IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz 8 (01.09.2021)

Quiz 8 (01.09.2021)

1st - 12th Grade

10 Qs

Basic computer

Basic computer

9th - 12th Grade

8 Qs

Jaringan Komputer dan Internet

Jaringan Komputer dan Internet

9th - 12th Grade

10 Qs

1 Herramientas Digitales

1 Herramientas Digitales

6th Grade - University

10 Qs

Excel

Excel

1st - 12th Grade

8 Qs

Cyber Security Quiz

Cyber Security Quiz

12th Grade

10 Qs

Types of Mass Media

Types of Mass Media

10th Grade - Professional Development

11 Qs

Common Protocols

Common Protocols

10th - 12th Grade

15 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Ralph Ellis

Used 51+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential source(s) of network vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port number used for HTTP?

80

443

418

27

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of organisational vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of software vulnerabilities

Downloading software from untrustworthy sources

SQL injection

Zero-day vulnerabilities

Failing to enforce a password policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Continuing to use an older operating system, well after it is no longer being supported by the developer is an example of which type of vulnerability?

Operating system vulnerability

Software vulnerability

Network vulnerability

Organisational vulnerability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The largest vulnerability for mobile devices...

The time it takes for the original equipment manufacturer (OEM) to update that system software

Hackers accessing the mobile network signal.

Failure to support CSMA with RTS/CTS

Users' inability to secure their own deceives with passcodes.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of physical vulnerabilities

Downloading software from untrustworthy sources

Theft of equipment

Social engineering

Failing to enforce a password policy

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?