WJEC GCSE Digital Technology - Topic 5 MC
5 Questions
5 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of prevention strategy is the local hospital using by employing an ethical hacker?

  • Intrusion detection system
  • Antivirus software
  • Penetration testing (correct)
  • Firewall
  • What are three errors that the hospital's staff could make that may endanger the security of the network?

  • Using public Wi-Fi, installing unauthorized software, and sharing login credentials
  • Using weak passwords, clicking on suspicious links, and leaving devices unlocked (correct)
  • Leaving devices unattended, using outdated software, and ignoring security alerts
  • Using personal devices for work, sharing sensitive information, and disabling firewalls
  • What is the purpose of identifying and/or preventing a denial of service attack?

  • To gain unauthorized access to a network
  • To spread malware to other systems
  • To overload a network and make it unavailable to users (correct)
  • To steal sensitive data
  • What is the difference between an active and passive digital footprint?

    <p>Active footprints are intentionally created by users, while passive footprints are created without the user's knowledge</p> Signup and view all the answers

    What is the purpose of monitoring digital footprints in the context of businesses?

    <p>To identify potential security threats</p> Signup and view all the answers

    Study Notes

    Prevention Strategy

    • The local hospital is employing an ethical hacker as a prevention strategy to identify and mitigate potential security risks and vulnerabilities in their network.

    Common Errors

    • Hospital staff may make the following errors that can endanger the security of the network:
      • Using weak passwords or sharing them with others
      • Clicking on suspicious links or opening unverified emails
      • Not keeping software and systems up to date with the latest security patches

    Denial of Service Attack

    • The purpose of identifying and/or preventing a denial of service (DoS) attack is to ensure that the network remains accessible and functional, preventing attackers from overwhelming the system with traffic in order to make it unavailable to users.

    Digital Footprints

    • An active digital footprint refers to the intentional online presence and data that an individual or organization creates, such as social media profiles or websites.
    • A passive digital footprint refers to the unintentional online presence and data that an individual or organization creates, such as search history or browser cookies.

    Monitoring Digital Footprints

    • The purpose of monitoring digital footprints in the context of businesses is to identify and manage online risks, maintain a positive reputation, and protect against cyber threats and data breaches.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on identifying phishing emails with this WJEC GCSE Digital Technology quiz. Using an email example, you'll need to identify the six indicators that suggest it could be a phishing email. This quiz is perfect for those studying digital technology and cybersecurity and will help you develop your skills in identifying threats to data.

    More Like This

    Pentesting: Security Assessment
    10 questions
    Ethical Hacking Overview Quiz
    14 questions
    Ethical Hacking Principles
    74 questions
    Use Quizgecko on...
    Browser
    Browser