Free Printable Worksheets
Settings
Worksheets
iGCSE Computer Science: Network SecurityTotal questions: 20Worksheet time: 12minsInstructor name: Mrs. Mary Prisca
Name
Class
Date
1.

Network security protects data from threats to its ... (select all correct answers)

a)

Integrity

b)

Confidentiality

c)

Relevance

d)

Availability

2.

Select all the valid means of protecting data confidentiality on a network ...

a)

Varying levels of access rights for different users

b)

Encrypting sensitive data

c)

Stopping deliberate or accidental misuse of data by authorised users

d)

Backing up sensitive data

3.

Select all the characteristics of data stored on a network that make it important in terms of network security...

a)

Private and confidential - inappropriate for some people to see it

b)

Volume - large amount of data needed to store

c)

Mission critical - required for running the business or organisation

d)

Financially valuable - could be used for profit by others

4.

Select all the security disadvantages of Cloud data storage ...

a)

Need to have reliable high-speed Internet connection to access data

b)

Distributed nature of data storage means it is safe from localised problems such as fire or flooding

c)

Assumption of trust placed in staff you have never met

d)

Reliance on 3rd party provider for all security

e)

Data is available 24/7365

5.

A type of network attack that tries to prevent legitimate users from accessing a service?

a)

Worm

b)

Trojan

c)

Virus

d)

Denial of Service (DoS)

6.

Select all the valid non-physical means of securing a network ...

a)

Setting access control rights for users

b)

Locking the server room door

c)

Authenticating username & password

d)

Backing up file server data regularly

e)

Installing and customizing firewall

7.

Which of these are physical security measures?

a)

Two-step authentication using mobile phone

b)

Turning monitor screen away from window

c)

Locking server room door

d)

Locking monitor screen

e)

Fingerprint scanner to unlock device

8.

What is the BEST word to complete this sentence?


Hacking is the attempt to gain _______________ access to a computer system and the data is contains.

a)

unauthorised

b)

unregulated

c)

priviliged

d)

backdoor

9.

Choose all the possible types of cyberattack ...

a)
b)
c)
d)
10.

An attack on a computer system that exploits how people will behave and respond in certain situations is called ________ engineering.

a)

Software

b)

Social

c)

Cyber

d)

Auto

11.

Choose all the examples of technical weaknesses in a network that could be exploited in a cyberattack ...

a)

Unpatched software

b)

Unlocked server room

c)

Allowing USB devices

d)

Eavesdropping

12.

What type of cyberattack is this?

a)

Shoulder surfing

b)

Exploiting technical weakness

c)

Phishing

d)

Pharming

13.

What type of cyberattack is this?

a)

Denial of Service

b)

Shoulder surfing

c)

Phishing

d)

Pharming

14.

What type of cyberattack is this?

a)

Exploiting technical weakness

b)

Shoulder surfing

c)

Phishing

d)

Pharming

15.

Choose the BEST word to complete the sentence.


Code _________ is when a computer program has been written in such a way that it creates a potential security issue that might be taken advantage of by hackers.

a)

volatility

b)

vulnerability

c)

violation

d)

validation

16.

Testing each block of code as it is completed to ensure the code works as expected?

a)

Whitehat testing

b)

Penetration testing

c)

Modular testing

d)

Blackbox testing

17.

Deliberate authorised targetting of an organisation's network defences to detect flaws and weaknesses in its systems?

a)

Blackbox testing

b)

Pen(etration) testing

c)

Whitehat testing

d)

Modular testing

18.

What is a network user policy is likely to contain? (choose all valid answers)

a)

what is acceptable/unacceptable use

b)

procedures for reporting faults and errors

c)

a list of all users and access rights

d)

consequences for unacceptable use

e)

advice on good working practices

19.

___________ software is software that hasn't had the latest security updates applied to it, making it vulnerable to cyber attack.

a)

Unpatched

b)

Bespoke

c)

Beta

d)

Legacy

20.

Software that scans systems both internally and externally for pre-known security vulnerabilities and produces security reports?

a)

Cyber protection

b)

Commercial analysis

c)

Firewall

d)

Anti-virus