0% found this document useful (0 votes)
52 views3 pages

Questions

This document is a written assessment for the Cyber Security Technician Level 6 course, focusing on building secure networks. It consists of two sections with various questions covering topics such as networking devices, topologies, security threats, protocols, and perimeter security. Candidates are instructed to answer all questions in Section A and choose three from Section B, with a total assessment time of 3 hours.

Uploaded by

Kennedy githaiga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views3 pages

Questions

This document is a written assessment for the Cyber Security Technician Level 6 course, focusing on building secure networks. It consists of two sections with various questions covering topics such as networking devices, topologies, security threats, protocols, and perimeter security. Candidates are instructed to answer all questions in Section A and choose three from Section B, with a total assessment time of 3 hours.

Uploaded by

Kennedy githaiga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

©TVET CDACC 2023

061206T4CYB
CYBER SECURITY TECHNICIAN LEVEL 6
SEC/OS/CS/CR/04/6/A
BUILD SECURE NETWORK
Nov. / Dec. 2023

TVET CURRICULUM DEVELOPMENT, ASSESSMENT AND CERTIFICATION


COUNCIL (TVET CDACC)

WRITTEN ASSESSMENT
Time: 3 Hours

INSTRUCTIONS TO CANDIDATES
1. This paper has two sections A and B.
2. You are provided with a separate answer booklet.
3. Marks for each question are as indicated.
4. Do not write on the question paper.

This paper consists of THREE (3) printed pages.


Candidates should check the question paper to ascertain that
all pages are printed as indicated and that no questions are missing.

Page 1 of 3

Downloaded by Kennedy githaiga


©TVET CDACC 2023
SECTION A (40 MARKS)
Answer all the questions from this section

1. Differentiate between the following devices, switch and a router as used in networking.
(4 marks)
2. Explain any TWO types of topologies as used in networking (4 marks)
3. State FOUR network security threats (4 marks)
4. Highlight THREE main types of network security protocols. (3 marks)
5. List FOUR strategies deployed to implement perimeter security. (4 marks)
6. State FIVE types of wireless media connections. (5 marks)
7. Identify FOUR types of networks classified according to geographical location. (4 marks)
8. Highlight FOUR benefits of preparing networking reports. (4 marks)
9. Identify FIVE measures that can be taken to improve network speed. (5 marks)
10. List THREE types of networks security test. (3 marks)

Page 2 of 3

Downloaded by Kennedy githaiga


©TVET CDACC 2023
SECTION B (60 MARKS)
Answer THREE questions from this section.

11. As a network security engineer:


a) Describe FIVE factors to consider in analyzing network security protocol. (10 marks)
b) Describe FIVE benefits of analyzing network security protocol. (10 marks)
12. A Financial system company in Nairobi has contracted you to implement the Perimeter security
solution in their network.
a) Describe FIVE challenges you are likely to face when installing and configuring a perimeter
solution. (10 marks)
b) Describe FIVE techniques you are likely to deploy to provide the perimeter network with
self- defensive mechanisms against potential threats and attacks. (10 marks)
13. Successful installation of a perimeter solution requires configuration of internal networks as
well as external networks.
a) Describe FIVE key features of both internal and external networks. (10 marks)
b) Describe FIVE factors to consider in configuration of internal network devices. (10 marks)
14. The Ministry of Defense has just completed implementing the Perimeter security solution. They
have recruited you as the Network security engineer.
a) Describe FIVE key processes of performing network security tests to verify design
performance. (10 marks)
b) Outline FIVE factors to consider when performing network security tests. (10 marks)

END

Page 3 of 3

Downloaded by Kennedy githaiga

You might also like