Network Security - Preventing vulnerabilities - OCR CraignDave

Network Security - Preventing vulnerabilities - OCR CraignDave

10th Grade

10 Qs

quiz-placeholder

Similar activities

Password Safety & Security

Password Safety & Security

KG - Professional Development

11 Qs

Understanding the CIA Triad in Cybersecurity

Understanding the CIA Triad in Cybersecurity

10th Grade

15 Qs

Security Risks & Precautions

Security Risks & Precautions

10th - 12th Grade

8 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

2.2 Passwords

2.2 Passwords

9th - 10th Grade

10 Qs

Communication & Networking - Network Policies

Communication & Networking - Network Policies

3rd - 12th Grade

10 Qs

Internet and Networking Quiz

Internet and Networking Quiz

9th - 12th Grade

15 Qs

Digital Threats

Digital Threats

9th - 12th Grade

10 Qs

Network Security - Preventing vulnerabilities - OCR CraignDave

Network Security - Preventing vulnerabilities - OCR CraignDave

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Ms Baboolall

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following helps protect a system against malicious software (malware)?

Disabling operating system updates

Using firewalls and anti-malware tools, along with regular software updates

Opening email attachments from unknown sources

Storing backup copies on the same drive as original files

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which practice best helps protect users from phishing scams?

Relying on multiple internet browsers

Training individuals to identify suspicious emails and websites

Only using mobile devices for online communication

Browsing the internet in private/incognito mode

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can organizations limit the success of brute-force attacks?

Allowing unlimited login attempts for convenience

Implementing account lockout or timeout policies after repeated failed passwords

Disabling all password complexity requirements

Avoiding the use of CAPTCHAs on login forms

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is especially useful for minimizing damage caused by ransomware and other malware?

Installing multiple antivirus programs simultaneously

Regularly backing up files to secure, removable storage

Using only public Wi-Fi networks for sensitive data transfers

Ensuring all passwords are short but memorable

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following measures can help block large-scale traffic aimed at overwhelming a server (DoS attack)?

Ignoring the issue until traffic subsides

Using default network configurations provided by the operating system

Employing firewalls with packet filtering and monitoring incoming traffic

Turning off all website access during peak hours

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common technique for preventing hackers from injecting malicious code into database queries (SQL injection)?

Allowing direct database access for all employees

Using input validation and parameterized queries

Generating brute-force login attempts to test database performance

Providing default admin credentials to everyone

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method helps safeguard data from interception when transmitted or stored?

Relying on plain-text communication for simplicity

Avoiding the use of passwords altogether

Encrypting data so that only authorized parties can read it

Broadcasting all sensitive information publicly to ensure transparency

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?