
ITF - Quiz 13.1 - Securing Devices
Authored by Brock McKinley
Computers
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is device hardening?
A set of policies that make mobile and workstation computers and network appliances more secure
A type of malware that aims to damage a computer or steal information from it
A program that monitors user activity and sends the information to someone else
A type of malware that tries to extort money from the victim
2.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the purpose of anti-virus/anti-malware software?
To detect the presence of malware and prevent it from running
To insert virus code into another executable program or script
To affect Microsoft Office documents exploiting the macro programming language
To replicate over network resources by exploiting faults in software programs
3.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Why is it important to keep computers and other devices up-to-date with patches and firmware?
To prevent malware from exploiting vulnerabilities in the OS files, driver software, and firmware
To enable the use of an account without a password, PIN, or screen lock
To protect network devices from default/weak passwords
To test anti-virus software using the EICAR test string
4.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Why should all computing devices be protected by requiring the user to input credentials to gain access?
To prevent the device from being highly exploitable in the event of theft
To allow other users to impersonate the user
To change the default management password of network devices
To detect the presence of malware and prevent it from running
5.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What should be done with default/weak passwords of network devices?
They should be changed on installation and replaced with strong passwords
They should be left unchanged to maintain compatibility with other devices
They should be used as they are provided by the device vendor
They should be tested using the EICAR test string
6.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the purpose of the EICAR test string?
To test anti-virus software
To insert virus code into another executable program or script
To affect Microsoft Office documents exploiting the macro programming language
To replicate over network resources by exploiting faults in software programs
7.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
How do email attachment viruses often use the infected host's electronic address book?
They spoof the sender's address when replicating
They delete files on the hard drive
They capture credit card numbers by recording key strokes
They display threatening messages and block access to the computer
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?