What is device hardening?
ITF - Quiz 13.1 - Securing Devices

Quiz
•
Computers
•
Professional Development
•
Hard
Brock McKinley
FREE Resource
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
A set of policies that make mobile and workstation computers and network appliances more secure
A type of malware that aims to damage a computer or steal information from it
A program that monitors user activity and sends the information to someone else
A type of malware that tries to extort money from the victim
2.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the purpose of anti-virus/anti-malware software?
To detect the presence of malware and prevent it from running
To insert virus code into another executable program or script
To affect Microsoft Office documents exploiting the macro programming language
To replicate over network resources by exploiting faults in software programs
3.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Why is it important to keep computers and other devices up-to-date with patches and firmware?
To prevent malware from exploiting vulnerabilities in the OS files, driver software, and firmware
To enable the use of an account without a password, PIN, or screen lock
To protect network devices from default/weak passwords
To test anti-virus software using the EICAR test string
4.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Why should all computing devices be protected by requiring the user to input credentials to gain access?
To prevent the device from being highly exploitable in the event of theft
To allow other users to impersonate the user
To change the default management password of network devices
To detect the presence of malware and prevent it from running
5.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What should be done with default/weak passwords of network devices?
They should be changed on installation and replaced with strong passwords
They should be left unchanged to maintain compatibility with other devices
They should be used as they are provided by the device vendor
They should be tested using the EICAR test string
6.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the purpose of the EICAR test string?
To test anti-virus software
To insert virus code into another executable program or script
To affect Microsoft Office documents exploiting the macro programming language
To replicate over network resources by exploiting faults in software programs
7.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
How do email attachment viruses often use the infected host's electronic address book?
They spoof the sender's address when replicating
They delete files on the hard drive
They capture credit card numbers by recording key strokes
They display threatening messages and block access to the computer
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Scanning Networks

Quiz
•
Professional Development
14 questions
cyber security

Quiz
•
KG - Professional Dev...
14 questions
ITF - Quiz 13.2 - Preventing Malware Infections

Quiz
•
Professional Development
10 questions
System Ethical Hacking

Quiz
•
Professional Development
10 questions
Cybersecurity

Quiz
•
Professional Development
10 questions
Identifying Malware

Quiz
•
Professional Development
13 questions
CyberSecurity

Quiz
•
Professional Development
15 questions
Digital Literacy - Pre Assesment

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade