Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

Cyber Security GapFill

Target Level
4-5
Running Total
0
0%
Attempt
1 of 3

You must fill all the gaps before clicking ‘Check Answers!’

 Penetration testingInfectingHackingCracking is any attempt to gain unauthorised access to a computer system, and can target either a computer system itself or the system's users. Attacks on a computer system include the use of malware, interception and brute-force attacks. Attacks on users, also known as   social engineeringpenetration testingsniffingblagging, involve trying to exploit the user rather than the system using techniques such as   DoS attackscrackingpenetration testingphishing and   VPNsshoulder surfinguser access levelsdecryption. Malware is malicious software designed to   cause intentional damage to a computer systemcause accidental damage to a computer systemcorrupt network datasteal data as it is transferred across a network. Anti-malware software is used to   detect and duplicatedetect and rewritedetect and removecompress and archive malware on the system. Interception is the process of   installing malware on a networked computerstealing data as it is transferred across a networkdeleting a user's filesflooding a network with fake requests to slow it down.

The threat of data being intercepted can be reduced by   renaminginjectingcompressingencrypting the data so that if it is intercepted it cannot be read.  Brute-forceSocial engineeringPenetrationPhishing attacks involve repeatedly guessing a password until access is granted to the system,  brute-forcedictionaryencryptionphishing attacks work in a very similar way but use list of commonly used passwords or standard words in a dictionary.

Systems can be made secure by using   penetration testinganti-malware softwareuser access levelsfirewalls to identify security flaws by attempting to hack into the system. To protect against social engineering attacks, organisations can give their employees specific training on the steps to be taken to avoid attacks. Setting up   user access levelspenetration testingstrong passwordsfirewalls can also help to reduce the impact of any attacks that occur, as if a hacker manages to get an employee's password, they will only be able to access part of the system.

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
72%