CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

quiz-placeholder

Similar activities

A1 Threat Types

A1 Threat Types

12th Grade

15 Qs

Target

Target

University

16 Qs

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

cybersecurity_1

cybersecurity_1

12th Grade

14 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Initial Assessment - CompTIA IT fundamentals

Initial Assessment - CompTIA IT fundamentals

University

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Hackers?

Hackers?

University

20 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

Assessment

Quiz

Computers, Professional Development

12th Grade - Professional Development

Hard

Created by

Justin Welham

Used 102+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network Security - Issues - What is Malware?

Malware is short for Maladjusted Hardware.

Malware is the alternative to software.

Malware is a a play on words meaning Microsoft I aware.

Malware is software that is designed to cause damage to a computer system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network Security - Issues - What is hacking?

Hacking is the process of installing malicious software on a computer system.

Hacking is the response to having a terribly sore throat.

Hacking is unauthorised access to a computer or computer network.

Hacking is a positive test for a networked computer system.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network Security - Issues - What is Spyware?

Spyware is malicious software that is installed on a computer or computer network to record what a user is doing.

Spyware is a colloquial term for the software used to install 'S'uper 'Py'thon soft'ware'.

Spyware is used to see what a user is doing using their cameras.

Spyware is a term for technical officers of the FBI.

Keyloggers record key presses through which they gain user information.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Network Security - Issues - How does a virus work?

Email viruses arrive attached to email and are triggered by opening the documents.

Viruses are designed to cause damage to data or cause problems on a computer system. Worms spread automatically through connected computers therefore are a real concern for networks.

Trojan Horses are disguised as legitimate software, if run, causing damage to the computer system.

Parasitic viruses attach themselves to other files on a computer and are triggered by a computer event; certain date or time for example.

Macro viruses attach themselves within macro enabled software.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Network Security - Issues - What is a Denial of Service Attack?

Distributed denial of service attacks (DDoS) are an upgrade to Dos attacks and utilise many network connections to disable a single computer.

A DoS attack is designed to send more requests to a server than it can cope with, easy to launch and difficult to track.

A Denial of Service attack is an example of the 'Just Say No' protocol.

Most websites only require 50 requests per second to prevent them form working properly. To exceed 50RPS is the target rate of a DoS attack.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Network Security - Security Methods - How can access rights be used to secure a computer network?

Giving verbal authority to a user to use certain areas of a network, morally users are obliged to only access areas that they have rights to.

Access rights are created as soon as you purchase a new computer. They are the same on all networks.

By implementing access rights, network access and access to applications can be restricted to certain users. This is done by using a users login details to allocate them access rights.

Access rights are chosen by the user and no other user can use them.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Network Security - Security methods - Other than passwords, how else can access rights be restricted to a computer network?

Biometrics could be used to identify a user.

Using a doorbell will prevent intruders from entering unnoticed.

Accounts can be suspended on certain days or for certain times.

Physical swipecards could be used.

Two factor authentication could be used - This may require not only a password but a second way of authenticating a users identification; mobile number, authentication app for example.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?