Identifying & Preventing Threats to Computer Systems & Networks (OCR GCSE Computer Science): Exam Questions

Exam code: J277

2 hours32 questions
1
2 marks

A software development company wants to protect their computer systems and data from unauthorised access.

Identify two methods of physical security that the company could use to protect their computer systems.

2
2 marks

State the definition of the term 'social engineering'.

3
1 mark

Identify the threat penetration testing can be used to help prevent.

4
1 mark

Define the term 'Malware'

5
1 mark

State the primary goal of a phishing attack

6
1 mark

Identify the type of software targeted by an SQL Injection

7
1 mark

State the purpose of penetration testing

8
2 marks

Identify two types of permissions managed by user access levels

9
1 mark

Define the term 'Ciphertext

10
1 mark

Identify the device or software used by a hacker to collect data packets as they travel across a network.

11
1 mark

Define the method used in a brute-force attack to gain access to a system

12
1 mark

State the primary purpose of a Denial of Service (DoS) attack

1
6 marks

Identify and describe two software-based security methods that the company can use to protect their computer systems and data.

2
6 marks

A hospital stores patients’ details on its computer network.

The hospital is concerned about the security of its patients’ details.

Staff already use strong passwords to protect systems.

Explain, with reference to system security, three other ways that the hospital could protect the network system.

3
6 marks

A hospital stores patients’ details on its computer network.

The hospital is concerned about the security of its patients’ details.

Staff already use strong passwords to protect systems.

Identify three errors that hospital staff could make that may endanger the security of the network.

Outline a procedure that could be put in place to prevent each error.

4a
3 marks

A university want to protect their data against threats when connected to the Internet.

Describe the threat malware can pose to the university’s network and give a prevention method that the university can use.

4b
3 marks

Describe the threat a brute force attack can pose to the university’s network and give a prevention method that the university can use.

5a
4 marks

Data in computer systems is valuable and at risk of loss, damage or being stolen.

The table has four potential threats to data.

Write one prevention method for each threat below.

Each prevention method must be different.

  • Unauthorised access to a computer

  • Virus

  • Phishing

  • Data interception

5b
4 marks

Name two other threats to the data in a computer system and give a method of preventing each.

6
3 marks

Hamish stores confidential documents on his laptop.

Hamish needs his computer to be secure from unauthorised access when connected to a network.

Describe the problems that can arise from unauthorised access to his laptop and confidential documents.

7
4 marks

Describe two ways Hamish can help prevent unauthorised access to his laptop.

8
3 marks

Sarah works as a freelance graphic designer and stores client projects on her desktop computer.

Sarah's computer is connected to the internet and she is concerned about cyber threats that could compromise her work.

Describe the security risks that could affect Sarah's computer and client projects when connected to the internet.

9
2 marks

Describe how a brute-force attack is carried out

10
2 marks

Explain the impact of a DoS attack on a company's web server

11
2 marks

Describe how a firewall monitors network traffic

1
9 marks

A house owner is concerned about potential threats to the network from being connected to the Internet.

Describe three possible threats to the computers connected to the network and give one way each threat can be reduced or prevented.

2
5 marks

Analyse the potential consequences of a successful Distributed Denial of Service (DDoS) attack on a major e-commerce website and explain how this type of attack differs from a standard Denial of Service attack (DoS).

3
8 marks

Evaluate the effectiveness of penetration testing as a method for preventing network attacks. Discuss potential limitations and explain how organisations can maximise their benefits

4
4 marks

Compare the spreading mechanisms of a computer virus and a worm

5
4 marks

Evaluate why the "human element" is often the weakest link in network security

6
3 marks

Justify the use of input validation as a primary defence against SQL Injection

7
2 marks

Explain why anti-malware software must be regularly updated

8
4 marks

Evaluate the use of biometrics over traditional keys for a server room

9
3 marks

Analyse why data transmitted over a wireless connection is more vulnerable to interception than data on a wired connection