Selecting and justifying appropriate logical prevention methods to secure a network.
Normally, you are given a question and have to provide the answer. Today, we are reversing it. In your Google Doc, write the best 2-mark OCR exam question that would lead to the answer below.
The Answer is:
"Denial of Service (DoS)"
If your question looks similar to any of these, you have achieved the marks:
To select, justify, and explain the mechanics of appropriate logical prevention methods (software defences) used to secure a network.
Hardware or software that monitors incoming and outgoing network traffic. It blocks unauthorised packets based on a set of security rules.
It sits at the border of the network, acting as a security checkpoint.
Software that actively scans files and compares them against a database of known threats to detect, quarantine, and delete malicious code.
It searches internally for threats that bypassed the firewall.
Assigning specific permissions (Read, Write, Execute) based on a user's role. It limits what data a compromised account can access.
Verifying the identity of a user trying to access the network. This includes passwords, biometrics, and Two-Step Verification (2FA).
Password
SMS Code
Access
Two-Step Verification
Configuring a router to only allow devices with specific MAC addresses (a unique hardware code) to connect to the network.
WHITELIST:
00:1B:44:11:3A:B7
Unknown Device
In the exam, students constantly confuse Firewalls and Anti-Malware. They are not the same thing. One looks at network traffic, the other looks at files.
The Internet
Firewall
Blocks unauthorised network traffic at the border.
Local PC
Anti-Malware scans files already on the hard drive.
Read the scenario. Write either A (Firewall) or B (Anti-Malware) on your MWB.
System Integrity
Select a tool, then click an active vulnerability to apply the patch.
In your Google Doc, answer the following 4-mark OCR exam question. Use the point-and-explain structure.
Look at the image below. This real-world scenario perfectly describes a specific software prevention method we learned today. Write the name of the method on your MWB.
GUESTLIST
00-1B-44
F8-2C-11
Note: "Firewall" is also an acceptable interpretation, as a firewall blocks traffic based on rules, much like a bouncer at the door.