Search Header Logo

Network Security - Preventing vulnerabilities - OCR CraignDave

Authored by Ms Baboolall

Computers

10th Grade

Used 2+ times

Network Security - Preventing vulnerabilities - OCR CraignDave
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following helps protect a system against malicious software (malware)?

Disabling operating system updates

Using firewalls and anti-malware tools, along with regular software updates

Opening email attachments from unknown sources

Storing backup copies on the same drive as original files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which practice best helps protect users from phishing scams?

Relying on multiple internet browsers

Training individuals to identify suspicious emails and websites

Only using mobile devices for online communication

Browsing the internet in private/incognito mode

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can organizations limit the success of brute-force attacks?

Allowing unlimited login attempts for convenience

Implementing account lockout or timeout policies after repeated failed passwords

Disabling all password complexity requirements

Avoiding the use of CAPTCHAs on login forms

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is especially useful for minimizing damage caused by ransomware and other malware?

Installing multiple antivirus programs simultaneously

Regularly backing up files to secure, removable storage

Using only public Wi-Fi networks for sensitive data transfers

Ensuring all passwords are short but memorable

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following measures can help block large-scale traffic aimed at overwhelming a server (DoS attack)?

Ignoring the issue until traffic subsides

Using default network configurations provided by the operating system

Employing firewalls with packet filtering and monitoring incoming traffic

Turning off all website access during peak hours

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common technique for preventing hackers from injecting malicious code into database queries (SQL injection)?

Allowing direct database access for all employees

Using input validation and parameterized queries

Generating brute-force login attempts to test database performance

Providing default admin credentials to everyone

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method helps safeguard data from interception when transmitted or stored?

Relying on plain-text communication for simplicity

Avoiding the use of passwords altogether

Encrypting data so that only authorized parties can read it

Broadcasting all sensitive information publicly to ensure transparency

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?