Search Header Logo
year 11

year 11

Assessment

Presentation

Computers

10th Grade

Practice Problem

Medium

Created by

Ehtesham Malik

Used 1+ times

FREE Resource

48 Slides • 27 Questions

1

Network Threat and Security
Year 11

​Do Now

media

2

Open Ended

Question image

How can you get in or out of a Castle?

3

Open Ended

Why is network security important in today's world of internet and web technologies?

4

media

5

media

6

Fill in the Blank

A ___ is a system that filters network traffic to protect against unauthorized flows of data in or out of the network.

7

media

8

Multiple Select

Which of the following are methods used to protect networks?

1

Firewall

2

User privileges

3

Ransomware

4

Social engineering

9

media

10

media

11

Multiple Choice

What is social engineering in the context of network security?

1

A method where hackers use tricks to get people to share secrets like their passwords.

2

A type of malware that encrypts files and demands payment.

3

A system that filters network traffic.

4

A setting that controls user actions on a network.

12

media

13

Open Ended

Describe two reasons why it is important to be careful with passwords and have strong protections to stop hackers.

14

Open Ended

Explain how a cyberattack can impact a business and its customers, using the example of the UK retailer in 2025.

15

Multiple Choice

Which of the following best describes why network security is important?

1

To ensure only authorized users can access sensitive data and prevent misuse, loss, or theft of information.

2

To make networks faster and more efficient.

3

To allow more devices to connect to the network.

4

To reduce the cost of network hardware.

16

media

17

Multiple Choice

Which of the following is NOT a reason why good security is important for networks?

1

To protect people from fraud and identity theft

2

To protect organisations from reputational damage and legal consequences

3

To make devices more expensive

4

To protect devices from being hacked or damaged

18

media

19

Multiple Choice

Based on the information in slides 1 and 2, what are some common risks that network security aims to prevent?

1

Fraud, phishing, identity theft, and data leaks

2

Hardware failure and slow internet

3

Increased network speed

4

Better user experience

20

media

21

media

22

Open Ended

Explain why organisations in the UK must follow the Data Protection Act 2018 and what consequences they might face if they do not comply.

23

media

24

Fill in the Blank

Networks are extremely vulnerable to attack because they can ___ many locations and have many users.

25

media

26

Open Ended

Describe two ways in which weak devices can compromise the security of a network. Use examples from the slides to support your answer.

27

Multiple Select

Which of the following are examples of weak points that can allow attackers into a network?

1

An employee’s laptop with no password

2

An unprotected USB stick

3

A student accidentally clicking a phishing link

4

A secure server with strong encryption

28

media

29

Multiple Choice

Why did the ransomware attack in late 2023 force hospitals to postpone appointments and rely on manual record keeping?

1

Because attackers exploited weak security on staff devices, disrupting digital systems.

2

Because hospitals had too many patients to handle.

3

Because there was a shortage of doctors.

4

Because the internet was down in the entire country.

30

media

31

Open Ended

Explain how network policies can help prevent incidents like the ransomware attack described in the first slide.

32

media

33

Multiple Choice

Which of the following are examples of network policies?

1

Acceptable use policies, archiving policies, backup policies, disaster recovery policies

2

Password sharing, social media posting, online shopping, file deletion

3

Network speed, device color, office location, employee age

4

Lunch breaks, holiday schedules, dress code, parking rules

34

media

35

Fill in the Blank

An acceptable use policy (AUP) is a set of rules that users must ___ to.

36

media

37

Open Ended

List two likely rules that might be included in an acceptable use policy (AUP).

38

media

39

Fill in the Blank

Archiving policies may take account of guidelines such as ___ that specify how to treat personal data.

40

media

41

Multiple Choice

Which of the following is NOT typically included in a backup policy?

1

The frequency of backups and who is responsible for them

2

The type and location of the backup

3

Protocols for naming and dating backups

4

A ban on online gambling or social media

42

media

43

Open Ended

List two types of disasters that a disaster recovery policy should address.

44

Multiple Choice

What is the main purpose of a disaster recovery policy in an organization?

1

To prevent all disasters from occurring

2

To allow an organization to resume business quickly after or during a disaster

3

To ensure backups are named and dated correctly

4

To stop employees from using social media

45

media

46

Multiple Choice

Which of the following rules would most likely be found in an acceptable use policy (AUP) for a network?

1

instructions for how often to back up important data

2

a ban on online gambling or social media

3

instructions for how to reinstall software from a backup disk

47

media

48

media

49

Fill in the Blank

Protecting data on networks is very important because networks carry sensitive information like personal details, payment information, and school records. If this data isn't protected, it can be ___, lost, or misused.

50

media

51

Open Ended

Describe two different types of harm that can happen if network data is not protected.

52

media

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

media

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

Open Ended

What is one key concept you learned about network security in this lesson?

Network Threat and Security
Year 11

​Do Now

media

Show answer

Auto Play

Slide 1 / 75

SLIDE