For IndividualsFor Educators
ExpertMinds LogoExpertMinds
ExpertMinds

Ace your certifications with Practice Exams and AI assistance.

  • Browse Exams
  • For Educators
  • Blog
  • Privacy Policy
  • Terms of Service
  • Cookie Policy
  • Support
  • AWS SAA Exam Prep
  • PMI PMP Exam Prep
  • CPA Exam Prep
  • GCP PCA Exam Prep

© 2026 TinyHive Labs. Company number 16262776.

    PracticeAQA GCSEAQA GCSE Computer Science Paper 2Question 16.1
    Easy2 marksStructured
    Cyber securityGeneralcyber securitypenetration testingethical hacking

    AQA GCSE · Question 16.1 · Cyber security

    Explain what penetration testing is.

    How to approach this question

    1. Start by defining the core activity: what is being done? (Simulating an attack on a system). 2. State the purpose: why is this done? (To find security vulnerabilities or weaknesses). 3. Explain the ultimate goal: what is the outcome? (To fix the vulnerabilities before a real attacker finds them). 4. Mention who does it: ethical hackers.

    Full Answer

    Penetration testing (or pen testing) is a form of ethical hacking where a computer system, network, or application is deliberately attacked to find security vulnerabilities. The aim is to identify weaknesses that a malicious attacker could exploit, so that these weaknesses can be fixed before a real attack occurs.
    Penetration testing, often called "pen testing" or "ethical hacking," is a proactive cybersecurity practice. It involves authorized professionals simulating a cyberattack on a computer system, network, or web application. The primary goal is to identify and exploit security vulnerabilities in the same way a malicious attacker would. By discovering these weaknesses in a controlled manner, an organization can then fix (or "patch") them before they can be exploited by real attackers.

    Common mistakes

    ✗ Confusing it with other security measures like firewalls or anti-virus software. ✗ Vague answers like "it tests the system" or "it makes it secure". ✗ Describing it as a real, malicious attack rather than a simulated, authorized one.
    Question 15.3All questionsQuestion 16.2

    Practice the full AQA GCSE Computer Science Paper 2

    46 questions · hints · full answers · grading

    Sign up freeTake the exam

    More questions from this exam

    Q01.1Convert the binary number 11010100 into decimal.EasyQ01.2Convert the binary number 10111001 into hexadecimal. You should show your working.MediumQ01.3State the largest decimal number that can be represented using 6 bits.EasyQ02.1Add together the following three binary numbers and give your answer in binary. 00110110 1001...MediumQ02.2Apply a binary shift three places to the right on the bit pattern 10101000. Give the result using...Easy
    View all 46 questions →