Y10 05 P30 Assessment v2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

TOPIC 5: ISSUES AND IMPACTS

Assessment

ASSESSMENT FOR Y10-05-P30

Name ____________________________________________ Date __________________

Question 1
One type of software records the data that is being input into a computer from a keyboard. It
then transmits this data to a third party who can analyse the data for important information
such as usernames and passwords. Identify the name of this type of software. (1)
a Hacker
b Phishing
c Spyware
d Virus

Question 2
Identify the purpose of phishing. (1)
a To change the data on your computer.
b To create copies of itself to transmit to other people.
c To delete your personal data from your computer.
d To capture your personal data.

Question 3
One type of malicious software hides itself inside other programs, makes copies of itself and
inserts them into other files. These files are then passed from user to user. Identify this type
of malicious software. (1)
a Virus
b Ransomware
c Worm
d Trojan

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
1
TOPIC 5: ISSUES AND IMPACTS

Assessment

Question 4
One type of malicious software has the ability to distribute itself independently of a user. It
may cause systems to run slowly. It may also create back doors into systems.
Identify this type of malicious software. (1)
a Ransomware
b Trojan
c Worm
d Bot

Question 5
One type of malicious software must be installed onto a system by a computer user. It may
masquerade as legitimate software to entice a user to install it. Sometimes it just causes
unpredictable behaviours but it can delete files.
Identify this type of malicious software. (1)
a Ransomware
b Trojan
c Worm
d Spyware

Question 6
One type of malicious software blocks users from using their computers or accessing the
data stored on them until a fee has been paid to release the block.
Identify this type of malicious software. (1)
a Adware
b Spyware
c Worm
d Ransomware

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
2
TOPIC 5: ISSUES AND IMPACTS

Assessment

Question 7
Explain why an anti-malware program that uses a virus signature database may not identify
all viruses. (2)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

Question 8
Describe how static heuristic analysis works for virus detection. (3)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

Question 9
Discuss the role of software patches in system security. (4)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

Question 10
State why all computer hackers are not cybercriminals. (1)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
3
TOPIC 5: ISSUES AND IMPACTS

Assessment

Question 11
One type of cyberattack uses a fake email from a reputable organisation or a fake website
that mimics a real one. It tricks the user into giving away personal data.
Identify this type of cyberattack. (1)
a Pretexting
b Baiting
c Phishing
d Quid pro quo

Question 12
Someone contacts you over the phone, pretending to be from an organisation you might
know. They engage you in conversation in order to find out personal information. You may
also be targeted through your social networking profiles and posts.
Identify this type of cyberattack. (1)
a Baiting
b Pretexting
c Quid pro quo
d Phishing

Question 13
One type of cyberattack exploits a person’s natural curiosity to gain information. Victims are
offered something for free or an exclusive perk. They may be enticed to download malware.
Identify this type of cyberattack. (1)
a Phishing
b Quid pro quo
c Pretexting
d Baiting

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
4
TOPIC 5: ISSUES AND IMPACTS

Assessment

Question 14
One type of cyberattack offers something of value for free. These items may be giveaways or
some other kind of reward. However they are often forms of malware. Victims may see them
as pop-ups on websites.
Identify this type of cyberattack. (1)
a Phishing
b Quid pro quo
c Baiting
d Pretexting

Question 15
Give three ways that people can be educated to protect themselves from cyberattacks that
involve social engineering. (3)
1………………………………………………………………………………………………................
……………………………………………………………………………………………….................
2………………………………………………………………………………………………................
……………………………………………………………………………………………….................
3………………………………………………………………………………………………................
……………………………………………………………………………………………….................

Question 16
Describe the purpose of an Acceptable Use Policy (AUP). (3)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
5
TOPIC 5: ISSUES AND IMPACTS

Assessment

Question 17
Explain how encryption protects data during transmission on the Internet. (2)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

Question 18
Explain how backup and recovery procedures could help an organisation withstand a
ransomware attack. (2)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

Question 19
Give a reason why current encryption algorithms for important information such as bank
details are considered secure. (1)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

Question 20
Describe multi-factor authentication. (3)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
6
TOPIC 5: ISSUES AND IMPACTS

Assessment

Question 21
Explain why ‘quick fixes’ to code may introduce vulnerabilities. (2)
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................
……………………………………………………………………………………………….................

Question 22
Give four checks that a code review should include. (4)
1………………………………………………………………………………………………................
2………………………………………………………………………………………………................
3.………………………………………………………………………………………………...............
4………………………………………………………………………………………………................

Total marks: 40

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
7

You might also like