Search Header Logo

Hazards, Threats, and Vulnerabilities

Authored by Graham Carmichael

Computers

Professional Development

Used 1+ times

Hazards, Threats, and Vulnerabilities
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Backdoors in a system typically allow:

Improved system performance

Unauthorized access

Faster network speeds

Enhanced encryption

Answer explanation

Backdoors in a system typically allow unauthorized access, not improved system performance, faster network speeds, or enhanced encryption.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Shellshock bug is an example of:

Backdoor

Obsolete software

Software flaw

Unpatched system

Answer explanation

The Shellshock bug is an example of a software flaw, as it is a vulnerability in the Bash shell that allows attackers to execute arbitrary commands.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk acceptance involves:

Eliminating risk activities

Accepting risk if mitigation costs exceed impact

Avoiding all risks

Mitigating every possible risk

Answer explanation

Risk acceptance involves accepting risk if mitigation costs exceed impact.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of damage can a flood cause to data centres?

Increased data transfer speed

Data loss and service outages

Improved data security

Enhanced network connectivity

Answer explanation

A flood can cause data loss and service outages in data centres, impacting the availability and integrity of stored information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk assessment evaluates identified risks to understand their:

Visual appeal

Market potential

Impact and likelihood

Marketing benefits

Answer explanation

Risk assessment evaluates identified risks to understand their impact and likelihood.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacktivists primarily engage in hacking to:

Steal financial data

Promote political agendas or social change

Sabotage infrastructure

Extort money

Answer explanation

Hacktivists primarily engage in hacking to promote political agendas or social change.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Classifying risks based on severity and impact is part of:

Reporting

Classification

Governance

Assurance

Answer explanation

Classifying risks based on severity and impact is part of Classification, as it involves categorizing risks according to their level of importance and potential consequences.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?