BTEC DIT C3 LAB - Device Hardening & Encryption

Quiz
•
Computers
•
10th - 11th Grade
•
Hard

Sarah Rodgers
Used 162+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "Vulnerable" mean?
It describes a set of rules that allow users to use specific components or access data folders or files
It describes a flaw or weakness in the design, implementation or configuration of a system. These can be exploited by 'black hats' to attack a digital system.
It describes additional settings or program codes that fix vulnerabilities in applications, operating systems and evice firmware, and are usually downloaded from the manufacturer.
It means that information or data has been converted to a type of code that cannot be understood without a translation key
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "Encrypted" mean?
It describes a set of rules that allow users to use specific components or access data folders or files
It describes a flaw or weakness in the design, implementation or configuration of a system. These can be exploited by 'black hats' to attack a digital system.
It describes additional settings or program codes that fix vulnerabilities in applications, operating systems and evice firmware, and are usually downloaded from the manufacturer.
It means that information or data has been converted to a type of code that cannot be understood without a translation key
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "Security Patches" mean?
It describes a set of rules that allow users to use specific components or access data folders or files
It describes a flaw or weakness in the design, implementation or configuration of a system. These can be exploited by 'black hats' to attack a digital system.
It describes additional settings or program codes that fix vulnerabilities in applications, operating systems and evice firmware, and are usually downloaded from the manufacturer.
It means that information or data has been converted to a type of code that cannot be understood without a translation key
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "Privilege" mean?
It describes a set of rules that allow users to use specific components or access data folders or files
It describes a flaw or weakness in the design, implementation or configuration of a system. These can be exploited by 'black hats' to attack a digital system.
It describes additional settings or program codes that fix vulnerabilities in applications, operating systems and evice firmware, and are usually downloaded from the manufacturer.
It means that information or data has been converted to a type of code that cannot be understood without a translation key
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are device hardening techniques? (Click all that apply)
Closing unused network ports
Opening unused network ports
Removing non-essential programs or services
Installing a firewall
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Identify the benefits of encrypting data?
Its quick
It scrambles data so others cannot easily read it.
It ensures organisations comply with data protection laws
It stops data from being stolen
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the drawbacks of encryption? (Click all that apply)
Encryption does not stop data from being stolen
Encryption scrambles data so that others cannot easily read it.
Encryption methods need to continually 'evolve' and change as attackers find new ways to access data
Encrypting a large amount of data takes time
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Database Security Quiz

Quiz
•
11th Grade
10 questions
Networks, WiFi and Encryption

Quiz
•
9th - 10th Grade
10 questions
Data Security

Quiz
•
5th - 10th Grade
13 questions
Network Security Threats Quiz

Quiz
•
10th Grade
15 questions
Understanding the CIA Triad in Cybersecurity

Quiz
•
10th Grade
12 questions
IT Vocabulary Quiz

Quiz
•
8th Grade - University
9 questions
AP CSP BI 5

Quiz
•
9th - 12th Grade
13 questions
8.3 Security of data (2)

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade