
Data Safety & Best Practices
Authored by Drew Favat
Computers
9th - 12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Vulnerabilities can be found in technology products including operating systems, software applications and hardware devices.
True
False
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Anyone can access the Common Vulnerabilities and Exporsures (CVE)?
True
False
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Common Vulnerabilities and Exposures are given a severity score of 1 - 100?
True
False
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Should you install updates?
Yes, as soon as it is possible to
Sometimes, it depends
No, avoid it if at all possible
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Updates are the least important thing you can do to secure a system
True
False
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
You can help to secure your system by removing unneeded services.
True
False
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Administrator privileges on a system provide the user with...
Full access - on the device
Partial access - on the device
Access to just administrator tasks
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?