A software development company wants to protect their computer systems and data from unauthorised access.
Identify two methods of physical security that the company could use to protect their computer systems.
Was this exam question helpful?
Exam code: J277
A software development company wants to protect their computer systems and data from unauthorised access.
Identify two methods of physical security that the company could use to protect their computer systems.
How did you do?
Was this exam question helpful?
State the definition of the term 'social engineering'.
How did you do?
Was this exam question helpful?
Identify the threat penetration testing can be used to help prevent.
How did you do?
Was this exam question helpful?
Define the term 'Malware'
How did you do?
Was this exam question helpful?
State the primary goal of a phishing attack
How did you do?
Was this exam question helpful?
Identify the type of software targeted by an SQL Injection
How did you do?
Was this exam question helpful?
State the purpose of penetration testing
How did you do?
Was this exam question helpful?
Identify two types of permissions managed by user access levels
How did you do?
Was this exam question helpful?
Define the term 'Ciphertext
How did you do?
Was this exam question helpful?
Identify the device or software used by a hacker to collect data packets as they travel across a network.
How did you do?
Was this exam question helpful?
Define the method used in a brute-force attack to gain access to a system
How did you do?
Was this exam question helpful?
State the primary purpose of a Denial of Service (DoS) attack
How did you do?
Was this exam question helpful?
Identify and describe two software-based security methods that the company can use to protect their computer systems and data.
How did you do?
Was this exam question helpful?
A hospital stores patients’ details on its computer network.
The hospital is concerned about the security of its patients’ details.
Staff already use strong passwords to protect systems.
Explain, with reference to system security, three other ways that the hospital could protect the network system.
How did you do?
Was this exam question helpful?
A hospital stores patients’ details on its computer network.
The hospital is concerned about the security of its patients’ details.
Staff already use strong passwords to protect systems.
Identify three errors that hospital staff could make that may endanger the security of the network.
Outline a procedure that could be put in place to prevent each error.
How did you do?
Was this exam question helpful?
A university want to protect their data against threats when connected to the Internet.
Describe the threat malware can pose to the university’s network and give a prevention method that the university can use.
How did you do?
Describe the threat a brute force attack can pose to the university’s network and give a prevention method that the university can use.
How did you do?
Was this exam question helpful?
Data in computer systems is valuable and at risk of loss, damage or being stolen.
The table has four potential threats to data.
Write one prevention method for each threat below.
Each prevention method must be different.
Unauthorised access to a computer
Virus
Phishing
Data interception
How did you do?
Name two other threats to the data in a computer system and give a method of preventing each.
How did you do?
Was this exam question helpful?
Hamish stores confidential documents on his laptop.
Hamish needs his computer to be secure from unauthorised access when connected to a network.
Describe the problems that can arise from unauthorised access to his laptop and confidential documents.
How did you do?
Was this exam question helpful?
Describe two ways Hamish can help prevent unauthorised access to his laptop.
How did you do?
Was this exam question helpful?
Sarah works as a freelance graphic designer and stores client projects on her desktop computer.
Sarah's computer is connected to the internet and she is concerned about cyber threats that could compromise her work.
Describe the security risks that could affect Sarah's computer and client projects when connected to the internet.
How did you do?
Was this exam question helpful?
Describe how a brute-force attack is carried out
How did you do?
Was this exam question helpful?
Explain the impact of a DoS attack on a company's web server
How did you do?
Was this exam question helpful?
Describe how a firewall monitors network traffic
How did you do?
Was this exam question helpful?
A house owner is concerned about potential threats to the network from being connected to the Internet.
Describe three possible threats to the computers connected to the network and give one way each threat can be reduced or prevented.
How did you do?
Was this exam question helpful?
Analyse the potential consequences of a successful Distributed Denial of Service (DDoS) attack on a major e-commerce website and explain how this type of attack differs from a standard Denial of Service attack (DoS).
How did you do?
Was this exam question helpful?
Evaluate the effectiveness of penetration testing as a method for preventing network attacks. Discuss potential limitations and explain how organisations can maximise their benefits
How did you do?
Was this exam question helpful?
Compare the spreading mechanisms of a computer virus and a worm
How did you do?
Was this exam question helpful?
Evaluate why the "human element" is often the weakest link in network security
How did you do?
Was this exam question helpful?
Justify the use of input validation as a primary defence against SQL Injection
How did you do?
Was this exam question helpful?
Explain why anti-malware software must be regularly updated
How did you do?
Was this exam question helpful?
Evaluate the use of biometrics over traditional keys for a server room
How did you do?
Was this exam question helpful?
Analyse why data transmitted over a wireless connection is more vulnerable to interception than data on a wired connection
How did you do?
Was this exam question helpful?