Search Header Logo
A-Level Presentation - 23 Network security

A-Level Presentation - 23 Network security

Assessment

Presentation

Computers

12th Grade

Practice Problem

Hard

Created by

Organization admin

FREE Resource

62 Slides • 27 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

Open Ended

Describe a method you would use to identify vulnerabilities in a computer network.

8

Multiple Choice

Why is network security important in today's digital world?

1

To keep computers running faster

2

To prevent unauthorized access and protect sensitive data

3

To make internet browsing quicker

4

To reduce electricity consumption

9

Multiple Choice

According to Newton Lee, what should individuals ask themselves regarding cybersecurity?

1

What cybersecurity can do for them

2

What they can do for cybersecurity

3

How to avoid cybersecurity responsibilities

4

How to become a hacker

10

Open Ended

Why is computer security important, and what are some motives behind hacking?

11

Multiple Select

Which of the following are responsibilities of network managers?

1

Preventing network threats

2

Creating malware

3

Ignoring vulnerabilities

4

Detecting and preventing vulnerabilities

12

media

13

Multiple Select

Which of the following are threats to networks?

1

Malware

2

Phishing

3

Data interception

4

Firewall

14

media

15

Fill in the Blanks

Type answer...

16

media

17

media

18

Multiple Choice

Which of the following types of malware does NOT self-replicate?

1

Virus

2

Worms

3

Trojans

4

Macro Virus

19

media

20

Multiple Select

Which of the following statements are true about macro viruses?

1

They attach to word processing or spreadsheet data files.

2

They infect the template when the data file is opened.

3

All files created using an infected template are also infected.

4

Macro viruses are more harmful than other types of viruses.

21

Open Ended

Explain how viruses and worms differ in their replication process.

22

media

23

Fill in the Blanks

Type answer...

24

media

25

Open Ended

Describe two ways in which trojans can compromise a computer system.

26

media

27

Multiple Choice

Which of the following is NOT a recommended preventive measure against malware?

1

Install anti-virus software

2

Update operating system and browser

3

Download software from unknown sources

4

Back-up system in off-site mode

28

media

29

Multiple Choice

Which of the following is NOT a preventive measure against malware?

1

Opening email attachments from unknown senders

2

Using email services that implement scans

3

Treating mobile phones with care

4

Following security guidelines for handheld devices

30

media

31

media

32

Open Ended

Explain how phishing attacks can trick users into revealing personal information. Use examples from the slides.

33

media

34

Multiple Select

Which of the following are signs that an email might be a phishing attempt?

1

Strange sender email address

2

Request for private information

3

Link to a harmful website

4

Email sent from a known contact

35

media

36

Open Ended

Why are not all phishing emails easily identifiable?

37

Fill in the Blanks

Type answer...

38

media

39

Fill in the Blanks

Type answer...

40

media

41

Multiple Choice

Which type of attack involves infecting innocent computers with malware to flood websites and make them unavailable for users?

1

Phishing attack

2

Denial of Service (DoS) attack

3

Man-in-the-middle attack

4

SQL injection

42

media

43

Open Ended

Explain how data interception and theft can occur in a network, and describe the role of hijacking software in this process.

44

media

45

Fill in the Blanks

Type answer...

46

media

47

Multiple Select

Which of the following statements about data interception and theft are correct?

1

Packet sniffing software can be used to examine data packets at a certain IP address.

2

It is never legitimate to use packet sniffing software.

3

Wireless LAN data interception can be done using special Wi-Fi adapters.

4

Organisations use packet sniffing software to detect intrusion attempts.

48

media

49

Open Ended

Why is it important to use WPA encryption with a key of at least 128 bits for wireless networks?

50

media

51

Multiple Choice

Which SQL statement can be used by an attacker to retrieve all data from a table by exploiting SQL injection?

1

SELECT * FROM table_users WHERE user_id= 16 OR 1=1

2

SELECT * FROM table_users WHERE user_id= 16 AND 1=0

3

SELECT * FROM table_users WHERE user_id= 16

4

SELECT * FROM table_users WHERE user_id= 16 OR 1=0

52

media

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

media

62

media

63

media

64

media

65

media

66

media

67

media

68

media

69

media

70

media

71

media

72

media

73

media

74

media

75

media

76

media

77

media

78

media

79

media

80

media

81

media

82

media

83

media

84

media

85

media

86

media

87

media

88

Multiple Choice

Which of the following is NOT a typical objective when learning about network security?

1

Understanding different threats to a computer or network

2

Identifying vulnerabilities in your network

3

Learning how to prevent threats and vulnerabilities

4

Designing new computer hardware

89

Open Ended

Reflecting on today's lesson about network security, what is one strategy you learned to prevent threats and vulnerabilities in a network?

media

Show answer

Auto Play

Slide 1 / 89

SLIDE