Search Header Logo

Week 1

Authored by Subekshya Pradhan

Instructional Technology

University

Used 1+ times

Week 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The position of your computer and monitor:

Should be outward facing so other users can share your screen

Your computer position does not matter for security

Have little to do with security

Is important in order to reduce your attack surface

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your server room:

Should be left open during normal work hours for easy access

Should have keys/access codes given to everyone in the organization

Only be accessed by critical staff

Always be left unlocked for emergencies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Dumpster diving is:

An old outdated attack method

A legitimate threat if proper disposal procedures are not followed

Not possible if you do not have a dumpster

Only applies to paper goods (checks, balance sheets, etc.)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Firewalls

Are hardware-based appliances that will block malicious traffic

Can be hardware or software intrusion detection systems that run by a set of rules

Can be a hardware or software system that will filter traffic based on a set of rules

Are not part of most operating systems (Windows, Linux, OSX)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Application software

Is as important to keep up to date as your OS is

Is not necessary to remove unused programs as they will not impact the machine’s security

Is not necessary to keep up to date

Cannot be exploited

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Patching an operating system is

Not necessary for OSX since there are no real vulnerabilities for it

Not necessary for Linux

Must be manually installed

Always necessary for all OS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

USB attacks

Can be carried out by plugging a phone into a USB port

Can only be carried out with a USB drive

A USB cable cannot perform an attack over USB

Cannot be stopped with computer policies locking the USB ports or limiting the devices recognized

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology