Unit Details | Name | Computer Network Security |
Code | HI6044 | |
Year, Trimester | Trimester 2, 2024 |
Assessment Details | Name | Final Individual Assessment |
Due Date & Time | 10 October, 2024 10.59 pm - Gold Coast students 11:59 pm - Melbourne & Sydney students |
Student Details | Student Number | |
First Name | ||
Family Name |
Submission Declaration | Integrity Declaration | I have read and understand academic integrity policies and practices and my assessment does not violate these. |
Full Name | ||
Submission Date |
ALL SUBMISSIONS MUST INCLUDE YOUR STUDENT DETAILS AND SUBMISSION DECLARATION.
IF THESE DETAILS ARE NOT COMPLETED YOU RISK BEING PENALISED
Academic Integrity Information | Holmes Institute is committed to ensuring and upholding academic integrity. All assessment must comply with academic integrity guidelines. Important academic integrity breaches include plagiarism, collusion, copying, impersonation, contract cheating, data fabrication and falsification. Please learn about academic integrity and consult your teachers with any questions. Violating academic integrity is serious and punishable by penalties that range from deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment, or cancellation of course enrolment.
|
Format & submission instructions |
|
Penalties |
|
All responses must be entered in the answer boxes at the end of each question
Question 1 (10 marks)
Network Firewall Design
Below is a diagram of a simple internal network connected to the internet:
Required:
ANSWER (box will enlarge as you enter your response)
ANSWER:
ANSWER:
Question 2 (10 marks)
Wireless Network Security
Consider the wireless network diagram below, which includes access points, clients, and the internet gateway:
Required:
ANSWER:
ANSWER:
ANSWER
Question 3 (10 marks)
Explain the concept of zero trust architecture in network security and its advantages in modern network infrastructures.
ANSWER
Question 4 (10 marks)
Analyse the security challenges in wireless networks and propose strategies for securing wireless communications.
ANSWER
Question 5 (10 marks)
How does Transport Layer Security (TLS) work in securing network connections?
ANSWER
END OF FINAL INDIVIDUAL ASSESSMENT
Get original papers written according to your instructions and save time for what matters most.