fi encryption protocol provides a higher level of security?
- Wired equivalent privacy (WEP), or
10. True or false: When running the PING command, a response of “destination host
unreachable” proves that the remote server is offline.