Year 9

There's no place like 127.0.0.1

Year 9

There's no place like 127.0.0.1

warning

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

Lesson details

Key learning points

  1. In this lesson, we will look at the risks that cyberthreats pose to a network, followed by an exploration of some common methods of defending the network against attacks, such as firewalls and anti-malware.

Licence

This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.

Loading...

5 Questions

Q1.
Which of the following two are types of malware?
Anti-virus
Firewall
Correct answer: Trojan
Correct answer: Worm
Q2.
What is the definition of a computer virus?
Malicious software that disguises itself as something else
Malicious software that monitors every keystroke the user makes
Correct answer: Malicious software that self-replicates
Malicious software that uses network bandwidth to deliberately disrupt the speed of the network
Q3.
Which of the following statements best describes a "worm"?
Attaches to files and is designed to take up system resources to slow down the network or computer. Does not self replicate.
Malicious software that monitors every keystroke the user makes
Self replicates and encrypts files to make them inaccessible
Correct answer: Self replicates, does not attach to files, but is designed to take up system resources to slow down the network or computer
Q4.
The Wannacry virus was an example of which type of attack?
Brute force
DDoS
Correct answer: Ransomware
Spyware
Q5.
Which one of the following wouldn't an internet bot perform?
Brute force
DDoS attack
Finding new websites for search engines to index
Correct answer: Shouldering

5 Questions

Q1.
A firewall checks incoming and outgoing network traffic
False
Correct answer: True
Q2.
Which of the following would be the most appropriate software to identify when you system becomes infected with worms, spyware and other forms of computer viruses?
Correct answer: Anti-malware
Anti-virus
CAPTCHA
Firewall
Q3.
Which of the following is a method of verifying that a login attempt has been made by the account owner?
CAPTCHA
Installing a firewall
Setting user permissions
Correct answer: Two-factor authentication
Q4.
Which of the following attempts to check if you are a human user and not a malicious bot.
Biometrics
Correct answer: CAPTCHA
Setting user permissions
Two factor authentication
Q5.
Which of the following would be the correct term for a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?
Correct answer: Botnet
DDoS
Penetration testing
Trojan