Search Header Logo
Data Level Protection and Device Hardening Techniques

Data Level Protection and Device Hardening Techniques

Assessment

Presentation

Computers

10th Grade

Practice Problem

Medium

Created by

Richard Evans

Used 3+ times

FREE Resource

3 Slides • 9 Questions

1

2

Fill in the Blank

Device hardening is when ________ measures are combined to add more layers to go through

3

4

Match

Common Device Hardening Techniques

Anti-virus Software

Encryption

Firewalls

Auto -Installing software Updates

Blocking USB ports

Scans for malware and removes it

Scrambles the contents of a message or file

Monitors and blocks unwanted data accessing the system

Updates include patches which fixes know vulnerabilities

Stops users transferring malware using a physical medium

5

Multiple Select

Which of these are device hardening techniques? Click MORE than ONE

1

Encryption

2

HTTP

3

Auto installing of updates

4

Malware

5

Defensive software and interface design

6

Open Ended

Why should you keep your computer system up to date with software updates?

7

Drag and Drop

Another method of device hardening is ​​
user ​
. This involves ​
old user accounts
Drag these tiles and drop them in the correct blank above
limiting
access
disabling

8

Multiple Choice

Which method is the most important in detecting the latest malware threats?

1

Malware

2

Anti-virus software

3

Adware

4

Firewall

9

Drag and Drop

Another method of device hardening is looking at your ​
and ​
of data procedure. The means the company knows how ​
they should backup their ​
data and where it is ​
e.g cloud or in a physical medium store in a fire proof safe .
Drag these tiles and drop them in the correct blank above
backup
recovery
often
important
stored

10

Open Ended

Why should organisations block users from using USB drives?

11

12

Fill in the Blank

When looking at Defensive Software Design, _________ designers need to consider security too.

Show answer

Auto Play

Slide 1 / 12

SLIDE