Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

D2 Protecting data GapFill

Target Level
C
Running Total
0
0%
Attempt
1 of 3

You must fill all the gaps before clicking ‘Check Answers!’

To securely operate online, computers need to have a security package installed. Usually, this is built in to the  appoffice suitememoryoperating system, but some people also install a third party package as a replacement. These packages should include at least the following two features.

  1.  Anti-virusThreatMalwareFirewall software scans and removes files that are infected by a virus or other malware. The software can scan through every file on your computer, usually on demand or a fixed schedule, or automatically detects threats  in hourly slotsin real timeduring working hoursoutside of active hours. The program compares each file against a threat database – we call these  signaturessuspectsdatapointspens. But because hundreds of new threats are created each day, there is a delay before the characteristics of the new malware are added to the database. Therefore the program must detect  suspicious activityRAMfilesdata use occurring on the system, and the files are sent to a safe storage area called  scratch diskFreezequarantinetime-out, and samples of the malware may be sent to the program’s creator for analysis.
  2.  FirewallsDatabasesMalwareRansomware can be either software-based, or  hardwareofficecloudtraffic-based. Both operate in the same way, by blocking traffic to certain  shipsboatsportsharbours in order to stop hackers from entering a system – e.g. by restricting those used for remote desktop services, and the device can sit at the bridge between the internal network and Internet. Business-grade systems can be set up (  configuredattackednetworkedkeyed) to block traffic from specific IP addresses or geographical locations.

Packages may also include other tools or utilities (e.g. temporary file removal).

In order to keep our data safe from hackers, we use a process called  decryptionTuringBletchleyencryption and use it when storing and sending data. The process means that the contents of the file cannot be read if the file is stolen from a server or storage device, or intercepted as the data travels across a network or the Internet. The unencrypted text is called  plainhyperscrambleddummytext, but after encryption it is called  primecipherdummyhypertext. The most powerful type is called  fullhalfasynchronousasymmetric encryption which uses two different  padskeyslocksdatasets, a public and private key which are made up two (public) or one (private) prime number. The larger the numbers, the longer the decryption would take if a hacker tried to decrypt the data by trying to guess those numbers – to the point that it’s virtually impossible to crack it.

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
72%