
Y11:Revision:1.4.1 Network Security
Quiz by Teran Subasinghe
GCSE (OCR)
Computer Science (9-1), J277
English National Curriculum
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measures 2 skills from
Measures 2 skills from
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
20 questions
Show answers
- Q1What is phishing primarily used for in social engineering attacks?Gaining unauthorized accessDisrupting network servicesInfecting a computer with malwareStealing sensitive information30s1.4.1a
- Q2Which type of cyber attack attempts to overwhelm a service with excessive traffic, making it unavailable?Brute-force attackDenial of service attackSocial engineeringSQL injection30s1.4.1a
- Q3What is a brute-force attack primarily aimed at achieving?Stealing data filesDisrupting network accessCracking passwordsInfecting systems with malware30s1.4.1a
- Q4What is the main purpose of an SQL injection attack?Encrypting files on a serverIntercepting network trafficManipulating a databaseSpreading infectious software30s1.4.1a
- Q5Which form of attack often targets human psychology to gain unauthorized access to information?Social engineeringSQL injectionDenial of serviceBrute-force attack30s1.4.1a
- Q6Which form of malware is specifically designed to replicate itself and spread to other computers?WormTrojan horseRansomwareSpyware30s1.4.1a
- Q7In a data interception and theft attack, what is the main objective of the attacker?Eavesdropping on dataOverloading a serverDestroying filesCorrupting data30s1.4.1a
- Q8What is the primary tactic used in SQL injection attacks?Injecting malicious code into queriesSending deceptive emailsSpamming network requestsGuessing passwords repeatedly30s1.4.1a
- Q9What is the primary objective of malware?Enhancing system securityDisrupting or damaging systemsImproving network speedProviding free software updates30s1.4.1a
- Q10What is a common goal of a denial of service (DoS) attack?Altering database entriesInstalling spywareAccessing confidential dataMaking a network service unavailable30s1.4.1a
- Q11Which of the following is a method to protect against unauthorized data access?Anti-malware softwareUser access levelsEncryptionPenetration testing30s1.4.2a
- Q12What is the primary purpose of using firewalls in network security?To control incoming and outgoing network trafficTo store passwords securelyTo perform malware scansTo encrypt sensitive data30s1.4.2a
- Q13Which security measure involves testing a system or network for vulnerabilities by simulating attacks?Physical securityUser access levelsPenetration testingEncryption30s1.4.2a
- Q14Which of the following methods helps secure data by converting it into an unreadable format?Anti-malware softwareEncryptionPhysical securityFirewalls30s1.4.2a
- Q15What type of software is specifically designed to prevent, detect, and remove malicious software?FirewallsUser access levelsEncryptionAnti-malware software30s1.4.2a