This test is run by .
Note that your final mark will not be saved in the system.
Note that your final mark will not be saved in the system.
Network security (1.4) MatchUp
Target Level
4-5
Running Total
0
0%
Attempt
1 of 3
Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.
Firewall
Social engineering
Penetration testing
Interception
Brute-force attack
Hacking
Physical security
Encryption
Malware
Phishing
A software application that causes intentional harm to a computer system
When
a hacker attempts to steal data by sending thousands of emails that look like they come from a
particular bank or online retailer
Targeting users rather than the system itself to gain unauthorised access
Gaining unauthorised access to a computer system
Stealing data as it is passed across a network
Guessing a password multiple times until access is granted
Measures designed to safeguard personnel, equipment and other assets against damage and theft
Can be used to prevent unauthorised data from entering or leaving the network
A method of obscuring data so that it cannot be read if it is intercepted
Attempting to hack a system to identify security weaknesses which can then be reported and fixed