Being part of the solution

In this lesson you will explore different careers available in cybersecurity before taking an end of unit quiz.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Question 1

Question 2

Question 3

Q1.Which of the following definitions describes physical security?

1/3

Q2."Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position A?

2/3

Q3."Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position B?

3/3

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Question 1

Question 2

Question 3

Q1.Which of the following definitions describes physical security?

1/3

Q2."Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position A?

2/3

Q3."Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position B?

3/3

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Being Part of the Solution

This quiz will cover elements from all lessons from this unit.

Question 1

Question 2

Question 3

Question 4

Question 5

Question 6

Question 7

Question 8

Question 9

Question 10

Question 11

Q1.Which of these sentences most accurately defines cybersecurity?

1/11

Q2.Which of these sentences defines an ethical hacker?

2/11

Q3.Which of the sentences below most accurately describes hacktivists?

3/11

Q4.Which of the sentences below most accurately represents social engineering in cybersecurity?

4/11

Q5.Which of the sentences below defines phishing?

5/11

Q6.Which of the sentences below most accurately represents a worm?

6/11

Q7.Which of the sentences below most accurately represents a virus?

7/11

Q8.SQL injection allows cybercriminals to do which of the following actions?

8/11

Q9.What is encryption?

9/11

Q10.Which of the following is incorrect in relation to firewalls?

10/11

Q11.Which of the sentences below most accurately represents network forensics?

11/11

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Being Part of the Solution

This quiz will cover elements from all lessons from this unit.

Question 1

Question 2

Question 3

Question 4

Question 5

Question 6

Question 7

Question 8

Question 9

Question 10

Question 11

Q1.Which of these sentences most accurately defines cybersecurity?

1/11

Q2.Which of these sentences defines an ethical hacker?

2/11

Q3.Which of the sentences below most accurately describes hacktivists?

3/11

Q4.Which of the sentences below most accurately represents social engineering in cybersecurity?

4/11

Q5.Which of the sentences below defines phishing?

5/11

Q6.Which of the sentences below most accurately represents a worm?

6/11

Q7.Which of the sentences below most accurately represents a virus?

7/11

Q8.SQL injection allows cybercriminals to do which of the following actions?

8/11

Q9.What is encryption?

9/11

Q10.Which of the following is incorrect in relation to firewalls?

10/11

Q11.Which of the sentences below most accurately represents network forensics?

11/11

Lesson summary: Being part of the solution

It looks like you have not completed one of the quizzes.

To share your results with your teacher please complete one of the quizzes.

Time to move!

Did you know that exercise helps your concentration and ability to learn?

For 5 mins...

Move around:
Walk

On the spot:
Chair yoga

Take part in The Big Ask.

The Children's Commissioner for England wants to know what matters to young people.

Share your views and have your voice heard.

This was the final lesson in the unit Security.

Browse Oak's lessons: