1) Monitors the activities of the user and send back as much information about them as possible (passwords, usernames, websites they visit, purchases they have made). a) Phishing b) Penetration Testing c) Social Engineering d) Spyware 2) The act of acquiring sensitive information about a user (such as their usernames, passwords, bank details etc), through the form of direct electronic communications (emails / phone calls) which impersonate legitimate companies (such as banks) and ask you to give away sensitive information. a) Penetration Testing b) Firewalls c) Phishing d) Denial of Service Attacks 3) Criminals will use trial and error to hack an account by trying thousands of different possible passwords against a particular username. a) Firewalls b) Brute Force Attack c) Social Engineering d) Denial of Service Attacks 4) The act of coordinating thousands of computers to access a website (web server), at the same time, in order to overload the webserver, using up its system resources, thus ‘bringing down’ the website. a) Denial of Service Attacks b) Network Forensics c) Brute Force Attack d) Encryption 5) The act of manipulating people and is often used by criminals to force people to make mistakes which can compromise a network’s security. a) Social Engineering b) Brute Force Attack c) Acceptable Use Policies d) Denial of Service Attacks 6) Where a company will invite / employ experts to try to simulate a range of network attacks such as Denial of Service attacks (DoS), SQL injections and Brute Force Attacks, in an attempt to discover any weaknesses in the system. a) Firewalls b) Spyware c) Penetration Testing d) Phishing 7) Software which continually monitors network traffic a) Network Forensics b) Penetration Testing c) Brute Force Attack d) Phishing 8) Monitors the data which flows through the computer’s network ports. It will block unauthorised data packets, thus protecting the system from hacking. a) Phishing b) Firewalls c) Brute Force Attack d) Spyware 9) A set of rules and procedures that network users must follow. For example, ‘use complex passwords’, ‘have different levels of user access’ and ‘lock computers if user leaves their desk’. a) Encryption b) Acceptable Use Policies c) Phishing d) Brute Force Attack 10) Encryption is where data is scrambled before being sent across a network so that it is unreadable if intercepted. a) Penetration Testing b) Encryption c) Acceptable Use Policies d) Denial of Service Attacks

System Security Maze Chase

Leaderboard

Visual style

Options

Switch template

Continue editing: ?