Search Header Logo

Data Safety & Best Practices

Authored by Drew Favat

Computers

9th - 12th Grade

Used 3+ times

Data Safety & Best Practices
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Vulnerabilities can be found in technology products including operating systems, software applications and hardware devices.

True

False

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Anyone can access the Common Vulnerabilities and Exporsures (CVE)?

True

False

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Common Vulnerabilities and Exposures are given a severity score of 1 - 100?

True

False

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Should you install updates?

Yes, as soon as it is possible to

Sometimes, it depends

No, avoid it if at all possible

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Updates are the least important thing you can do to secure a system

True

False

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

You can help to secure your system by removing unneeded services.

True

False

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Administrator privileges on a system provide the user with...

Full access - on the device

Partial access - on the device

Access to just administrator tasks

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?