Where is the danger?

In this lesson you will begin to understand how companies can and do test their own vulnerability to cybercrime.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Question 1

Question 2

Question 3

Q1.Which of the following most accurately defines an acceptable use policy?

1/3

Q2.Tick all the three correct firewall-related sentences below.

Select three (3) boxes

2/3

Q3.Firewalls stop viruses from entering the network

3/3

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Intro quiz - Recap from previous lesson

Before we start this lesson, let’s see what you can remember from this topic. Here’s a quick quiz!

Question 1

Question 2

Question 3

Q1.Which of the following most accurately defines an acceptable use policy?

1/3

Q2.Tick all the three correct firewall-related sentences below.

Select three (3) boxes

2/3

Q3.Firewalls stop viruses from entering the network

3/3

Video

Click on the play button to start the video. If your teacher asks you to pause the video and look at the worksheet you should:

  • Click "Close Video"
  • Click "Next" to view the activity

Your video will re-appear on the next page, and will stay paused in the right place.

Worksheet

These slides will take you through some tasks for the lesson. If you need to re-play the video, click the ‘Resume Video’ icon. If you are asked to add answers to the slides, first download or print out the worksheet. Once you have finished all the tasks, click ‘Next’ below.

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Where's the threat? –

Don’t worry if you get a question wrong! Forgetting is an important step in learning. We will recap next lesson.

Question 1

Question 2

Question 3

Q1.Which of the following definitions describes physical security?

1/3

Q2."Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position A?

2/3

Q3."Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position B?

3/3

This quiz includes images that don't have any alt text - please contact your teacher who should be able to help you with an audio description.

Quiz:

Where's the threat? –

Don’t worry if you get a question wrong! Forgetting is an important step in learning. We will recap next lesson.

Question 1

Question 2

Question 3

Q1.Which of the following definitions describes physical security?

1/3

Q2."Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position A?

2/3

Q3."Penetration testing is defined as a type of A.______ testing used to test the B.______ areas of a system or application." What is the missing word at position B?

3/3

Lesson summary: Where is the danger?

It looks like you have not completed one of the quizzes.

To share your results with your teacher please complete one of the quizzes.

Time to move!

Did you know that exercise helps your concentration and ability to learn?

For 5 mins...

Move around:
Climb stairs

On the spot:
Dance

The next lesson in:
Security
is:
Being part of the solution

Browse Oak's lessons: