Unit 3 System Hardening Quiz

Unit 3 System Hardening Quiz

10th Grade

15 Qs

quiz-placeholder

Similar activities

Q1 M 2 - TOPIC 2 / Check your understanding

Q1 M 2 - TOPIC 2 / Check your understanding

10th Grade

10 Qs

Y10M2A2 - Selection

Y10M2A2 - Selection

6th - 10th Grade

15 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

Cell Phone Vocabulary

Cell Phone Vocabulary

9th - 12th Grade

12 Qs

Sprawdź się

Sprawdź się

4th - 12th Grade

10 Qs

Bài 11. Tệp và quản lý tệp

Bài 11. Tệp và quản lý tệp

10th Grade

20 Qs

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

HTML

HTML

8th - 12th Grade

15 Qs

Unit 3 System Hardening Quiz

Unit 3 System Hardening Quiz

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Richard A Sarhanis

Used 21+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of a vulnerability assessment?

To identify and mitigate vulnerabilities in a system

To analyze the security of digital products

To reduce the attack surface of a system

To harden a system against cyber attacks

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

William, a cybersecurity student, is working on a project to analyze vulnerability data. He needs to use a database that is commonly used as an industry repository of vulnerability data. Which database should he use?

Common Vulnerability and Exposure (CVE) database

National Vulnerability Database (NVD)

Microsoft Baseline Security Analyzer (MBSA)

Cybersecurity & Infrastructure Security Agency (CISA)

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of system hardening?

To secure user access and backups

To identify and mitigate vulnerabilities

To analyze the security of digital products

To reduce the attack surface of a system

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Noah, Nora, and Maya are working together to harden the security of their school's computer system. Which of the following actions, if taken by them, would NOT be a step towards hardening the system?

Performing regular software updates on all the computers

Restricting user access based on the least privilege principle

Backing up important data regularly

Keeping third-party applications up to date

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of user access control (UAC) settings?

To restrict user actions and limit vulnerabilities

To secure user access and backups

To analyze the security of digital products

To reduce the attack surface of a system

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Abigail received an email warning about the increasing threat of ransomware and data loss. She wants to know, what is the first level of defense she should consider?

Creating system images of her computer

Using sync services like Dropbox or Google Drive

Performing regular software updates

Maintaining regular backups of her data

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Charlotte, Anika, and Mason are part of the IT team in a company. They are discussing the best practices for securing user access. Which of the following practices mentioned by them is NOT recommended?

Severely restrict administrative rights

Implement strong password policies

Grant unlimited access to all users

Follow the least privilege principle

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?