Year 9
These resources will be removed by end of Summer Term 2025.
Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.
Lesson details
Key learning points
- In this lesson, we will look at the risks that cyberthreats pose to a network, followed by an exploration of some common methods of defending the network against attacks, such as firewalls and anti-malware.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
Loading...
5 Questions
Q1.
Which of the following two are types of malware?
Anti-virus
Firewall
Q2.
What is the definition of a computer virus?
Malicious software that disguises itself as something else
Malicious software that monitors every keystroke the user makes
Malicious software that uses network bandwidth to deliberately disrupt the speed of the network
Q3.
Which of the following statements best describes a "worm"?
Attaches to files and is designed to take up system resources to slow down the network or computer. Does not self replicate.
Malicious software that monitors every keystroke the user makes
Self replicates and encrypts files to make them inaccessible
Q4.
The Wannacry virus was an example of which type of attack?
Brute force
DDoS
Spyware
Q5.
Which one of the following wouldn't an internet bot perform?
Brute force
DDoS attack
Finding new websites for search engines to index
5 Questions
Q1.
A firewall checks incoming and outgoing network traffic
False
Q2.
Which of the following would be the most appropriate software to identify when you system becomes infected with worms, spyware and other forms of computer viruses?
Anti-virus
CAPTCHA
Firewall
Q3.
Which of the following is a method of verifying that a login attempt has been made by the account owner?
CAPTCHA
Installing a firewall
Setting user permissions
Q4.
Which of the following attempts to check if you are a human user and not a malicious bot.
Biometrics
Setting user permissions
Two factor authentication
Q5.
Which of the following would be the correct term for a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?
DDoS
Penetration testing
Trojan