Where is the danger?
Lesson details
Key learning points
- In this lesson, we will begin to understand how companies can and do test their own vulnerability to cybercrime.
Licence
This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.
Loading...
3 Questions
Q1.
Which of the following most accurately defines an acceptable use policy?
It allows an organisation to resume business quickly during or after a disaster, which could include a cyberattack.
It is an archiving policy that determines how long data can be kept for.
It usually contains both an archiving policy and a network use policy.
Q2.
Tick all the three correct firewall-related sentences below.
A firewall can only be software.
Q3.
Firewalls stop viruses from entering the network
True
3 Questions
Q1.
Which of the following definitions describes physical security?
A plan to review and test code in an attempt to discover vulnerabilities in programs before cybercriminals find them
Allowing an organisation to resume business quickly during or after a disaster, which could include a cyberattack
Monitoring and analysis of computer network traffic for information gathering and intrusion detection
Q2.
"Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position A?
hacker
insecure
insider
Q3.
"Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position B?
hacker
insider
network