Uploaded by Chen Fan

20230810 Task 2 Short Answer Questions VU23213 Student

advertisement
STUDENT
RMIT Classification: Trusted
STUDENT - KNOWLEDGE ASSESSMENT TASK
Task Number
National unit/s code
National qualification
code
RMIT Program code
2 of 3
VU23213
22603VIC
C4424
Task Name
National unit/s title
National qualification
title
RMIT Course code
Short answer questions
Utilise basic network concepts and protocols
required in cyber security
Certificate IV in Cyber Security
INTE5058
Section A - Assessment Information
Assessment duration and/or due date
This assessment will be released in Week 11 and will be
due in Week 15
Task instructions
Summary and Purpose of Assessment
This is the first assessment task of three assessments that students must satisfactorily complete, in order to be deemed
competent for this unit.
The purpose of this assessment task is for you to demonstrate knowledge of key network concepts and protocols which
are commonly used in industry.
Task instructions




Read and complete all ten (10) questions.
Seek assistance from your teacher if you need clarification with any of the questions.
Complete all sections before handing in your assessment for marking.
Your assessment responses will be assessed as per the marking criteria outlined in Section B of this document.
Where
This assessment will take place in class and/or outside of class time, as per your teacher’s instructions.
How
Students will be assessed against the criteria listed in the marking guide in Section B of this task. To achieve a satisfactory
result, students will need to address all criteria satisfactorily.
Conditions for assessment

Make sure you confirm your understanding of this task with your Assessor before beginning.

All work must meet the criteria to the standard described in the marking guide in Section B to be deemed
satisfactory in this assessment

You must submit all assessment evidence as instructed. Your assessor will assess the documentation you
provide
[ Short Answer Questions ]
[ Task 2 of 3 ]
Student knowledge assessment task © Content is subject to copyright, RMIT University
FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1
[ 11/08/2023 ]
Page 1 of 8
STUDENT
RMIT Classification: Trusted

Please make arrangements with your assessor at least one week prior to the assessment due date if you feel
you require special allowance or allowable adjustment to this task

Student must be observed undertaking this assessment task by a qualified assessor

As an assessor you can negotiate a suitable time and location for the assessment at least one week prior to the
assessment taking place

Student must complete the task within the maximum allowed duration as directed by the assessor.

This is an individual assessment task. Student will be assessed individually against all assessment criteria.

Student can make arrangements with the assessor at least one week prior to the assessment due date if they
require special allowance or allowable adjustment to this task.

Students found in breach of assessment conditions can be charged with academic misconduct, have their
results cancelled, be excluded from the program and receive other penalties. Penalties can also apply if a
student’s test material is copied by others.

Plagiarism is the presentation of the work, idea or creation of another person as though it is one’s own. It is a
form of cheating and is a very serious academic offence that may lead to expulsion from the University.
Plagiarised material can be drawn from, and presented in, written, graphic and visual form, including electronic
data, and oral presentations. Plagiarism occurs when the origin of the material used is not appropriately cited.

If students already registered with ELS and students’ study plan is approved, please inform your teacher if this
assessment task is not adjusted in line with approved study plan.

Please ensure students full and correct name is written on the student version of this assessment task (do not
use nicknames or abbreviations).

You will have the opportunity to resubmit any tools that are deemed unsatisfactory (one resubmission allowed
per unit, so that means you have two opportunities to submit)
Useful Links
Please use links below to access important information on assessments:
Assessment submission and appeals - Assessments
Extensions and special considerations - Extensions and special consideration
Equitable Assessment Arrangement (EAA) - Equitable Assessment Arrangements
Information on recording and retaining assessments and dealing with assessment appeals can be found in the
RMIT Assessment Processes document
Instructions on Submitting your Assessment
Students need to submit this assignment through CANVAS with the naming convention of:
<Student_Number>_<Student_Full_Name> _Project.zip
Equipment/resources students must supply (if applicable):
Equipment/resources to be provided by RMIT or the
workplace (if applicable):





RMIT internet access

RMIT Computer Labs and Learning
Resources/Software

Availability of Canvas to submit the knowledge
assessment
Computer or Laptop
Internet access
Learning Resources/Software
Pen and paper
[ Short Answer Questions ]
[ Task 2 of 3 ]
Student knowledge assessment task © Content is subject to copyright, RMIT University
FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1
[ 11/08/2023 ]
Page 2 of 8
STUDENT
RMIT Classification: Trusted
Section B – Student Answer Sheet
Short answer questions
Complete all ten (10) questions below and submit to your assessor for marking once completed.
Student Name
Student ID
Students provide your responses in the boxes below each question
Questions
Satisfactory
Y
N
Q1. Transmission control protocol (TCP) and user datagram protocol (UDP) are the most commonly used protocols
for sending packets over the internet.
Complete the table below by providing three (3) uses for each of these protocols.
Protocol
Describe three (3) uses of the protocol
TCP
1. Reliable Data Transfer: By using mechanisms such as
acknowledgements and sequence numbers, data can be transferred
correctly and received in order. It is suitable for application where data
integrity is crucial such as file transfers and email communication.
2. Connection Establishment and Termination: TCP requires 3-way
handshake to establish a connection to makes sure that both sides
know that they are ready to transfer data; and a 4-way handshake to
gracefully terminate a connection.
3. Flow and Congestion Control: Flow control helps ensure that a sender
does not overwhelm a receiver with data, while congestion control
prevents network congestion by dynamically adjusting the transmission
rate based on network conditions.
UDP
1. Voice over IP(VoIP): UDP doesn’t require additional overhead for
establishing and maintaining the connection. This feature makes
possible for a lower latency communication, making UDP suitable for
VoIP applications like Skype and Zoom.
2. Broadcasting: UDP is commonly used for broadcasting data to multiple
recipients simultaneously.
3. DNS: UDP’s lightweight nature is suitable for DNS queries because they
need fast lookup times, and they are short-lived and can tolerate some
level of packet loss.
Q2: Briefly outline two (2) features of IPv6 which differ from IPv4, along with two (2) benefits of using the IPv6.
Features:
1. IPv6 uses a 128 bit address format; IPv4 uses a 32 bit address
[ Short Answer Questions ]
[ Task 2 of 3 ]
Student knowledge assessment task © Content is subject to copyright, RMIT University
FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1
[ 11/08/2023 ]
Page 3 of 8
STUDENT
RMIT Classification: Trusted
2. IPv6 uses hexadecimal number system; IPv4 uses decimal number system.
Benefits:
1. The built-in security features such as mandatory support for IPsec and
authentication of IP packets make IPv6 securer than IPv4.
2. Simplified Network Configuration: Address auto-configuration is built in to IPv6.
Devices can automatically generate IPv6 addresses using the prefix received from
routers.
Q3: Outline three (3) key uses of a wireless local area network (LAN) along with three (3) vulnerabilities associated
with using a wireless LAN.
Uses:
1. The WLAN is highly scalable and easy to deploy, so it is particularly suitable for
rapidly growing businesses or temporary setups.
2. By implementing wireless networks, organisations can save costs by eliminating cost
of installing and maintaining some infrastructure such as ethernet cables,
connectors.
3. The wireless technology breaks space limitations. People can use mobile devices and
access to information and resources from different locations.
Vulnerabilities:
1. Wireless networks are susceptible to DNS spoofing. Bad actors place an
unauthorised device on the WLAN to spoof the DNS server and in turn, the spoofed
DNS server redirects users and devices attempts to access a trusted resource to a
malicious one.
2. It is relatively easy to eavesdrop wireless networks and sensitive data can be
intercepted or exploited if the encryption methods are not properly implemented.
3. Password of wireless network can be easily hacked by bad actors if it is set default
or weakly.
Q4. There is a large range of cyber-security tools on the market. Different tools provide varying levels of security
and offer different functions. Complete the table below by providing two (2) features and/or functions for each of
the commonly used cyber security tools listed.
Cyber security tool
Two (2) features / functions of tools
Wireshark
Wireshark is a type of packet sniffer that
intercepts network traffic in real-time. Users
can select specific network interfaces to
capture data packets as they pass through the
network.
It offers a series of filters to transform captured
packets into a readable format. Security
professionals can use it to analyse network
traffic and identify network issues and threats.
[ Short Answer Questions ]
[ Task 2 of 3 ]
Student knowledge assessment task © Content is subject to copyright, RMIT University
FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1
[ 11/08/2023 ]
Page 4 of 8
STUDENT
Kali
RMIT Classification: Trusted
It has many pre-installed tools for penetration
testing and ethical hacking such as nmap,
wireshark, nikto and social engineering toolkit.
It is built with security in mind. Various features
and configurations such as full disk encryption
and Tor Web browsing are included to
safeguard user’s privacy and protect the system
from vulnerabilities and attacks.
Netstumbler
Netstumbler allows users to detect nearbyt WiFi networks. Once started, the program will
display the available networks with all their
details. This includes MAC, SSID, IP address,
speed channel number, and more.
It also monitors detected Wi-Fi networks’ signal
strength and SNR in real time. Signal strength
represents the power level of the received
signal from an AP; SNR measures the quality of
signal by comparing the signal strength to
background noise.
Netstat
Netstat shows network status. It displays
information regarding traffic on the configured
network interfaces such as protocol used, local
and remote IP addresses, and port numbers.
Netstat also displays the routing table of the
host operating system. The routing table
determines how network traffic should be
forwarded to reach its destination. It contains
details such as network destinations, gateway
addresses, interface information, and routing
metrics.
Q5: Convert the following binary numbers to its hexadecimal representation.
a. 1110001010001101 => E28D
b. 1001011100111110 => 973E
c. 0100011011001010 => 46CA
d. 1011100101011010 => B95A
e. 1000001011011011 => 82DB
f. 1100011101011010 => C75A
g. 0011011111111110 => 37FE
h. 1000001000001010 => 820A
Q6: Convert the following hexadecimal numbers to its binary representation.
a.
AEC => 101011101100
[ Short Answer Questions ]
[ Task 2 of 3 ]
Student knowledge assessment task © Content is subject to copyright, RMIT University
FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1
[ 11/08/2023 ]
Page 5 of 8
STUDENT
b.
c.
d.
e.
f.
g.
h.
RMIT Classification: Trusted
548 => 010101001000
DEED => 1101111011101101
673 => 011001110011
1101 => 0001000100000001
EA0 => 111010100000
43FD => 0100001111111101
2EA4 => 0010111010100100
Q7: Provide a summary of the QUIC transport layer protocol and outline 3 advantages over TCP
QUIC (Quick UDP Internet Connections) is a modern, low-latency, and secure transport layer protocol
that can be used to improve the performance of web applications and internet services. It is intended
to solve some of TCP's (Transmission Control Protocol) restrictions while capitalising on UDP's (User
Datagram Protocol) lightweight and connectionless nature. The advantages over TCP include:
-
-
-
QUIC does not require a three-way handshake, thus avoids delay when establishing
a connection. The faster connection setup is important for reducing perceived load
times in web applications and can improve overall user experience.
Multiplexing: QUIC supports multiplexing, allowing it to handle multiple data
streams within a single connection. This is very useful for efficiently delivering
multiple requests simultaneously, resulting in faster page loading times and a better
user experience.
The TLS (Transport Layer Security) protocol built in QUIC ensures that data
transmitted over a QUIC connection is protected, enhancing both security and
privacy. QUIC provides end-to-end encryption for data in transit by default, making
it a safe choice for apps and services.
Q8: Identify the 2 features of LoRa and 2 features of NB-IoT
LoRa (Long Range) and NB-IoT (Narrowband Internet of Things) are technologies used for lowpower, wide-area networking in Internet of Things (IoT).
LoRa (Long Range):
-
-
Long Range Communication: LoRa, which stands for Long Range, is a technology that
allows data to be transmitted over extraordinarily long distances. It can travel
several kilometres even with barriers. This capacity makes it ideal for applications
where IoT devices are spread out over a wide area, such as remote agricultural
monitoring, asset tracking and smart cities.
Low Power Consumption: LoRa devices are designed to consume less power, which
is essential for battery-powered IoT devices. These devices can operate in lowpower sleep states for a long period of time, and only activate when they need to
send or receive data. This efficiency increases device battery life, minimising the
need for frequent battery replacements or recharging, which is perfect for longterm IoT solution deployment.
NB-IoT (Narrowband Internet of Things):
[ Short Answer Questions ]
[ Task 2 of 3 ]
Student knowledge assessment task © Content is subject to copyright, RMIT University
FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1
[ 11/08/2023 ]
Page 6 of 8
STUDENT
-
-
RMIT Classification: Trusted
Licensed Spectrum: NB-IoT runs in licenced spectrum bands that are assigned and
regulated by telecom authorities. This ensures that NB-IoT devices operate in a safe
and interference-free environment. This licenced spectrum provides greater
reliability as well as safety, making it appropriate for applications that require
reliable and interference-free connectivity.
NB-IoT is intended to work with existing cellular networks, such as 4G and 5G
networks. This offers seamless connectivity and allows IoT devices to operate
alongside traditional mobile devices. As a result, NB-IoT is well-suited for
applications such as smart metering, smart cities, and industrial IoT, where devices
must interact over a large area while relying on current cellular network
infrastructure for smooth connectivity.
Q9: What is a MAC Address and how does it work?
Which device transmits data by primarily using MAC addresses?
A MAC (Media Access Control) address is a unique identifier assigned to a network interface
controller (NIC) or network adapter in a computing device. MAC addresses are related with Ethernet
and Wi-Fi networks and are used at the data connection layer (Layer 2) of the OSI model.
MAC addresses are used to transport data locally within a network. When a device wants to send
data to another device on the same local network, it needs to know the destination device's MAC
address. It can use protocols like ARP (Address Resolution Protocol) for IPv4 networks or NDP
(Neighbour Discovery Protocol) for IPv6 networks to find this information. These protocols help
resolve the destination device's IP address to its associated MAC address, allowing for proper data
transmission within the local network. Each network interface card (NIC) has an unique MAC address
which is typically represented as a 12-digit hexadecimal number.
The network card transmits data by primarily using MAC addresses.
Q10: How do TLS and HTTPS provide security for network communications?
HTTPS utilises TLS (Transport Layer Security) technology to ensure secure web browsing. HTTPS
encryption is critical for safeguarding sensitive data such as login credentials, credit card information,
and personal information during online transactions and data submissions.
HTTPS and TLS (Transport Layer Security) improve network security by:
-
Data encryption: To prevent unwanted access, TLS encrypts data while it is in
transit. Data confidentiality is guaranteed by robust encryption.
Data Integrity: TLS uses checksums to verify data integrity and identify transmission
manipulation.
Authentication: TLS enables mutual client-server authentication using trusted
certificates, confirming identities.
Forwards Secrecy: TLS provides forwards secrecy by employing temporary session
keys to prevent previous sessions from being decrypted,
[ Short Answer Questions ]
[ Task 2 of 3 ]
Student knowledge assessment task © Content is subject to copyright, RMIT University
FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1
[ 11/08/2023 ]
Page 7 of 8
STUDENT
RMIT Classification: Trusted
Section C – Feedback to Student
Has the student successfully completed the task?
Yes
Feedback to student:
Assessor Name
Date
[ Short Answer Questions ]
[ Task 2 of 3 ]
Student knowledge assessment task © Content is subject to copyright, RMIT University
FINAL APPROVED – STUDENT KNOWLEDGE ASSESSMENT TASK TEMPLATE – July 2023_Version 2.1
[ 11/08/2023 ]
Page 8 of 8
No
Download