
Quiz Unit 3.1 System Hardening
Authored by Brian Hise
others
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Minimize the risk; lessening the force or intensity of something unpleasant.
Mitigate
Exploit
Application
Vulnerablity
2.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A security flaw, glitch, or weakness found in software code that could be exploited by an attacker is called a
Feature
Patch
Vulnerability
Service
3.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
The most important step to hardening a system is...
Create Backups
Turn on Firewall
Remove guest accounts
Update OS and applications
4.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Which of the following is a famous vulnerability that we covered in class?
Bus Stop
Log4J
Java Melt
Exploit123
5.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
A database of known vulnerabilities in all types of digital products.
Google V-Data
CIA
CVE
MI6
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What does UAC stand for in a computer system?
Unauthorized Access Containment
Universal Abstract Containment
User Account Control
Useful Action Contract
7.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
Which of the following is an example of creating user account policies.
Update OS and applications
Setting a minimum number of characters in a password
Disabling Unnecessary Services
Covering the webcam
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?