Search Header Logo

ITF - Quiz 13.1 - Securing Devices

Authored by Brock McKinley

Computers

Professional Development

ITF - Quiz 13.1 - Securing Devices
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is device hardening?

A set of policies that make mobile and workstation computers and network appliances more secure

A type of malware that aims to damage a computer or steal information from it

A program that monitors user activity and sends the information to someone else

A type of malware that tries to extort money from the victim

2.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the purpose of anti-virus/anti-malware software?

To detect the presence of malware and prevent it from running

To insert virus code into another executable program or script

To affect Microsoft Office documents exploiting the macro programming language

To replicate over network resources by exploiting faults in software programs

3.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Why is it important to keep computers and other devices up-to-date with patches and firmware?

To prevent malware from exploiting vulnerabilities in the OS files, driver software, and firmware

To enable the use of an account without a password, PIN, or screen lock

To protect network devices from default/weak passwords

To test anti-virus software using the EICAR test string

4.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Why should all computing devices be protected by requiring the user to input credentials to gain access?

To prevent the device from being highly exploitable in the event of theft

To allow other users to impersonate the user

To change the default management password of network devices

To detect the presence of malware and prevent it from running

5.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What should be done with default/weak passwords of network devices?

They should be changed on installation and replaced with strong passwords

They should be left unchanged to maintain compatibility with other devices

They should be used as they are provided by the device vendor

They should be tested using the EICAR test string

6.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the purpose of the EICAR test string?

To test anti-virus software

To insert virus code into another executable program or script

To affect Microsoft Office documents exploiting the macro programming language

To replicate over network resources by exploiting faults in software programs

7.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

How do email attachment viruses often use the infected host's electronic address book?

They spoof the sender's address when replicating

They delete files on the hard drive

They capture credit card numbers by recording key strokes

They display threatening messages and block access to the computer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?