Quiz: Matching Defences to Attacks (Scenario Practice)
OCR GCSE J277 Computer Science specification
Ready to start this lesson?
Sign in to track your progress. 11 steps including 9 interactive questions.
Sign In to Start LearningStudents also studied
Browse allSteps in this lesson (11)
Building on what you've learned, let's test your knowledge of matching defences to different types of network attacks!
Which type of attack involves sending fraudulent emails to trick users into revealing personal information?
Start the lesson to answer this multiple choice question
Which of the following are ways to defend against a brute-force attack? (Select all that apply)
Start the lesson to answer this multi-select question
A {{blank0}} is used to filter network traffic and can prevent unauthorised access to a system.
Start the lesson to answer this fill in the blank question
Match the items on the left with their correct pairs on the right
Start the lesson to answer this matching question
Which defence is best against SQL injection attacks?
Start the lesson to answer this multiple choice question
An organisation's firewall blocks most unauthorised traffic. If 100 requests are blocked and only 5 get through, calculate the percentage of blocked requests.
Start the lesson to answer this math equation question
Match the items on the left with their correct pairs on the right
Match the items on the left with their correct pairs on the right
Start the lesson to answer this code completion question
Which of the following is a physical security measure against unauthorised access?
Start the lesson to answer this multiple choice question
Which of these defences can help prevent malware attacks? (Select all that apply)
Start the lesson to answer this multi-select question

Want to Learn More?
Get personalised lessons, quizzes, and instant feedback from your AI tutor.
Explore More Topics