Search Header Logo

Unit 3 System Hardening Quiz

Authored by Richard A Sarhanis

Computers

10th Grade

15 Questions

Used 21+ times

Unit 3 System Hardening Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of a vulnerability assessment?

To identify and mitigate vulnerabilities in a system

To analyze the security of digital products

To reduce the attack surface of a system

To harden a system against cyber attacks

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

William, a cybersecurity student, is working on a project to analyze vulnerability data. He needs to use a database that is commonly used as an industry repository of vulnerability data. Which database should he use?

Common Vulnerability and Exposure (CVE) database

National Vulnerability Database (NVD)

Microsoft Baseline Security Analyzer (MBSA)

Cybersecurity & Infrastructure Security Agency (CISA)

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of system hardening?

To secure user access and backups

To identify and mitigate vulnerabilities

To analyze the security of digital products

To reduce the attack surface of a system

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Noah, Nora, and Maya are working together to harden the security of their school's computer system. Which of the following actions, if taken by them, would NOT be a step towards hardening the system?

Performing regular software updates on all the computers

Restricting user access based on the least privilege principle

Backing up important data regularly

Keeping third-party applications up to date

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of user access control (UAC) settings?

To restrict user actions and limit vulnerabilities

To secure user access and backups

To analyze the security of digital products

To reduce the attack surface of a system

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Abigail received an email warning about the increasing threat of ransomware and data loss. She wants to know, what is the first level of defense she should consider?

Creating system images of her computer

Using sync services like Dropbox or Google Drive

Performing regular software updates

Maintaining regular backups of her data

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Charlotte, Anika, and Mason are part of the IT team in a company. They are discussing the best practices for securing user access. Which of the following practices mentioned by them is NOT recommended?

Severely restrict administrative rights

Implement strong password policies

Grant unlimited access to all users

Follow the least privilege principle

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers