AO3 Spec Audit: Identify why Encryption is effective but state its limitation regarding interception.
Critical Spec Check
Makes data meaningless / unintelligible [1]. However, it does not stop interception (data can still be stolen mid-transit) [1].
Question 182 Marks
Explain the use of Two-Factor Authentication (2FA).
Mark Key
Requiring a secondary verification method [1] so an account remains safe even if the password is stolen [1].
Question 192 Marks
A company's database was deleted by an intern. Which administrative prevention method could have stopped this?
Solution
User Access Levels.
Question 202 Marks
Identify the specific malware designed specifically to replicate across a network to cause a crash.
Solution
Worm.
Question 212 Marks
[AO3 Evaluation] Comprehensive Security: A bank relies entirely on a firewall and encryption for its servers. Discuss why Physical Security is still critical.
Security Key
Digital security is useless if the hardware is physically stolen or tampered with [1]. Physical access allows a hacker to bypass digital controls (e.g., pulling a hard drive) [1].