Back to Dashboard

1.4 Network Security Diagnostic

Definitive 20-Question Diagnostic | Emerald Green Standard

Question 1 2 Marks

Scenario: A user receives an email claiming to be from their bank, directing them to a fake website to log in.

Identify this type of attack and state its specific purpose.

Question 2 2 Marks

Describe how a SQL Injection attack is carried out.

Question 3 2 Marks

Explain the difference between a Virus and a Worm.

Question 4 2 Marks

Define a Brute-Force Attack and its automated nature.

Question 5 2 Marks

Identify the specific threat that encrypts a user's data and demands a fee for the key.

Question 6 2 Marks

Explain why People are often cited as the "weak point" in network security.

Question 7 2 Marks

Define Data Interception.

Question 8 2 Marks

State the role of Anti-Malware software in preventing attacks.

Question 9 3 Marks

Complete the description of a Firewall.

A firewall monitors incoming and outgoing . It compares this against and unauthorised data.
Question 10 2 Marks

J277 Standard: Define User Access Levels.

Question 11 2 Marks

Describe Penetration Testing and its role in a security strategy.

Question 12 2 Marks

Identify two physical security measures used for server protection.

Question 13 2 Marks

Define a DoS (Denial of Service) attack.

Question 14 2 Marks

How do Limiting Login Attempts prevent brute-force attacks?

Question 15 2 Marks

Explain Pharming and how it differs from Phishing.

Question 16 3 Marks

Match the Malware to its effect.

MalwareSpywareTrojanRansomware
Disguised as legitimate software
Records keypresses secretly
Locks data for a financial fee
Question 17 2 Marks

AO3 Spec Audit: Identify why Encryption is effective but state its limitation regarding interception.

Question 18 2 Marks

Explain the use of Two-Factor Authentication (2FA).

Question 19 2 Marks

A company's database was deleted by an intern. Which administrative prevention method could have stopped this?

Question 20 2 Marks

Identify the specific malware designed specifically to replicate across a network to cause a crash.

Question 21 2 Marks

[AO3 Evaluation] Comprehensive Security: A bank relies entirely on a firewall and encryption for its servers. Discuss why Physical Security is still critical.