
Unit 1: Protect Data and Systems (Section D: AAQ)
Presentation
•
Information Technology (IT)
•
Vocational training
•
Practice Problem
•
Hard
Kimberly O'Brien
Used 1+ times
FREE Resource
34 Slides • 28 Questions
1
2
3
Open Ended
Can you recall a few organizational weaknesses that can lead to security breaches, like excessive permissions or weak password practices?
4
Open Ended
What are some common network vulnerabilities we discussed, such as issues with firewall ports, external storage, or cloud/BYOD policies?
5
6
7
Fill in the Blanks
8
9
10
Multiple Choice
Which of the following actions can be performed with 'Write' permissions?
View file contents
Modify existing files
Run programmes
Copy files
11
12
Multiple Choice
Which of the following is NOT a primary reason why file permissions matter in cybersecurity?
Preventing data breaches
Maintaining system integrity
Improving computer speed
Compliance requirements
13
14
Multiple Choice
Which of the following statements about operating system differences in managing file permissions is correct?
Windows uses command-line tools like chmod for permissions.
Linux uses a graphical user interface for setting permissions.
Windows uses a graphical user interface for permissions, while Linux uses command-line tools.
Both Windows and Linux use the same method for managing permissions.
15
Open Ended
Compare how file permission inheritance and the Principle of Least Privilege contribute to efficient and secure folder management.
16
Open Ended
Explain how the Principle of Least Privilege helps reduce security risks when setting file permissions.
17
18
19
Multiple Choice
Based on the learning objectives and introduction, which concept best explains why antivirus software should be part of a layered security strategy?
It can detect all threats perfectly
It is not 100% effective on its own
It only works for known malware
It does not require updates
20
21
Multiple Choice
Which of the following is NOT a key feature of antivirus software?
Real-time scanning
Signature-based detection
Heuristic analysis
Firewall management
22
23
Open Ended
Explain how multi-layered protection in antivirus software helps safeguard your data.
24
25
Multiple Select
Select all functions that are typically performed by antivirus software to keep users safe.
Scheduled scans
Web protection
Network monitoring
Password management
26
27
Open Ended
Why is the quarantine function important in handling false positives?
28
Fill in the Blanks
29
30
Open Ended
Explain the importance of layered security in protecting against sophisticated threats like zero-day attacks.
31
Multiple Choice
Which of the following best explains why antivirus software struggles to detect zero-day attacks?
Zero-day attacks use outdated malware signatures.
Zero-day attacks are already known to antivirus databases.
Zero-day attacks exploit unknown vulnerabilities not yet identified by antivirus software.
Zero-day attacks only target hardware vulnerabilities.
32
33
Fill in the Blanks
34
Multiple Select
Which of the following are strategies used to minimize the performance impact of antivirus scans?
Running scans during off-peak hours
Using only real-time scanning
Disabling antivirus software
Scanning only new files
35
36
37
38
Open Ended
Describe how packet filtering and stateful inspection work together to protect a network from unauthorized access.
39
40
Multiple Choice
Which of the following is NOT a function of hardware firewalls?
Filter traffic before it reaches any device
Provide network-wide protection
Alert users to suspicious activity
Handle high traffic volumes efficiently
41
42
Multiple Choice
Which essential firewall function is responsible for monitoring and controlling network ports to prevent attackers from exploiting vulnerable entry points?
Access Control
Port Management
Traffic Logging
Intrusion Prevention
43
44
Open Ended
Explain the difference between whitelisting and blacklisting in firewall strategies. What are the potential risks and benefits of each approach?
45
46
Multiple Choice
Which of the following statements about encryption is correct?
Encryption makes data permanently unreadable.
Only those with the correct decryption key can convert encrypted data back to its original form.
Encryption is only used for data stored on devices.
Encryption is not important for modern digital security.
47
48
Fill in the Blanks
49
50
Multiple Select
Match the following encryption methods for stored data with their descriptions: Full Disk Encryption, File-Level Encryption, Database Encryption.
Encrypts entire hard drive and requires authentication before booting.
Encrypts individual files or folders for selective protection.
Protects information stored in databases from unauthorized access.
51
52
Open Ended
Describe the process of protecting data during transmission. What roles do the sender and recipient play in ensuring secure communication?
53
54
55
56
57
58
59
60
61
Fill in the Blanks
62
Open Ended
Reflecting on today's lesson about techniques used to protect data and systems, what is one concept or strategy you found most valuable, and why?
Show answer
Auto Play
Slide 1 / 62
SLIDE
Similar Resources on Wayground
59 questions
Navigate IBIS and file a claim, TRA/TAA, Adding/Removing
Presentation
•
Professional Development
61 questions
LITERASI SMK 4.0
Presentation
•
Professional Development
53 questions
EL Achieve and EdTech
Presentation
•
Professional Development
61 questions
Snowflake Training New
Presentation
•
Professional Development
58 questions
CNA Prep
Presentation
•
KG - University
53 questions
NTIP Conference - Interactive Slideshow
Presentation
•
Professional Development
53 questions
LOKAKARYA 6 ISMAIL BAHANAN
Presentation
•
Professional Development
53 questions
ISO 14001:2015 Cl 7 - CL 10
Presentation
•
Professional Development
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade