STUDENT RMIT Classification: Trusted STUDENT - KNOWLEDGE ASSESSMENT TASK Task Number National unit/s code National qualification code RMIT Program code 2 of 3 VU23213 22603VIC C4424 Task Name National unit/s title National qualification title RMIT Course code Short answer questions Utilise basic network concepts and protocols required in cyber security Certificate IV in Cyber Security INTE5058 Section A - Assessment Information Assessment duration and/or due date This assessment will be released in Week 11 and will be due in Week 15 Task instructions Summary and Purpose of Assessment This is the first assessment task of three assessments that students must satisfactorily complete, in order to be deemed competent for this unit. The purpose of this assessment task is for you to demonstrate knowledge of key network concepts and protocols which are commonly used in industry. Task instructions Read and complete all ten (10) questions. Seek assistance from your teacher if you need clarification with any of the questions. Complete all sections before handing in your assessment for marking. Your assessment responses will be assessed as per the marking criteria outlined in Section B of this document. Where This assessment will take place in class and/or outside of class time, as per your teacher’s instructions. How Students will be assessed against the criteria listed in the marking guide in Section B of this task. To achieve a satisfactory result, students will need to address all criteria satisfactorily. Conditions for assessment Make sure you confirm your understanding of this task with your Assessor before beginning. All work must meet the criteria to the standard described in the marking guide in Section B to be deemed satisfactory in this assessment You must submit all assessment evidence as instructed. Your assessor will assess the documentation you provide [ Short Answer Questions ] [ Task 2 of 3 ] Student knowledge assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1 [ 11/08/2023 ] Page 1 of 8 STUDENT RMIT Classification: Trusted Please make arrangements with your assessor at least one week prior to the assessment due date if you feel you require special allowance or allowable adjustment to this task Student must be observed undertaking this assessment task by a qualified assessor As an assessor you can negotiate a suitable time and location for the assessment at least one week prior to the assessment taking place Student must complete the task within the maximum allowed duration as directed by the assessor. This is an individual assessment task. Student will be assessed individually against all assessment criteria. Student can make arrangements with the assessor at least one week prior to the assessment due date if they require special allowance or allowable adjustment to this task. Students found in breach of assessment conditions can be charged with academic misconduct, have their results cancelled, be excluded from the program and receive other penalties. Penalties can also apply if a student’s test material is copied by others. Plagiarism is the presentation of the work, idea or creation of another person as though it is one’s own. It is a form of cheating and is a very serious academic offence that may lead to expulsion from the University. Plagiarised material can be drawn from, and presented in, written, graphic and visual form, including electronic data, and oral presentations. Plagiarism occurs when the origin of the material used is not appropriately cited. If students already registered with ELS and students’ study plan is approved, please inform your teacher if this assessment task is not adjusted in line with approved study plan. Please ensure students full and correct name is written on the student version of this assessment task (do not use nicknames or abbreviations). You will have the opportunity to resubmit any tools that are deemed unsatisfactory (one resubmission allowed per unit, so that means you have two opportunities to submit) Useful Links Please use links below to access important information on assessments: Assessment submission and appeals - Assessments Extensions and special considerations - Extensions and special consideration Equitable Assessment Arrangement (EAA) - Equitable Assessment Arrangements Information on recording and retaining assessments and dealing with assessment appeals can be found in the RMIT Assessment Processes document Instructions on Submitting your Assessment Students need to submit this assignment through CANVAS with the naming convention of: <Student_Number>_<Student_Full_Name> _Project.zip Equipment/resources students must supply (if applicable): Equipment/resources to be provided by RMIT or the workplace (if applicable): RMIT internet access RMIT Computer Labs and Learning Resources/Software Availability of Canvas to submit the knowledge assessment Computer or Laptop Internet access Learning Resources/Software Pen and paper [ Short Answer Questions ] [ Task 2 of 3 ] Student knowledge assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1 [ 11/08/2023 ] Page 2 of 8 STUDENT RMIT Classification: Trusted Section B – Student Answer Sheet Short answer questions Complete all ten (10) questions below and submit to your assessor for marking once completed. Student Name Student ID Students provide your responses in the boxes below each question Questions Satisfactory Y N Q1. Transmission control protocol (TCP) and user datagram protocol (UDP) are the most commonly used protocols for sending packets over the internet. Complete the table below by providing three (3) uses for each of these protocols. Protocol Describe three (3) uses of the protocol TCP 1. Reliable Data Transfer: By using mechanisms such as acknowledgements and sequence numbers, data can be transferred correctly and received in order. It is suitable for application where data integrity is crucial such as file transfers and email communication. 2. Connection Establishment and Termination: TCP requires 3-way handshake to establish a connection to makes sure that both sides know that they are ready to transfer data; and a 4-way handshake to gracefully terminate a connection. 3. Flow and Congestion Control: Flow control helps ensure that a sender does not overwhelm a receiver with data, while congestion control prevents network congestion by dynamically adjusting the transmission rate based on network conditions. UDP 1. Voice over IP(VoIP): UDP doesn’t require additional overhead for establishing and maintaining the connection. This feature makes possible for a lower latency communication, making UDP suitable for VoIP applications like Skype and Zoom. 2. Broadcasting: UDP is commonly used for broadcasting data to multiple recipients simultaneously. 3. DNS: UDP’s lightweight nature is suitable for DNS queries because they need fast lookup times, and they are short-lived and can tolerate some level of packet loss. Q2: Briefly outline two (2) features of IPv6 which differ from IPv4, along with two (2) benefits of using the IPv6. Features: 1. IPv6 uses a 128 bit address format; IPv4 uses a 32 bit address [ Short Answer Questions ] [ Task 2 of 3 ] Student knowledge assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1 [ 11/08/2023 ] Page 3 of 8 STUDENT RMIT Classification: Trusted 2. IPv6 uses hexadecimal number system; IPv4 uses decimal number system. Benefits: 1. The built-in security features such as mandatory support for IPsec and authentication of IP packets make IPv6 securer than IPv4. 2. Simplified Network Configuration: Address auto-configuration is built in to IPv6. Devices can automatically generate IPv6 addresses using the prefix received from routers. Q3: Outline three (3) key uses of a wireless local area network (LAN) along with three (3) vulnerabilities associated with using a wireless LAN. Uses: 1. The WLAN is highly scalable and easy to deploy, so it is particularly suitable for rapidly growing businesses or temporary setups. 2. By implementing wireless networks, organisations can save costs by eliminating cost of installing and maintaining some infrastructure such as ethernet cables, connectors. 3. The wireless technology breaks space limitations. People can use mobile devices and access to information and resources from different locations. Vulnerabilities: 1. Wireless networks are susceptible to DNS spoofing. Bad actors place an unauthorised device on the WLAN to spoof the DNS server and in turn, the spoofed DNS server redirects users and devices attempts to access a trusted resource to a malicious one. 2. It is relatively easy to eavesdrop wireless networks and sensitive data can be intercepted or exploited if the encryption methods are not properly implemented. 3. Password of wireless network can be easily hacked by bad actors if it is set default or weakly. Q4. There is a large range of cyber-security tools on the market. Different tools provide varying levels of security and offer different functions. Complete the table below by providing two (2) features and/or functions for each of the commonly used cyber security tools listed. Cyber security tool Two (2) features / functions of tools Wireshark Wireshark is a type of packet sniffer that intercepts network traffic in real-time. Users can select specific network interfaces to capture data packets as they pass through the network. It offers a series of filters to transform captured packets into a readable format. Security professionals can use it to analyse network traffic and identify network issues and threats. [ Short Answer Questions ] [ Task 2 of 3 ] Student knowledge assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1 [ 11/08/2023 ] Page 4 of 8 STUDENT Kali RMIT Classification: Trusted It has many pre-installed tools for penetration testing and ethical hacking such as nmap, wireshark, nikto and social engineering toolkit. It is built with security in mind. Various features and configurations such as full disk encryption and Tor Web browsing are included to safeguard user’s privacy and protect the system from vulnerabilities and attacks. Netstumbler Netstumbler allows users to detect nearbyt WiFi networks. Once started, the program will display the available networks with all their details. This includes MAC, SSID, IP address, speed channel number, and more. It also monitors detected Wi-Fi networks’ signal strength and SNR in real time. Signal strength represents the power level of the received signal from an AP; SNR measures the quality of signal by comparing the signal strength to background noise. Netstat Netstat shows network status. It displays information regarding traffic on the configured network interfaces such as protocol used, local and remote IP addresses, and port numbers. Netstat also displays the routing table of the host operating system. The routing table determines how network traffic should be forwarded to reach its destination. It contains details such as network destinations, gateway addresses, interface information, and routing metrics. Q5: Convert the following binary numbers to its hexadecimal representation. a. 1110001010001101 => E28D b. 1001011100111110 => 973E c. 0100011011001010 => 46CA d. 1011100101011010 => B95A e. 1000001011011011 => 82DB f. 1100011101011010 => C75A g. 0011011111111110 => 37FE h. 1000001000001010 => 820A Q6: Convert the following hexadecimal numbers to its binary representation. a. AEC => 101011101100 [ Short Answer Questions ] [ Task 2 of 3 ] Student knowledge assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1 [ 11/08/2023 ] Page 5 of 8 STUDENT b. c. d. e. f. g. h. RMIT Classification: Trusted 548 => 010101001000 DEED => 1101111011101101 673 => 011001110011 1101 => 0001000100000001 EA0 => 111010100000 43FD => 0100001111111101 2EA4 => 0010111010100100 Q7: Provide a summary of the QUIC transport layer protocol and outline 3 advantages over TCP QUIC (Quick UDP Internet Connections) is a modern, low-latency, and secure transport layer protocol that can be used to improve the performance of web applications and internet services. It is intended to solve some of TCP's (Transmission Control Protocol) restrictions while capitalising on UDP's (User Datagram Protocol) lightweight and connectionless nature. The advantages over TCP include: - - - QUIC does not require a three-way handshake, thus avoids delay when establishing a connection. The faster connection setup is important for reducing perceived load times in web applications and can improve overall user experience. Multiplexing: QUIC supports multiplexing, allowing it to handle multiple data streams within a single connection. This is very useful for efficiently delivering multiple requests simultaneously, resulting in faster page loading times and a better user experience. The TLS (Transport Layer Security) protocol built in QUIC ensures that data transmitted over a QUIC connection is protected, enhancing both security and privacy. QUIC provides end-to-end encryption for data in transit by default, making it a safe choice for apps and services. Q8: Identify the 2 features of LoRa and 2 features of NB-IoT LoRa (Long Range) and NB-IoT (Narrowband Internet of Things) are technologies used for lowpower, wide-area networking in Internet of Things (IoT). LoRa (Long Range): - - Long Range Communication: LoRa, which stands for Long Range, is a technology that allows data to be transmitted over extraordinarily long distances. It can travel several kilometres even with barriers. This capacity makes it ideal for applications where IoT devices are spread out over a wide area, such as remote agricultural monitoring, asset tracking and smart cities. Low Power Consumption: LoRa devices are designed to consume less power, which is essential for battery-powered IoT devices. These devices can operate in lowpower sleep states for a long period of time, and only activate when they need to send or receive data. This efficiency increases device battery life, minimising the need for frequent battery replacements or recharging, which is perfect for longterm IoT solution deployment. NB-IoT (Narrowband Internet of Things): [ Short Answer Questions ] [ Task 2 of 3 ] Student knowledge assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1 [ 11/08/2023 ] Page 6 of 8 STUDENT - - RMIT Classification: Trusted Licensed Spectrum: NB-IoT runs in licenced spectrum bands that are assigned and regulated by telecom authorities. This ensures that NB-IoT devices operate in a safe and interference-free environment. This licenced spectrum provides greater reliability as well as safety, making it appropriate for applications that require reliable and interference-free connectivity. NB-IoT is intended to work with existing cellular networks, such as 4G and 5G networks. This offers seamless connectivity and allows IoT devices to operate alongside traditional mobile devices. As a result, NB-IoT is well-suited for applications such as smart metering, smart cities, and industrial IoT, where devices must interact over a large area while relying on current cellular network infrastructure for smooth connectivity. Q9: What is a MAC Address and how does it work? Which device transmits data by primarily using MAC addresses? A MAC (Media Access Control) address is a unique identifier assigned to a network interface controller (NIC) or network adapter in a computing device. MAC addresses are related with Ethernet and Wi-Fi networks and are used at the data connection layer (Layer 2) of the OSI model. MAC addresses are used to transport data locally within a network. When a device wants to send data to another device on the same local network, it needs to know the destination device's MAC address. It can use protocols like ARP (Address Resolution Protocol) for IPv4 networks or NDP (Neighbour Discovery Protocol) for IPv6 networks to find this information. These protocols help resolve the destination device's IP address to its associated MAC address, allowing for proper data transmission within the local network. Each network interface card (NIC) has an unique MAC address which is typically represented as a 12-digit hexadecimal number. The network card transmits data by primarily using MAC addresses. Q10: How do TLS and HTTPS provide security for network communications? HTTPS utilises TLS (Transport Layer Security) technology to ensure secure web browsing. HTTPS encryption is critical for safeguarding sensitive data such as login credentials, credit card information, and personal information during online transactions and data submissions. HTTPS and TLS (Transport Layer Security) improve network security by: - Data encryption: To prevent unwanted access, TLS encrypts data while it is in transit. Data confidentiality is guaranteed by robust encryption. Data Integrity: TLS uses checksums to verify data integrity and identify transmission manipulation. Authentication: TLS enables mutual client-server authentication using trusted certificates, confirming identities. Forwards Secrecy: TLS provides forwards secrecy by employing temporary session keys to prevent previous sessions from being decrypted, [ Short Answer Questions ] [ Task 2 of 3 ] Student knowledge assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1 [ 11/08/2023 ] Page 7 of 8 STUDENT RMIT Classification: Trusted Section C – Feedback to Student Has the student successfully completed the task? Yes Feedback to student: Assessor Name Date [ Short Answer Questions ] [ Task 2 of 3 ] Student knowledge assessment task © Content is subject to copyright, RMIT University FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1 [ 11/08/2023 ] Page 8 of 8 No