What does the term "Vulnerable" mean?
BTEC DIT C3 LAB - Device Hardening & Encryption

Quiz
•
Computers
•
10th - 11th Grade
•
Hard

Sarah Rodgers
Used 162+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It describes a set of rules that allow users to use specific components or access data folders or files
It describes a flaw or weakness in the design, implementation or configuration of a system. These can be exploited by 'black hats' to attack a digital system.
It describes additional settings or program codes that fix vulnerabilities in applications, operating systems and evice firmware, and are usually downloaded from the manufacturer.
It means that information or data has been converted to a type of code that cannot be understood without a translation key
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "Encrypted" mean?
It describes a set of rules that allow users to use specific components or access data folders or files
It describes a flaw or weakness in the design, implementation or configuration of a system. These can be exploited by 'black hats' to attack a digital system.
It describes additional settings or program codes that fix vulnerabilities in applications, operating systems and evice firmware, and are usually downloaded from the manufacturer.
It means that information or data has been converted to a type of code that cannot be understood without a translation key
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "Security Patches" mean?
It describes a set of rules that allow users to use specific components or access data folders or files
It describes a flaw or weakness in the design, implementation or configuration of a system. These can be exploited by 'black hats' to attack a digital system.
It describes additional settings or program codes that fix vulnerabilities in applications, operating systems and evice firmware, and are usually downloaded from the manufacturer.
It means that information or data has been converted to a type of code that cannot be understood without a translation key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "Privilege" mean?
It describes a set of rules that allow users to use specific components or access data folders or files
It describes a flaw or weakness in the design, implementation or configuration of a system. These can be exploited by 'black hats' to attack a digital system.
It describes additional settings or program codes that fix vulnerabilities in applications, operating systems and evice firmware, and are usually downloaded from the manufacturer.
It means that information or data has been converted to a type of code that cannot be understood without a translation key
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are device hardening techniques? (Click all that apply)
Closing unused network ports
Opening unused network ports
Removing non-essential programs or services
Installing a firewall
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify the benefits of encrypting data?
Its quick
It scrambles data so others cannot easily read it.
It ensures organisations comply with data protection laws
It stops data from being stolen
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the drawbacks of encryption? (Click all that apply)
Encryption does not stop data from being stolen
Encryption scrambles data so that others cannot easily read it.
Encryption methods need to continually 'evolve' and change as attackers find new ways to access data
Encrypting a large amount of data takes time
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Cybersecurity Vocab

Quiz
•
9th - 12th Grade
11 questions
Common Protocols GCSE

Quiz
•
10th Grade
9 questions
AP CSP BI 5

Quiz
•
9th - 12th Grade
10 questions
Networks, WiFi and Encryption

Quiz
•
9th - 10th Grade
13 questions
Network Security Threats Quiz

Quiz
•
10th Grade
10 questions
Quantum Computing

Quiz
•
8th Grade - University
12 questions
J808 LO4.4 Preventative Measures (Logical)

Quiz
•
10th - 11th Grade
10 questions
1.1.11 Causes of data loss

Quiz
•
11th Grade - University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University