SHI C1.1

SHI C1.1

2nd Grade

30 Qs

quiz-placeholder

Similar activities

АКТ 10 тест

АКТ 10 тест

1st Grade - University

25 Qs

QUIZZ KJD - KOMPUTER DASAR

QUIZZ KJD - KOMPUTER DASAR

KG - Professional Development

25 Qs

TMK

TMK

1st - 6th Grade

25 Qs

Moc 1

Moc 1

1st - 4th Grade

31 Qs

Mock 3

Mock 3

KG - 2nd Grade

28 Qs

EVOLUTION OF COMPUTER-YEAR 6

EVOLUTION OF COMPUTER-YEAR 6

1st - 5th Grade

26 Qs

EMPOWERMENT TECHNOLOGY

EMPOWERMENT TECHNOLOGY

KG - University

25 Qs

RNV/YEAR 2/WEEK 9/3RD TERM

RNV/YEAR 2/WEEK 9/3RD TERM

1st - 3rd Grade

30 Qs

SHI C1.1

SHI C1.1

Assessment

Quiz

Other

2nd Grade

Easy

Created by

Jack Neo

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of User Account Control (UAC) in Windows?

To enhance graphical user interface

To prevent unauthorized changes to the operating system

To manage network connections

To optimize system performance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common type of cyber attack?

Network scanner

Trojan horse

Social engineering

Data compression

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default rule for outgoing traffic in Windows Firewall?

Block all outgoing

Allow all outgoing

Allow only HTTP/S traffic

Block all except email traffic

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a key security principle aimed at reducing an attacker's chance of success?

Defense-in-Depth

Open Access

Maximum Privilege

Single Layer Protection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a primary function of the Windows Defender Firewall with Advanced Security?

To encrypt data files

To control types of network traffic allowed in and out of the system

To manage user accounts

To provide cloud storage solutions

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes a Denial of Service (DoS) attack?

A physical attack on a server hardware

Bombarding a system with traffic to prevent legitimate access

A targeted attack on a specific user's credentials

Encrypting data for ransom

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is NOT recommended for server hardening?

Close unneeded ports

Install all available software

Use Anti-malware software

Keep security patches up to date

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?