0% found this document useful (0 votes)
54 views

Preventing Vulnerabilities L2 Homework 2

This document contains a homework assignment on systems software and security with 4 questions. Question 1 asks about acceptable use policies for schools and includes examples of items that should be included. Question 2 asks about the purpose of penetration testing and the difference between black box and white box testing. Question 3 asks about what information an organization's computer department's audit trail would provide. Finally, question 4 asks about two security measures a school could take to secure its network. The total marks for the assignment are 20.

Uploaded by

Khadijah
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

Preventing Vulnerabilities L2 Homework 2

This document contains a homework assignment on systems software and security with 4 questions. Question 1 asks about acceptable use policies for schools and includes examples of items that should be included. Question 2 asks about the purpose of penetration testing and the difference between black box and white box testing. Question 3 asks about what information an organization's computer department's audit trail would provide. Finally, question 4 asks about two security measures a school could take to secure its network. The total marks for the assignment are 20.

Uploaded by

Khadijah
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Homework 2

Unit 3 Systems software and security

Homework 2: Systems software and security


1. (a) Which of these items listed might you be expected to agree to in a school’s
Acceptable Use policy? [4]
(b) Add two more items that should be included in a school’s Acceptable Use policy. [4]

Tick if
correct
I will not create, transmit, display or publish any material that is likely to
cause anxiety, offence or inconvenience to any other person.

I will change my password every six weeks.

I will keep my personal details private and not make them available to
others using the Internet.
If I find an unattended machine logged on under other users username I
will not continuing using the machine – I will log it off immediately.

2. (a) Explain the purpose of penetration testing. [2]

(b) Explain the difference between “black box” and “white box” testing in this context. [4]

3. List two items of information that you would expect an audit trail carried out by the
computer department of an organisation to provide. [2]

1
Homework 2
Unit 3 Systems software and security

4. Describe two measures that a school could take to ensure the security of the school
network. [4]

[Total 20 Marks]

You might also like