Search Header Logo

Quiz Unit 3.1 System Hardening

Authored by Anthony DellaRosa

others

Used 1+ times

Quiz Unit 3.1 System Hardening
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Minimize the risk; lessening the force or intensity of something unpleasant.

Mitigate
Exploit
Application
Vulnerablity

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A security flaw, glitch, or weakness found in software code that could be exploited by an attacker is called a

Feature
Patch
Vulnerability
Service

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

The most important step to hardening a system is...

Create Backups
Turn on Firewall
Remove guest accounts
Update OS and applications

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is a famous vulnerability that we covered in class?

Bus Stop
Log4J
Java Melt
Exploit123

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

A database of known vulnerabilities in all types of digital products.

Google V-Data
CIA
CVE
MI6

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What does UAC stand for in a computer system?

Unauthorized Access Containment
Universal Abstract Containment
User Account Control
Useful Action Contract

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is an example of creating user account policies.

Update OS and applications
Setting a minimum number of characters in a password
Disabling Unnecessary Services
Covering the webcam

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?