CORRECT ANSWERS LATEST VERSION
2024/2025
Firewall software is usually installed when a computer is connected to the
Internet.
State an external hazard that firewall software protects computers from. - ANS✔✔--
Denial of service attack / attack of network ports / attacks from IP addresses that are
known to perform malicious attacks / attack of network services / detection of some
malware
Explain how a firewall provides security when your computer is connected to the
internet. - ANS✔✔--Prevents unauthorised access to your computer by people
accessing it from the internet (1).Configured to block traffic from specific IP addresses
(1) or block access to certain ports or applications/services (1) but allow certain
ports/services access (1).
One form of attack that can take place is a phishing.
Explain what is meant by a phishing. - ANS✔✔--An email is sent to a large number of
people (1) from a large list of email addresses that has been obtained (1). The email
pretends to be from someone in danger/with a problem/important (1) but is actually
trying to gain personal information/commit fraud/gain usernames and passwords (1)
AJ Systems is trying to train staff to recognise phishing attempts.
Describe two ways that could help staff to recognise a phishing attack. - ANS✔✔--
The email will not be personally addressed (1)
Any links may not be to a legitimate web address / the link may not be the same as the
text (1).
It may contain misspellings (1).
There may be a problem or situation that is presented, but seems suspicious (1).
There will normally be a request to contact a phone number, click a link or give personal
information (1).
· Peripheral management (1)managing inputs to the CPU from peripheral devices such
as keyboard (1), and outputs from the CPU to peripheral devices such as printers (1).·
File management (1)keeping an index of where all files are stored (1), and where there
are blocks of free space (1).
· User management Managing user IDs, passwords (1) and access rights (1).