Year 10

Where is the danger?

Year 10

Where is the danger?

warning

These resources will be removed by end of Summer Term 2025.

Switch to our new teaching resources now - designed by teachers and leading subject experts, and tested in classrooms.

Lesson details

Key learning points

  1. In this lesson, we will begin to understand how companies can and do test their own vulnerability to cybercrime.

Licence

This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.

Loading...

3 Questions

Q1.
Which of the following most accurately defines an acceptable use policy?
It allows an organisation to resume business quickly during or after a disaster, which could include a cyberattack.
It is an archiving policy that determines how long data can be kept for.
Correct answer: It states how a network may be used including what is and what is not acceptable, e.g. online shopping or gambling.
It usually contains both an archiving policy and a network use policy.
Q2.
Tick all the three correct firewall-related sentences below.
Correct answer: A firewall blocks unexpected connections coming into the network; most operating systems include a firewall.
A firewall can only be software.
Correct answer: A firewall sits between a local network or computer and another network, controlling incoming and outgoing network traffic.
Correct answer: A firewall’s rules determine which traffic is allowed through and which isn’t.
Q3.
Firewalls stop viruses from entering the network
Correct answer: False
True

3 Questions

Q1.
Which of the following definitions describes physical security?
A plan to review and test code in an attempt to discover vulnerabilities in programs before cybercriminals find them
Allowing an organisation to resume business quickly during or after a disaster, which could include a cyberattack
Monitoring and analysis of computer network traffic for information gathering and intrusion detection
Correct answer: Security measures that are designed to deny unauthorised access to facilities, equipment, and resources and to protect personnel and property from damage or harm, e.g. the use of passcards and biometric checks (fingerprints, retinal scans)
Q2.
"Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position A?
hacker
insecure
insider
Correct answer: network
Q3.
"Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position B?
hacker
Correct answer: insecure
insider
network