
Unit 3 System Hardening Quiz
Authored by Richard A Sarhanis
Computers
10th Grade
Used 21+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 mins • 1 pt
What is the purpose of a vulnerability assessment?
To identify and mitigate vulnerabilities in a system
To analyze the security of digital products
To reduce the attack surface of a system
To harden a system against cyber attacks
2.
MULTIPLE CHOICE QUESTION
10 mins • 1 pt
William, a cybersecurity student, is working on a project to analyze vulnerability data. He needs to use a database that is commonly used as an industry repository of vulnerability data. Which database should he use?
Common Vulnerability and Exposure (CVE) database
National Vulnerability Database (NVD)
Microsoft Baseline Security Analyzer (MBSA)
Cybersecurity & Infrastructure Security Agency (CISA)
3.
MULTIPLE CHOICE QUESTION
10 mins • 1 pt
What is the purpose of system hardening?
To secure user access and backups
To identify and mitigate vulnerabilities
To analyze the security of digital products
To reduce the attack surface of a system
4.
MULTIPLE CHOICE QUESTION
10 mins • 1 pt
Noah, Nora, and Maya are working together to harden the security of their school's computer system. Which of the following actions, if taken by them, would NOT be a step towards hardening the system?
Performing regular software updates on all the computers
Restricting user access based on the least privilege principle
Backing up important data regularly
Keeping third-party applications up to date
5.
MULTIPLE CHOICE QUESTION
10 mins • 1 pt
What is the purpose of user access control (UAC) settings?
To restrict user actions and limit vulnerabilities
To secure user access and backups
To analyze the security of digital products
To reduce the attack surface of a system
6.
MULTIPLE CHOICE QUESTION
10 mins • 1 pt
Abigail received an email warning about the increasing threat of ransomware and data loss. She wants to know, what is the first level of defense she should consider?
Creating system images of her computer
Using sync services like Dropbox or Google Drive
Performing regular software updates
Maintaining regular backups of her data
7.
MULTIPLE CHOICE QUESTION
10 mins • 1 pt
Charlotte, Anika, and Mason are part of the IT team in a company. They are discussing the best practices for securing user access. Which of the following practices mentioned by them is NOT recommended?
Severely restrict administrative rights
Implement strong password policies
Grant unlimited access to all users
Follow the least privilege principle
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Basic Parts of Speech EPS
Quiz
•
9th - 10th Grade
10 questions
Understanding Backend
Quiz
•
10th Grade
15 questions
Quiz 1
Quiz
•
1st - 12th Grade
15 questions
Data Security Worksheet
Quiz
•
10th Grade - University
13 questions
Guess the Retro Computer 1
Quiz
•
KG - Professional Dev...
10 questions
Programming Constructs
Quiz
•
5th - 11th Grade
15 questions
# REVIEW 1 DATA TYPES
Quiz
•
10th Grade
11 questions
Threats to Data
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
[AP CSP] JavaScript Programming Quiz
Quiz
•
9th - 12th Grade
10 questions
Understanding Computers and Computer Engineering
Interactive video
•
7th - 12th Grade
37 questions
Python - Tuples, Lists, and List Methods
Quiz
•
9th - 12th Grade