
Network Security - Preventing vulnerabilities - OCR CraignDave
Authored by Ms Baboolall
Computers
10th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following helps protect a system against malicious software (malware)?
Disabling operating system updates
Using firewalls and anti-malware tools, along with regular software updates
Opening email attachments from unknown sources
Storing backup copies on the same drive as original files
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which practice best helps protect users from phishing scams?
Relying on multiple internet browsers
Training individuals to identify suspicious emails and websites
Only using mobile devices for online communication
Browsing the internet in private/incognito mode
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can organizations limit the success of brute-force attacks?
Allowing unlimited login attempts for convenience
Implementing account lockout or timeout policies after repeated failed passwords
Disabling all password complexity requirements
Avoiding the use of CAPTCHAs on login forms
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method is especially useful for minimizing damage caused by ransomware and other malware?
Installing multiple antivirus programs simultaneously
Regularly backing up files to secure, removable storage
Using only public Wi-Fi networks for sensitive data transfers
Ensuring all passwords are short but memorable
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following measures can help block large-scale traffic aimed at overwhelming a server (DoS attack)?
Ignoring the issue until traffic subsides
Using default network configurations provided by the operating system
Employing firewalls with packet filtering and monitoring incoming traffic
Turning off all website access during peak hours
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common technique for preventing hackers from injecting malicious code into database queries (SQL injection)?
Allowing direct database access for all employees
Using input validation and parameterized queries
Generating brute-force login attempts to test database performance
Providing default admin credentials to everyone
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which method helps safeguard data from interception when transmitted or stored?
Relying on plain-text communication for simplicity
Avoiding the use of passwords altogether
Encrypting data so that only authorized parties can read it
Broadcasting all sensitive information publicly to ensure transparency
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Google Docs - Tables
Quiz
•
9th - 10th Grade
12 questions
J808 LO4.4 Preventative Measures (Logical)
Quiz
•
10th - 11th Grade
10 questions
STM BTEC DIT 3- 5. Maintenance, set-up, performance p152
Quiz
•
9th - 11th Grade
11 questions
Test Plan to build a PC
Quiz
•
10th - 12th Grade
10 questions
Asesmen Diagnostik - Analissis Data
Quiz
•
10th Grade
10 questions
Staying Safe on the Internet
Quiz
•
10th - 12th Grade
15 questions
Programming and Debugging
Quiz
•
10th Grade
14 questions
Remidi PTS SM Genap Informatika
Quiz
•
10th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade