You are on page 1of 14

Unit:

Network Security and Cryptography


Time-Controlled Assessment Paper

07 September 2021
Marking Scheme
Markers are advised that, unless a task specifies that an answer be provided in a
particular form, then an answer that is correct (factually or in practical terms) must be
given the available marks. If there is doubt as to the correctness of an answer, the relevant
NCC Education materials should be the first authority.

This marking scheme has been prepared as a guide only to markers and there will
frequently be many alternative responses which will provide a valid answer.

Each candidate’s script must be fully annotated with the marker’s comments (where
applicable) and the marks allocated for each part of the tasks.

Throughout the marking, please credit any valid alternative point.

Where markers award half marks in any part of a task, they should ensure that the
total mark recorded for the task is rounded up to a whole mark.

Marker's comments:

Moderator's comments:

Mark: Moderated mark: Final mark:

Penalties applied for academic malpractice:


Answer ALL questions

Question 1 – 25 marks (LO 2, 3, 4, 5 & 6)


From your initial vulnerability scan, you discovered the customer service website uses
HTTP (HyperText Transfer Protocol) instead of HTTPS (HyperText Transfer Protocol
Secure).

Part (a) - 5 marks

Explain the difference between vulnerability scanning and vulnerability management.

Marking Scheme

0-1 marks 2-3 marks 4-5 marks


No or rudimentary/error- Some description, but An excellent description
prone: missing key points on: includes:
• explanation of the difference • discussion on the • explanation of the difference
between vulnerability difference between between vulnerability
management and vulnerability vulnerability management management and vulnerability
scanning. and vulnerability scanning.
• examples of vulnerability scanning. • detailed examples of
management processes and • examples of vulnerability vulnerability management
vulnerability scanning types and management processes processes and vulnerability
tools. and vulnerability scanning scanning types and tools.
types and tools.

Part (b) - 10 marks

Explain the weakness associated with the use of HTTP on the website and explain the main
benefits of HTTPS compared to HTTP.

Marking Scheme

0-2 marks 3 marks 4-5 marks 6 marks 7-10 marks


No or Some Includes key Detailed An excellent
rudimentary/error- description, points on: discussion description
prone: but missing Discussion on with minor includes:
Discussion on key points on: risks omissions on: Discussion on
risks Discussion on • sensitive data • sensitive data risks
• sensitive data risks transmitted in transmitted in • sensitive data
transmitted in clear • sensitive data clear text/not clear text/not transmitted in
text/not encrypted. transmitted in encrypted. encrypted. clear text/not
• Man-in-the-middle clear text/not • Man-in-the • Man-in-the encrypted.
attacks. encrypted. middle attacks. middle attacks. • Man-in-the
• Sniffing and • Man-in-the • Sniffing and • Sniffing and middle attacks.
Eavesdropping middle attacks. Eavesdropping Eavesdropping • Sniffing and
attacks. • Sniffing and attacks. attacks. Eavesdropping
Eavesdropping attacks.
attacks.

Page 2 of 14
Network Security and Cryptography © NCC Education Limited 2021
Benefits of HTTPS Benefits of Benefits of Benefits of Benefits of
over HTTP HTTPS over HTTPS over HTTPS over HTTPS over
• Creates secure HTTP HTTP HTTP HTTP
communication • Creates • Creates • Creates • Creates
between web secure secure secure secure
browser and web communication communication communication communication
server. between web between web between web between web
• Data sent and browser and browser and browser and browser and
received are web server. web server. web server. web server.
encrypted. • Data sent and • Data sent and • Data sent and • Data sent and
received are received are received are received are
encrypted. encrypted. encrypted. encrypted.

Part (c) - 10 marks

To enable HTTPS on the website, you must obtain a digital certificate from a Certificate
Authority (CA).

i) Explain the role of a Certificate Authority (CA).

ii) Highlight the information included in a digital certificate.

Marking Scheme

0-2 marks 3 marks 4-5 marks 6 marks 7-10 marks


No or Some Includes key Detailed An excellent
rudimentary description, but points and discussion with description
/error-prone missing key description on: minor includes:
discussion on: points on: • CA issues omissions on • CA issues
• CA issues • CA issues certificates and • CA issues certificates and
certificates and certificates and verifies the certificates and verifies the
verifies the verifies the identity identity of the verifies the identity of the
identity of the of the owner to a owner to a identity of the owner to a
owner to a certain standard certain standard owner to a certain standard
certain standard and signs the and signs the certain standard and signs the
and signs the certificate. certificate. and signs the certificate.
certificate. • CA responsible • CA responsible certificate. • CA responsible
• CA for issuing for issuing • CA responsible for issuing
responsible for certificates to certificates to for issuing certificates to
issuing users, computers, users, certificates to users,
certificates to or other entities, computers, or users, computers, or
users, such as other entities, computers, or other entities,
computers, or subordinate CAs. such as other entities, such as
other entities, • Football Direct subordinate such as subordinate
such as Ltd required to fill CAs. subordinate CAs.
subordinate an Application • Football Direct CAs. • Football Direct
CAs. Form for online Ltd required to • Football Direct Ltd required to
• Football Direct submission and fill an Application Ltd required to fill an Application
Ltd required to verification of Form for online fill an Application Form for online
fill an personal details by submission and Form for online submission and
Application the certifying verification of submission and verification of
Form for online authority. personal details verification of personal details
submission and by the certifying personal details by the certifying
verification of authority. authority.
Page 3 of 14
Network Security and Cryptography © NCC Education Limited 2021
personal details • matching private • matching by the certifying • matching
by the certifying and public key pair private and authority. private and
authority. may be generated public key pair • matching public key pair
• matching by the CA or by the may be private and may be
private and individual generated by the public key pair generated by the
public key pair requesting the CA or by the may be CA or by the
may be certificate. individual generated by the individual
generated by • Verify the requesting the CA or by the requesting the
the CA or by the requester's certificate. individual certificate.
individual information and • Verify the requesting the • Verify the
requesting the verify if the policy requester's certificate. requester's
certificate. allows the information and • Verify the information and
• Verify the requester to verify if the requester's verify if the
requester's perform that policy allows the information and policy allows the
information and operation and requester to verify if the requester to
verify if the validate a perform that policy allows the perform that
policy allows the certificate. operation and requester to operation and
requester to validate a perform that validate a
perform that certificate. operation and certificate.
operation and validate a
validate a certificate.
certificate.
Information in a Information in a Information in a Information in a Information in a
digital certificate digital certificate digital certificate digital certificate digital certificate
include: include: include: include: include:
• the identity of • the identity of the • the identity of • the identity of • the identity of
the owner of the owner of the the owner of the the owner of the the owner of the
corresponding corresponding corresponding corresponding corresponding
private key private key private key private key private key
• the length of • the length of the • the length of • the length of • the length of
the key key the key the key the key
• the algorithm • the algorithm • the algorithm • the algorithm • the algorithm
used by the key used by the key used by the key used by the key used by the key
• the associated • the associated • the associated • the associated • the associated
hashing hashing algorithm hashing hashing hashing
algorithm • dates of validity algorithm algorithm algorithm
• dates of of the certificate • dates of validity • dates of validity • dates of validity
validity of the • the actions that of the certificate of the certificate of the certificate
certificate the key can be • the actions that • the actions that • the actions that
• the actions that used for the key can be the key can be the key can be
the key can be used for used for used for
used for

Page 4 of 14
Network Security and Cryptography © NCC Education Limited 2021
Question 2 – 25 marks (LO 3, 5 & 7)
The attackers gained access to the company’s network using a stolen administrator’s
username and password. They were able to steal electronic files and customer data
successfully.

Part (a) - 10 marks

Discuss access control mechanisms that can be implemented to protect the company’s
files, documents and customer data stored on hard drives from unauthorised access.

Marking Scheme

0-2 marks 3 marks 4-5 marks 6 marks 7-10 marks


No or Some Includes key Detailed An excellent
rudimentary/ description, points and discussion with description
error-prone but missing description on: minor includes:
discussion on: key points on: • Full Disk omissions on: • Full Disk
• Full Disk • Full Disk encryption • Full Disk encryption
encryption encryption examples of tools encryption examples of
examples of tools examples of that can be used. examples of tools that can be
that can be used. tools that can be • File System tools that can be used.
• File System used. encryption used. • File System
encryption • File System • password- • File System encryption
• password- encryption protecting encryption • password-
protecting • password- document access • password- protecting
document access protecting controls solutions. protecting document
controls solutions. document document access controls
access controls access controls solutions.
solutions. solutions.
folder and file folder and file folder and file folder and file folder and file
encryption encryption encryption encryption encryption
• Encrypting • Encrypting • Encrypting • Encrypting • Encrypting
individual files or individual files or individual files or individual files or individual files or
individual folders/ individual individual folders/ individual individual
directories on the folders/ directories on the folders/ folders/
hard drive directories on hard drive directories on directories on
the hard drive the hard drive the hard drive.

Page 5 of 14
Network Security and Cryptography © NCC Education Limited 2021
Part (b) - 15 marks

Biometrics have been suggested to improve authentication on the company’s network.

i) Explain how the use of biometrics can improve authentication.

ii) Discuss two other methods that can be used to improve password authentication on
the company’s network.

Marking Scheme

0-3 marks 4-5 marks 6-8 marks 9 marks 10-15 marks


No or Some Includes key Detailed An excellent
rudimentary/ description, but points and discussion with description
error-prone missing key description on: minor includes:
discussion on: points on: • Biometrics uses omissions on: • Biometrics uses
• Biometrics uses • Biometrics uses the unique • Biometrics uses the unique
the unique the unique characteristic of the unique characteristic of
characteristic of characteristic of humans such as characteristic of humans such as
humans such as humans such as physical or humans such as physical or
physical or physical or behavioural traits physical or behavioural traits
behavioural traits behavioural traits to provide a non- behavioural traits to provide a non-
to provide a non- to provide a non- transferable to provide a non- transferable
transferable transferable authentication transferable authentication
authentication authentication method. authentication method.
method. method. • improving method. • improving
• improving • improving password • improving password
password password security includes password security includes
security includes security includes enforcing security includes enforcing
enforcing enforcing complex/stronger enforcing complex/stronger
complex/stronger complex/stronger passwords. complex/stronger passwords.
passwords. passwords. • implementing a passwords. • implementing a
• implementing a • implementing a security policy • implementing a security policy
security policy security policy that includes but security policy that includes but
that includes but that includes but is not limited to that includes but is not limited to
is not limited to is not limited to password is not limited to password
password password expiration and password expiration and
expiration and expiration and complexity. expiration and complexity.
complexity. complexity. complexity.

Page 6 of 14
Network Security and Cryptography © NCC Education Limited 2021
Question 3 – 25 marks (LO 7)
The Chief Information Officer asked you to install firewalls and create a Demilitarised Zone
(DMZ). The company’s current network diagram is shown below.

Part (a) - 5 marks


Design a new diagram that includes a single firewall to prevent unauthorised users from
accessing the internal network.

Marking Scheme

Suggested Diagram (or similar)

Page 7 of 14
Network Security and Cryptography © NCC Education Limited 2021
0-1 marks 2-3 marks 4-5 marks
• No diagram • The diagram shows key • An excellent well-labelled diagram or
illustrating the answer components with some like the suggested diagram in the
OR omissions OR marking scheme OR
• Diagram included but • Major errors in the • Detailed diagram with few
rudimentary and diagram. inconsistencies.
incorrect.

Part (b) - 10 marks

Explain the difference between a stateful firewall and a deep packet inspection firewall. You
should highlight their relative advantages based on the scenario.

Marking Scheme

0-2 marks 3 marks 4-5 marks 6 marks 7-10 marks


No or Some Includes key points Detailed Excellent details
rudimentary/error- description, but and description on discussion with on:
prone discussion missing key • deep packet minor omissions • deep packet
on: points on: inspection firewalls on: inspection
• deep packet • deep packet can reassemble the • deep packet firewalls can
inspection firewalls inspection contents of the traffic inspection firewalls reassemble the
can reassemble the firewalls can to see what it will can reassemble the contents of the
contents of the reassemble the deliver to the contents of the traffic traffic to see what
traffic to see what it
contents of the application for which to see what it will it will deliver to
will deliver to the traffic to see what it is destined. deliver to the the application for
application for it will deliver to application for which which it is
which it is destined.the application for it is destined. destined.
which it is
destined.
No or Some Includes key points Detailed Excellent details
rudimentary/error- description, but and description on: discussion with on:
prone discussion missing key • stateful packet minor omissions • stateful packet
on: points on: inspection firewalls on: inspection
• stateful packet • stateful packet as being capable of • stateful packet firewalls as being
inspection firewalls inspection inspecting the inspection firewalls capable of
as being capable of firewalls as being payload of a packet. as being capable of inspecting the
inspecting the capable of • session data inspecting the payload of a
payload of a inspecting the associated with a payload of a packet. packet.
packet. payload of a packet and use this • session data • session data
• session data packet. to determine associated with a associated with a
associated with a • session data whether a packet packet and use this packet and use
packet and use this associated with a can pass through or to determine this to determine
to determine packet and use not. whether a packet whether a packet
whether a packet this to determine can pass through or can pass through
can pass through whether a packet not. or not.
or not. can pass through
or not.

Page 8 of 14
Network Security and Cryptography © NCC Education Limited 2021
Part (c) - 10 marks

i) Explain what a Demilitarised zone (DMZ) is.

ii) Design a new diagram using a dual firewall to create a DMZ that prevents
unauthorised users from accessing the internal network but allows customers
access to the company’s web server.

Marking Scheme

Suggested Diagram (or similar)

0-2 marks 3 marks 4-5 marks 6 marks 7-10 marks


No or Some Includes key points Detailed Excellent details
rudimentary/error- description, but and description on: discussion with on:
prone discussion missing key A demilitarised zone minor omissions A demilitarised
on: points on: (DMZ) is a layer of on: zone (DMZ) is a
A demilitarised A demilitarised protection that A demilitarised zone layer of protection
zone (DMZ) is a zone (DMZ) is a separates a device (DMZ) is a layer of that separates a
layer of protection layer of from the rest of a protection that device from the
that separates a protection that network. separates a device rest of a network.
device from the separates a from the rest of a
rest of a network. device from the network.
rest of a network.
No diagram Diagram included Detailed diagram Detailed diagram An excellent well-
illustrating the but rudimentary with major with few labelled diagram
answer. and incorrect. inconsistencies. inconsistencies. or like the
suggested
diagram in the
marking scheme

Page 9 of 14
Network Security and Cryptography © NCC Education Limited 2021
Question 4 – 25 marks (LO 1, 7, 8 & 9)

Part (a) - 15 marks

The Chief Information Officer suggests that you configure a Virtual Private Network (VPN).

i) Explain how a VPN functions and how it can be used by the company based on the
scenario.

ii) VPNs use AES (Advanced Encryption Standard) encryption during remote
connections. Explain AES encryption and how it works.

Marking Scheme

0-3 marks 4-5 marks 6-8 marks 9 marks 10-15 marks


No or Some Includes key Detailed Excellent
rudimentary/error- description, but points and discussion explanation
prone discussion missing key description on: with minor on:
on: points on: • Virtual private omissions on: • Virtual private
• Virtual private • Virtual private networks • Virtual private networks
networks (VPNs) networks (VPNs) (VPNs) can help networks (VPNs) can help
can help you send can help you you send (VPNs) can help you send
sensitive traffic send sensitive sensitive traffic you send sensitive traffic
over insecure traffic over over insecure sensitive traffic over insecure
networks for insecure networks for over insecure networks for
remote employees networks for remote networks for remote
working from remote employees remote employees
home. employees working from employees working from
• Often called a working from home. working from home.
tunnel, a VPN home. • Often called a home. • Often called a
connection is an • Often called a tunnel, a VPN • Often called a tunnel, a VPN
encrypted tunnel, a VPN connection is an tunnel, a VPN connection is an
connection connection is an encrypted connection is an encrypted
between remote encrypted connection encrypted connection
employees and the connection between remote connection between remote
company network. between remote employees and between remote employees and
• AES is a block employees and the company employees and the company
cipher that the company network. the company network.
processes blocks network. • AES is a block network. • AES is a block
of 128 bits using a • AES is a block cipher that • AES is a block cipher that
secret key of 128, cipher that processes cipher that processes
192, or 256 bits. It processes blocks blocks of 128 processes blocks of 128
is slightly faster of 128 bits using bits using a blocks of 128 bits using a
compared to 3DES. a secret key of secret key of bits using a secret key of
128, 192, or 256 128, 192, or 256 secret key of 128, 192, or 256
bits. It is slightly bits. It is slightly 128, 192, or 256 bits. It is slightly
faster compared faster compared bits. It is slightly faster compared
to 3DES. to 3DES. faster compared to 3DES.
to 3DES.

Page 10 of 14
Network Security and Cryptography © NCC Education Limited 2021
Part (b) - 10 marks

The attackers had access to the company’s network for more than 60 days before they were
discovered.

i) Discuss security tools that could have been used to detect suspicious activities on
the company’s network.

ii) You discovered some access points on the internal network that supports Wired
Equivalent Privacy (WEP) security protocol. Discuss the security flaws associated
with WEP and highlight alternative secure wireless protocols.

Marking Scheme

0-2 marks 3 marks 4-5 marks 6 marks 7-10 marks


No or Some Includes key Detailed An excellent
rudimentary/ description, but points of discussion on: explanation on:
error-prone missing key description on: • Intrusion • Intrusion
discussion on: points on: • Intrusion Detection/Preve Detection/Prevent
• Intrusion • Intrusion Detection/ ntion Systems ion Systems
Detection/ Detection/ Prevention (IDS/IPS) (IDS/IPS)
Prevention Prevention Systems monitors monitors network
Systems Systems (IDS/IPS) network traffic traffic and alert
(IDS/IPS) (IDS/IPS) monitors and alert the the network
monitors network monitors network network traffic network administrator.
traffic and alert traffic and alert and alert the administrator. • Respond or
the network the network network • Respond or prevent to
administrator. administrator. administrator. prevent to suspicious
• Respond or • Respond or • Respond or suspicious activity.
prevent to prevent to prevent to activity. • use of
suspicious suspicious suspicious • use of signature-based
activity. activity. activity. signature-based or anomaly-
• use of • use of • use of or anomaly- based to detect
signature-based signature-based signature-based based to detect intrusions.
or anomaly-based or anomaly-based or anomaly- intrusions. • HIDS and NIDS
to detect to detect based to detect • HIDS and
intrusions. intrusions. intrusions. NIDS
• HIDS and NIDS • HIDS and NIDS • HIDS and
NIDS
No discussion Some Includes key Detailed An excellent
/rudimentary description, but points of discussion on explanation on
discussion on missing key description on weaknesses of the weakness of
security flaws points on weaknesses of WEP such as: WEP such as:
associated with weaknesses of WEP such as: • Uses the RC4 • Uses the RC4
WEP such as: WEP such as: • Uses the RC4 stream cipher stream cipher for
• Uses the RC4 • Uses the RC4 stream cipher for confidentiality
stream cipher for stream cipher for for confidentiality • Uses the CRC-
confidentiality confidentiality confidentiality • Uses the CRC- 32 checksum for
• Uses the CRC- • Uses the CRC- • Uses the CRC- 32 checksum for integrity
32 checksum for 32 checksum for 32 checksum for integrity • Secret keys can
integrity integrity integrity •Secret keys be 64 or 128 bits
can be 64 or long
128 bits long

Page 11 of 14
Network Security and Cryptography © NCC Education Limited 2021
• Secret keys can • Secret keys can • Secret keys •Some vendors •Some vendors
be 64 or 128 bits be 64 or 128 bits can be 64 or do supply 256- do supply 256-bit
long long 128 bits long bit key version key version
• Some vendors • Some vendors • Some vendors •Can hold up to •Can hold up to
do supply 256-bit do supply 256-bit do supply 256- four shared four shared
key version key version bit key version secret keys secret keys
• Can hold up to • Can hold up to • Can hold up to •One key is •One key is
four shared four shared four shared designated as designated as the
secret keys secret keys secret keys the default key default key
• One key is • One key is • One key is •Key size is one •Key size is one
designated as the designated as the designated as of the security of the security
default key default key the default key limitations in limitations in
• Key size is one • Key size is one • Key size is one WEP WEP
of the security of the security of the security
limitations in limitations in limitations in Alternative Alternative
WEP WEP WEP secure wireless secure wireless
protocols protocols include:
Alternative secure Alternative secure Alternative include:
wireless protocols wireless protocols secure wireless • WPA3
include: include: protocols • WPA3 • WPA2
include: WPA2 Enterprise
• WPA3 • WPA3 Enterprise
• WPA2 • WPA2 • WPA3
Enterprise Enterprise • WPA2
Enterprise

Page 12 of 14
Network Security and Cryptography © NCC Education Limited 2021
Learning Outcomes matrix

Task Learning Outcomes Marker can differentiate


assessed between varying levels of
achievement
1 LO2 LO3 LO4 LO5 LO6 Yes
2 LO5 LO7 LO3 Yes
3 LO7 Yes
4 LO1, LO7 LO8 LO9 Yes

Grade descriptors

Learning Fail Referral Pass Merit Distinction


Outcome
Understand Can basically In a limited Can adequately Can soundly Can coherently
the most identify, adapt way, can Identify, adapt identify, adapt identify, adapt
common and use identify, adapt and use and use and use
types of appropriate and use appropriate appropriate appropriate
cryptographic skills, methods appropriate skills, methods skills, methods skills, methods
algorithm and procedures skills, methods and procedures and procedures and procedures
to reach basic and procedures to reach to reach to reach well
solutions. to reach limited appropriate supported and supported and
solutions. solutions. appropriate highly
solutions. appropriate
solutions.
Understand Demonstrates Demonstrates Demonstrates Demonstrates Demonstrates
the Public- basic ability to limited ability to adequate ability sound ability to comprehensive
key review the review the to review the review the ability to review
Infrastructure effectiveness effectiveness effectiveness effectiveness the
and and and and effectiveness
appropriatenes appropriatenes appropriatenes appropriatenes and
s of actions, s of actions s of actions s of actions appropriatenes
methods and methods and methods and methods and s of actions
results. results. results. results. methods and
results.
Understand Demonstrates Demonstrates Demonstrates Demonstrates Demonstrates
security basic ability to limited ability to adequate ability sound ability to comprehensive
protocols for review the review the to review the review the ability to review
protecting effectiveness effectiveness effectiveness effectiveness the
data on and and and and effectiveness
networks appropriatenes appropriatenes appropriatenes appropriatenes and
s of actions, s of actions s of actions s of actions appropriatenes
methods and methods and methods and methods and s of actions
results. results. results. results. methods and
results.
Be able to Can basically In a limited Can adequately Can soundly Can coherently
digitally sign identify, adapt way, can Identify, adapt identify, adapt identify, adapt
emails and and use identify, adapt and use and use and use
files appropriate and use appropriate appropriate appropriate
skills, methods appropriate skills, methods skills, methods skills, methods
and procedures skills, methods and procedures and procedures and procedures
to reach basic and procedures to reach to reach to reach well
solutions. to reach limited appropriate supported and supported and
solutions. solutions. appropriate highly
solutions. appropriate
solutions.
Page 13 of 14
Network Security and Cryptography © NCC Education Limited 2021
Understand Provides basic Provides limited Provides Provides critical Provides
Vulnerability interpretation interpretation consistent interpretation consistently
Assessments and evaluation and evaluation interpretation and evaluation critical
and the of relevant of relevant and evaluation of relevant interpretation
weakness of information and information and of relevant information and and evaluation
using ideas to ideas to information and ideas to of relevant
passwords address address ideas to address information and
for problems that problems that address problems that ideas to
authenticatio are well defined are well defined problems that are well defined address
n but non-routine. but non-routine. are well defined but non-routine. problems that
but non-routine. are well defined
but non-routine.
Be able to Can basically In a limited Can adequately Can soundly Can coherently
perform identify, adapt way, can Identify, adapt identify, adapt identify, adapt
simple and use identify, adapt and use and use and use
vulnerability appropriate and use appropriate appropriate appropriate
assessments skills, methods appropriate skills, methods skills, methods skills, methods
and and procedures skills, methods and procedures and procedures and procedures
password to reach basic and procedures to reach to reach to reach well
audits solutions. to reach limited appropriate supported and supported and
solutions. solutions. appropriate highly
solutions. appropriate
solutions.
Be able to Can basically In a limited Can adequately Can soundly Can coherently
configure identify, adapt way, can Identify, adapt identify, adapt identify, adapt
simple and use identify, adapt and use and use and use
firewall appropriate and use appropriate appropriate appropriate
architectures skills, methods appropriate skills, methods skills, methods skills, methods
and procedures skills, methods and procedures and procedures and procedures
to reach basic and procedures to reach to reach to reach well
solutions. to reach limited appropriate supported and supported and
solutions. solutions. appropriate highly
solutions. appropriate
solutions.
Understand Has basic Has limited Has adequate Has sound, Has
Virtual awareness of awareness of awareness of informed comprehensive,
Private different different different awareness of well-informed
Networks perspectives or perspectives or perspectives or different awareness of
approaches approaches approaches perspectives or different
within the area within the area within the area approaches perspectives or
of study of study of study within the area approaches
of study within the area
of study
Be able to Can basically In a limited Can adequately Can soundly Can coherently
deploy identify, adapt way, can Identify, adapt identify, adapt identify, adapt
wireless and use identify, adapt and use and use and use
security appropriate and use appropriate appropriate appropriate
skills, methods appropriate skills, methods skills, methods skills, methods
and procedures skills, methods and procedures and procedures and procedures
to reach basic and procedures to reach to reach to reach well
solutions. to reach limited appropriate supported and supported and
solutions. solutions. appropriate highly
solutions. appropriate
solutions.

Page 14 of 14
Network Security and Cryptography © NCC Education Limited 2021

You might also like