Networks & Security
OOP & Algorithms
CPU & Architecture
Control Systems
Case Study: Ethical Hacking
100

This term describes a rule that defines how data is transmitted across a network.

What is protocol 

100

What is instantiation in object-oriented programming?

What is creating an object from a class.

100

Name the CPU component that performs arithmetic operations.

What is ALU


100

Define “sensor” in a control system.

A device that detects changes in physical conditions.

100

Define OSINT in the context of penetration testing.

What is collecting publicly available information about a target.

200

Name one reason why data compression is used when sending files over a network.

What is To reduce file size and speed up transmission

200

Define encapsulation using one sentence.

What is bundling data and methods together while restricting direct access.


200

State what the program counter stores.

What is an address of the next instruction.


200

Give an example of a control system that uses open-loop control.

Microwave timer, toaster, irrigation timer.

200

Identify one ethical concern when conducting tests in a hospital environment.

What is risk of disrupting patient care.

300

Identify two features of a packet used in packet switching.

What are Header (addressing), payload (data), checksum, sequence number.

300

A list requires linear search. Give one situation where this is acceptable and one where it is inefficient.

What is a small list (acc), large list with frequent searches (ineff).


300

Describe the fetch–decode–execute cycle in three steps.

What is Fetch instruction → Decode instruction → Execute instruction.


300

Explain the role of feedback in a washing machine.

Sensor checks water level/rotation → processor adjusts operation.

300

Explain why MTPH’s IoT devices increase its attack surface.

What is more connected devices = more exploitable entry points.

400

Explain what a VPN provides to a remote user.

What is Encrypted connection + remote access to a private network.

400

Explain how inheritance reduces code duplication.

What is common attributes/methods are written once in a superclass and reused by subclasses.

400

Cache memory improves performance. Explain why.

What is it stores frequently accessed data close to the CPU for faster access.


400

Describe the relationship between sensor → processor → output transducer using ANY example.

Thermostat: sensor reads temperature → processor decides → heater turns on/off

400

Describe how SQL injection could compromise the EHR database.

What is manipulated input can expose or modify patient records.

500

Compare one advantage and one disadvantage of using WPA2 for wireless security.

What is strong encryption (adv) and vulnerable if password is weak (disadv).

500

A recursive algorithm fails to reach the base case. Describe what will happen and why.

What is infinite recursion leading to a stack overflow.


500

Compare virtual memory and RAM in terms of purpose and performance impact.

What is VM extends memory using disk; RAM stores active data. VM is slower.


500

Evaluate whether a hospital should use a centralized or distributed control system for emergency lighting. Provide one argument for each side.

Centralized: easier to coordinate. Distributed: more fault tolerant.

500

Construct a short threat model: identify an adversary, their goal, and one likely attack vector.

What is (Adversary) a cybercriminal. (Goal) to steal EHR data. Vector: SQL injection/phishing.