Search Header Logo
Unit 1:  Protect Data and Systems (Section D: AAQ)

Unit 1: Protect Data and Systems (Section D: AAQ)

Assessment

Presentation

Information Technology (IT)

Vocational training

Practice Problem

Hard

Created by

Kimberly O'Brien

Used 1+ times

FREE Resource

34 Slides • 28 Questions

1

media

2

media

3

Open Ended

Can you recall a few organizational weaknesses that can lead to security breaches, like excessive permissions or weak password practices?

4

Open Ended

What are some common network vulnerabilities we discussed, such as issues with firewall ports, external storage, or cloud/BYOD policies?

5

media

6

media

7

Fill in the Blank

File permissions act as digital ___ to protect information from unauthorized access.

8

media

9

media

10

Multiple Choice

Which of the following actions can be performed with 'Write' permissions?

1

View file contents

2

Modify existing files

3

Run programmes

4

Copy files

11

media

12

Multiple Choice

Which of the following is NOT a primary reason why file permissions matter in cybersecurity?

1

Preventing data breaches

2

Maintaining system integrity

3

Improving computer speed

4

Compliance requirements

13

media

14

Multiple Choice

Which of the following statements about operating system differences in managing file permissions is correct?

1

Windows uses command-line tools like chmod for permissions.

2

Linux uses a graphical user interface for setting permissions.

3

Windows uses a graphical user interface for permissions, while Linux uses command-line tools.

4

Both Windows and Linux use the same method for managing permissions.

15

Open Ended

Compare how file permission inheritance and the Principle of Least Privilege contribute to efficient and secure folder management.

16

Open Ended

Explain how the Principle of Least Privilege helps reduce security risks when setting file permissions.

17

media

18

media

19

Multiple Choice

Based on the learning objectives and introduction, which concept best explains why antivirus software should be part of a layered security strategy?

1

It can detect all threats perfectly

2

It is not 100% effective on its own

3

It only works for known malware

4

It does not require updates

20

media

21

Multiple Choice

Which of the following is NOT a key feature of antivirus software?

1

Real-time scanning

2

Signature-based detection

3

Heuristic analysis

4

Firewall management

22

media

23

Open Ended

Explain how multi-layered protection in antivirus software helps safeguard your data.

24

media

25

Multiple Select

Select all functions that are typically performed by antivirus software to keep users safe.

1

Scheduled scans

2

Web protection

3

Network monitoring

4

Password management

26

media

27

Open Ended

Why is the quarantine function important in handling false positives?

28

Fill in the Blank

False positives occur when antivirus software mistakenly flags a legitimate file as ___.

29

media

30

Open Ended

Explain the importance of layered security in protecting against sophisticated threats like zero-day attacks.

31

Multiple Choice

Which of the following best explains why antivirus software struggles to detect zero-day attacks?

1

Zero-day attacks use outdated malware signatures.

2

Zero-day attacks are already known to antivirus databases.

3

Zero-day attacks exploit unknown vulnerabilities not yet identified by antivirus software.

4

Zero-day attacks only target hardware vulnerabilities.

32

media

33

Fill in the Blank

Full system scans can make your computer feel ___ during the scanning process.

34

Multiple Select

Which of the following are strategies used to minimize the performance impact of antivirus scans?

1

Running scans during off-peak hours

2

Using only real-time scanning

3

Disabling antivirus software

4

Scanning only new files

35

media

36

media

37

media

38

Open Ended

Describe how packet filtering and stateful inspection work together to protect a network from unauthorized access.

39

media

40

Multiple Choice

Which of the following is NOT a function of hardware firewalls?

1

Filter traffic before it reaches any device

2

Provide network-wide protection

3

Alert users to suspicious activity

4

Handle high traffic volumes efficiently

41

media

42

Multiple Choice

Which essential firewall function is responsible for monitoring and controlling network ports to prevent attackers from exploiting vulnerable entry points?

1

Access Control

2

Port Management

3

Traffic Logging

4

Intrusion Prevention

43

media

44

Open Ended

Explain the difference between whitelisting and blacklisting in firewall strategies. What are the potential risks and benefits of each approach?

45

media

46

Multiple Choice

Which of the following statements about encryption is correct?

1

Encryption makes data permanently unreadable.

2

Only those with the correct decryption key can convert encrypted data back to its original form.

3

Encryption is only used for data stored on devices.

4

Encryption is not important for modern digital security.

47

media

48

Fill in the Blank

Stored data encryption, also known as ___ encryption, protects information saved on hard drives and other storage devices.

49

media

50

Multiple Select

Match the following encryption methods for stored data with their descriptions: Full Disk Encryption, File-Level Encryption, Database Encryption.

1

Encrypts entire hard drive and requires authentication before booting.

2

Encrypts individual files or folders for selective protection.

3

Protects information stored in databases from unauthorized access.

51

media

52

Open Ended

Describe the process of protecting data during transmission. What roles do the sender and recipient play in ensuring secure communication?

53

media

54

media

55

media

56

media

57

media

58

media

59

media

60

media

61

Fill in the Blank

One way to protect data and systems is by using a ___.

62

Open Ended

Reflecting on today's lesson about techniques used to protect data and systems, what is one concept or strategy you found most valuable, and why?

media

Show answer

Auto Play

Slide 1 / 62

SLIDE