SHI C1.1

SHI C1.1

2nd Grade

•

30 Qs

quiz-placeholder

Similar activities

Introduction

Introduction

1st - 5th Grade

•

25 Qs

Inside the factory - Biscuits

Inside the factory - Biscuits

1st Grade - University

•

25 Qs

Evaluasi Akhir Maths

Evaluasi Akhir Maths

2nd Grade

•

25 Qs

Chapter 10 Vocabulary Quiz

Chapter 10 Vocabulary Quiz

KG - University

•

25 Qs

Telling Time

Telling Time

1st - 3rd Grade

•

25 Qs

Music 2 Q1

Music 2 Q1

1st - 2nd Grade

•

25 Qs

Ultimate office trivia quiz

Ultimate office trivia quiz

KG - Professional Development

•

25 Qs

unit4 therapeutic communication

unit4 therapeutic communication

1st - 10th Grade

•

25 Qs

SHI C1.1

SHI C1.1

Assessment

Quiz

•

Other

•

2nd Grade

•

Practice Problem

•

Easy

Created by

Jack Neo

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of User Account Control (UAC) in Windows?

To enhance graphical user interface

To prevent unauthorized changes to the operating system

To manage network connections

To optimize system performance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of cyber attack?

Network scanner

Trojan horse

Social engineering

Data compression

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default rule for outgoing traffic in Windows Firewall?

Block all outgoing

Allow all outgoing

Allow only HTTP/S traffic

Block all except email traffic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a key security principle aimed at reducing an attacker's chance of success?

Defense-in-Depth

Open Access

Maximum Privilege

Single Layer Protection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary function of the Windows Defender Firewall with Advanced Security?

To encrypt data files

To control types of network traffic allowed in and out of the system

To manage user accounts

To provide cloud storage solutions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a Denial of Service (DoS) attack?

A physical attack on a server hardware

Bombarding a system with traffic to prevent legitimate access

A targeted attack on a specific user's credentials

Encrypting data for ransom

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is NOT recommended for server hardening?

Close unneeded ports

Install all available software

Use Anti-malware software

Keep security patches up to date

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?