
Hazards, Threats, and Vulnerabilities
Authored by Graham Carmichael
Computers
Professional Development
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Backdoors in a system typically allow:
Improved system performance
Unauthorized access
Faster network speeds
Enhanced encryption
Answer explanation
Backdoors in a system typically allow unauthorized access, not improved system performance, faster network speeds, or enhanced encryption.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Shellshock bug is an example of:
Backdoor
Obsolete software
Software flaw
Unpatched system
Answer explanation
The Shellshock bug is an example of a software flaw, as it is a vulnerability in the Bash shell that allows attackers to execute arbitrary commands.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Risk acceptance involves:
Eliminating risk activities
Accepting risk if mitigation costs exceed impact
Avoiding all risks
Mitigating every possible risk
Answer explanation
Risk acceptance involves accepting risk if mitigation costs exceed impact.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What kind of damage can a flood cause to data centres?
Increased data transfer speed
Data loss and service outages
Improved data security
Enhanced network connectivity
Answer explanation
A flood can cause data loss and service outages in data centres, impacting the availability and integrity of stored information.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Risk assessment evaluates identified risks to understand their:
Visual appeal
Market potential
Impact and likelihood
Marketing benefits
Answer explanation
Risk assessment evaluates identified risks to understand their impact and likelihood.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacktivists primarily engage in hacking to:
Steal financial data
Promote political agendas or social change
Sabotage infrastructure
Extort money
Answer explanation
Hacktivists primarily engage in hacking to promote political agendas or social change.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Classifying risks based on severity and impact is part of:
Reporting
Classification
Governance
Assurance
Answer explanation
Classifying risks based on severity and impact is part of Classification, as it involves categorizing risks according to their level of importance and potential consequences.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?