Unit 3 System Hardening Quiz

Unit 3 System Hardening Quiz

10th Grade

15 Qs

quiz-placeholder

Similar activities

Unit 1 Teach Cyber Cybersecurity Test Review

Unit 1 Teach Cyber Cybersecurity Test Review

10th Grade

15 Qs

BTEC DIT C3 LAB - Device Hardening & Encryption

BTEC DIT C3 LAB - Device Hardening & Encryption

10th - 11th Grade

10 Qs

OCR J277 - 1.4 - Network Security - Knowledge Check

OCR J277 - 1.4 - Network Security - Knowledge Check

10th Grade

20 Qs

OCR J277 1. 4 - Network Security and Threats Quiz

OCR J277 1. 4 - Network Security and Threats Quiz

10th Grade

20 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

J277 1.4 Network Security Quiz (Threats)

J277 1.4 Network Security Quiz (Threats)

9th - 12th Grade

13 Qs

Cybersecurity Threats and Prevention Quiz

Cybersecurity Threats and Prevention Quiz

9th Grade - University

20 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Unit 3 System Hardening Quiz

Unit 3 System Hardening Quiz

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Richard A Sarhanis

Used 20+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of a vulnerability assessment?

To identify and mitigate vulnerabilities in a system

To analyze the security of digital products

To reduce the attack surface of a system

To harden a system against cyber attacks

2.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

William, a cybersecurity student, is working on a project to analyze vulnerability data. He needs to use a database that is commonly used as an industry repository of vulnerability data. Which database should he use?

Common Vulnerability and Exposure (CVE) database

National Vulnerability Database (NVD)

Microsoft Baseline Security Analyzer (MBSA)

Cybersecurity & Infrastructure Security Agency (CISA)

3.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of system hardening?

To secure user access and backups

To identify and mitigate vulnerabilities

To analyze the security of digital products

To reduce the attack surface of a system

4.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Noah, Nora, and Maya are working together to harden the security of their school's computer system. Which of the following actions, if taken by them, would NOT be a step towards hardening the system?

Performing regular software updates on all the computers

Restricting user access based on the least privilege principle

Backing up important data regularly

Keeping third-party applications up to date

5.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

What is the purpose of user access control (UAC) settings?

To restrict user actions and limit vulnerabilities

To secure user access and backups

To analyze the security of digital products

To reduce the attack surface of a system

6.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Abigail received an email warning about the increasing threat of ransomware and data loss. She wants to know, what is the first level of defense she should consider?

Creating system images of her computer

Using sync services like Dropbox or Google Drive

Performing regular software updates

Maintaining regular backups of her data

7.

MULTIPLE CHOICE QUESTION

10 mins • 1 pt

Charlotte, Anika, and Mason are part of the IT team in a company. They are discussing the best practices for securing user access. Which of the following practices mentioned by them is NOT recommended?

Severely restrict administrative rights

Implement strong password policies

Grant unlimited access to all users

Follow the least privilege principle

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?