Cyber Security 3kjh23vhp3B8qP8q
Cyber Security 3kjh23vhp3B8qP8q
Exam Questions
Cyber Security
Cyber Security Threats / Keeping Data Safe
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 1
Easy Questions
1 A company has a website that is stored on a web server.
Suggest one security device that can be used to help prevent a DDoS attack.
(1 mark)
2 A student is concerned about the threats to their computer when using the internet
The student wants to use some security solutions to help protect the computer from the threats.
Identify a security solution that could be used to protect the computer from a computer virus, hacking and spyware.
Computer virus
Hacking
Spyware
(3 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 2
3 (a) Adele chooses to set a biometric password for her mobile device, instead of a personal identification number (PIN).
(1 mark)
(b) Adele also encrypts the data on her mobile device to keep it more secure.
(1 mark)
Joelle uses a firewall to keep her data safe when she uses the Internet.
Tick (✓)
(1 mark)
One security method to keep data safe from online attacks is a firewall.
Identify two other security methods that keep data safe from online attacks.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 3
6 (a) A manager at a company is concerned about a brute‑force attack on its employee user accounts.
One possible aim for carrying out a brute‑force attack is to install malware onto the company network.
(3 marks)
(b) Give two security solutions that could be used to help prevent a brute‑force attack being successful.
(2 marks)
7 A student uses the internet for their schoolwork to research what is meant by pharming.
(1 mark)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 4
Medium Questions
1 A company has a website that is stored on a web server.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 5
2 (a) Adele chooses to set a biometric password for her mobile device, instead of a personal identification number (PIN).
Give two reasons why a biometric password is more secure than a PIN.
(2 marks)
The firewall gathers data about the traffic coming into and going out of her mobile device.
Explain how the firewall uses the gathered data to keep the mobile device more secure.
(3 marks)
Joelle’s parent also uses the firewall to limit the websites that Joelle can access.
Explain how the firewall is used to limit the websites that Joelle can access.
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 6
4 (a) Millions of emails are sent between users on a daily basis.
Identify two online security attacks that can be carried out using email.
(6 marks)
One example of how data can be damaged accidentally is by shutting down a computer before saving data. To prevent this from happening
they have saved all data before shutting down a computer.
Complete the table by giving three other examples of how data can be damaged accidentally.
................................................................................................................................................ ..............................................................................................
................................................................................................................................................ ..............................................................................................
................................................................................................................................................ ..............................................................................................
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 7
5 (a) A manager at a company is concerned about a brute‑force attack on its employee user accounts
Describe how a brute‑force attack can be used to gain access to the employee user accounts.
(3 marks)
(b) A manager at a company is concerned about a brute‑force attack on its employee user accounts.
One possible aim for carrying out a brute‑force attack is to install malware onto the company network.
State two other aims for carrying out a brute‑force attack to gain access to the employee user accounts.
(2 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 8
Hard Questions
1 An art gallery uses secure socket layer (SSL) to provide a secure connection when selling art on its website.
Describe the process of SSL and explain how it provides a secure connection.
(6 marks)
2 A student is concerned about the threats to their computer when using the internet.
The student wants to use some security solutions to help protect the computer from the threats.
Describe how each of the following security solutions will help protect the computer.
Anti-malware
Two-step verification
Passwords
(6 marks)
3 A student uses the internet for their schoolwork to research what is meant by harming
(4 marks)
© 2025 Save My Exams, Ltd. Get more and ace your exams at savemyexams.com 9