ITF - Quiz 13.1 - Securing Devices

Quiz
•
Computers
•
Professional Development
•
Hard
Brock McKinley
FREE Resource
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is device hardening?
A set of policies that make mobile and workstation computers and network appliances more secure
A type of malware that aims to damage a computer or steal information from it
A program that monitors user activity and sends the information to someone else
A type of malware that tries to extort money from the victim
2.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the purpose of anti-virus/anti-malware software?
To detect the presence of malware and prevent it from running
To insert virus code into another executable program or script
To affect Microsoft Office documents exploiting the macro programming language
To replicate over network resources by exploiting faults in software programs
3.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Why is it important to keep computers and other devices up-to-date with patches and firmware?
To prevent malware from exploiting vulnerabilities in the OS files, driver software, and firmware
To enable the use of an account without a password, PIN, or screen lock
To protect network devices from default/weak passwords
To test anti-virus software using the EICAR test string
4.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Why should all computing devices be protected by requiring the user to input credentials to gain access?
To prevent the device from being highly exploitable in the event of theft
To allow other users to impersonate the user
To change the default management password of network devices
To detect the presence of malware and prevent it from running
5.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What should be done with default/weak passwords of network devices?
They should be changed on installation and replaced with strong passwords
They should be left unchanged to maintain compatibility with other devices
They should be used as they are provided by the device vendor
They should be tested using the EICAR test string
6.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the purpose of the EICAR test string?
To test anti-virus software
To insert virus code into another executable program or script
To affect Microsoft Office documents exploiting the macro programming language
To replicate over network resources by exploiting faults in software programs
7.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
How do email attachment viruses often use the infected host's electronic address book?
They spoof the sender's address when replicating
They delete files on the hard drive
They capture credit card numbers by recording key strokes
They display threatening messages and block access to the computer
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
System Ethical Hacking

Quiz
•
Professional Development
13 questions
CyberSecurity

Quiz
•
Professional Development
10 questions
Type of Attack Indicators

Quiz
•
Professional Development
10 questions
Port Scanning

Quiz
•
Professional Development
12 questions
DST07 Day 1 quiz

Quiz
•
Professional Development
10 questions
Kuis 19122023

Quiz
•
Professional Development
10 questions
Enumeration

Quiz
•
Professional Development
15 questions
Digital Literacy - Pre Assesment

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade