Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

Network security (1.4) GapFill

Target Level
4-5
Running Total
0
0%
Attempt
1 of 3

You must fill all the gaps before clicking ‘Check Answers!’

 BlaggingCrackingPhishingHacking is any attempt to gain unauthorised access to a computer system, and can target either a computer system itself or the system's users. Attacks on a computer system include the use of malware, interception and brute-force attacks. Attacks on users, also known as  encryptionspoofingsocial engineeringpenetration testing, involve trying to exploit the user rather than the system using techniques such as  phishingSQL injectioncrackingencryption and  hackingdecryptionsniffingshoulder surfing. Malware is malicious software designed to  to compress dataallow unauthorised users to access a systemcause intentional damage to a computer systemcause accidental damage to a computer system. Anti-malware software is used to  archive and removedetect and duplicatedetect and removedetect and return malware on the system. Interception is the process of  encrypting a user's data so that they can no longer use itflooding a network with fake requests to slow it downstealing data as it is transferred across a networkinserting code into a query field to bypass security measures.

The threat of data being intercepted can be reduced by  compressingduplicatingphishingencrypting the data so that if it is intercepted it cannot be read.  Brute-forcePenetrationInjectionDenial of service attacks involve repeatedly guessing a password until access is granted to the system, and   sniffingcompressionbrute-forceinjection attacks involve entering SQL or JavaScript code into a web form.

Systems can be made secure by using  encryptionfirewallsstrong passwordspenetration testing to identify security flaws by attempting to hack into the system. To protect against social engineering attacks, organisations can give their employees specific training on the steps to be taken to avoid attacks. Setting up  firewallsuser access levelsencryptionanti-malware software can also help to reduce the impact of any attacks that occur, as if a hacker manages to get an employee's password, they will only be able to access part of the system.

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
72%