In this lesson, we will look at the risks that cyberthreats pose to a network, followed by an exploration of some common methods of defending the network against attacks, such as firewalls and anti-malware.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
A firewall checks incoming and outgoing network traffic
False
Correct answer: True
True
Q2.
Which of the following would be the most appropriate software to identify when you system becomes infected with worms, spyware and other forms of computer viruses?
Correct answer: Anti-malware
Anti-malware
Anti-virus
CAPTCHA
Firewall
Q3.
Which of the following is a method of verifying that a login attempt has been made by the account owner?
CAPTCHA
Installing a firewall
Setting user permissions
Correct answer: Two-factor authentication
Two-factor authentication
Q4.
Which of the following attempts to check if you are a human user and not a malicious bot.
Biometrics
Correct answer: CAPTCHA
CAPTCHA
Setting user permissions
Two factor authentication
Q5.
Which of the following would be the correct term for a large collection of malware-infected devices (zombies) used to perform an attack or to exploit known weaknesses in a system?