
14.11.2 - Understanding System Compromise and Security Measures
Authored by Brian Bass
Computers
10th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common symptom of a compromised system?
Improved system performance
Faster internet speeds
Tasks running in the background
Increased battery life
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should you do first when you detect an intrusion?
Install new software
Separate the device from the network
Restart the device
Ignore the issue
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which setting can an attacker change to redirect internet traffic?
Display settings
Sound settings
Proxy settings
Wallpaper settings
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can altered file permissions lead to?
Faster file access
Users being locked out of shared files
Improved file security
Increased storage space
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a sign of a software issue that may indicate a breach?
No added toolbars
Unresponsive websites
Fast load times
The browser opens to a familiar homepage
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to disable the backup utility before running a virus scanner?
To speed up the scanning process
To prevent viruses from hiding in backup files
To save power
To avoid deleting important files
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should be done after completing a virus removal process?
Disconnect from the internet permanently
Reinstall the operating system
Delete all user files
Re-initialize the backup software and complete a new backup
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?