ITF - Quiz 13.1 - Securing Devices

ITF - Quiz 13.1 - Securing Devices

Professional Development

12 Qs

quiz-placeholder

Similar activities

CyberSecurity

CyberSecurity

Professional Development

13 Qs

Type of Attack Indicators

Type of Attack Indicators

Professional Development

10 Qs

Port Scanning

Port Scanning

Professional Development

10 Qs

Network Security 2

Network Security 2

Professional Development

10 Qs

Enumeration

Enumeration

Professional Development

10 Qs

cyberops14

cyberops14

Professional Development

10 Qs

Week 2

Week 2

Professional Development

11 Qs

CCIE overview

CCIE overview

Professional Development

15 Qs

ITF - Quiz 13.1 - Securing Devices

ITF - Quiz 13.1 - Securing Devices

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Brock McKinley

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is device hardening?

A set of policies that make mobile and workstation computers and network appliances more secure

A type of malware that aims to damage a computer or steal information from it

A program that monitors user activity and sends the information to someone else

A type of malware that tries to extort money from the victim

2.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the purpose of anti-virus/anti-malware software?

To detect the presence of malware and prevent it from running

To insert virus code into another executable program or script

To affect Microsoft Office documents exploiting the macro programming language

To replicate over network resources by exploiting faults in software programs

3.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Why is it important to keep computers and other devices up-to-date with patches and firmware?

To prevent malware from exploiting vulnerabilities in the OS files, driver software, and firmware

To enable the use of an account without a password, PIN, or screen lock

To protect network devices from default/weak passwords

To test anti-virus software using the EICAR test string

4.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

Why should all computing devices be protected by requiring the user to input credentials to gain access?

To prevent the device from being highly exploitable in the event of theft

To allow other users to impersonate the user

To change the default management password of network devices

To detect the presence of malware and prevent it from running

5.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What should be done with default/weak passwords of network devices?

They should be changed on installation and replaced with strong passwords

They should be left unchanged to maintain compatibility with other devices

They should be used as they are provided by the device vendor

They should be tested using the EICAR test string

6.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

What is the purpose of the EICAR test string?

To test anti-virus software

To insert virus code into another executable program or script

To affect Microsoft Office documents exploiting the macro programming language

To replicate over network resources by exploiting faults in software programs

7.

MULTIPLE CHOICE QUESTION

1 min • 10 pts

How do email attachment viruses often use the infected host's electronic address book?

They spoof the sender's address when replicating

They delete files on the hard drive

They capture credit card numbers by recording key strokes

They display threatening messages and block access to the computer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?