14.11.2 - Understanding System Compromise and Security Measures

14.11.2 - Understanding System Compromise and Security Measures

10th Grade

15 Qs

quiz-placeholder

Similar activities

Cyber Camps 2018 -  Review Day 3 Windows

Cyber Camps 2018 - Review Day 3 Windows

7th - 12th Grade

17 Qs

1.4 Wired and Wireless Networks

1.4 Wired and Wireless Networks

10th - 11th Grade

13 Qs

File Ownership and Map Drives

File Ownership and Map Drives

10th Grade

15 Qs

IGCSE ICT quiz

IGCSE ICT quiz

9th - 10th Grade

15 Qs

BTEC DIT C3 LAA - Cloud Computing

BTEC DIT C3 LAA - Cloud Computing

10th - 11th Grade

10 Qs

ITE8 - Module 11 Part 3 Quiz

ITE8 - Module 11 Part 3 Quiz

10th Grade

15 Qs

Settings Pt.2

Settings Pt.2

9th - 12th Grade

15 Qs

Internet Basics

Internet Basics

10th Grade

15 Qs

14.11.2 - Understanding System Compromise and Security Measures

14.11.2 - Understanding System Compromise and Security Measures

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Brian Bass

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common symptom of a compromised system?

Improved system performance

Faster internet speeds

Tasks running in the background

Increased battery life

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do first when you detect an intrusion?

Install new software

Separate the device from the network

Restart the device

Ignore the issue

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which setting can an attacker change to redirect internet traffic?

Display settings

Sound settings

Proxy settings

Wallpaper settings

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can altered file permissions lead to?

Faster file access

Users being locked out of shared files

Improved file security

Increased storage space

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a sign of a software issue that may indicate a breach?

No added toolbars

Unresponsive websites

Fast load times

The browser opens to a familiar homepage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to disable the backup utility before running a virus scanner?

To speed up the scanning process

To prevent viruses from hiding in backup files

To save power

To avoid deleting important files

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be done after completing a virus removal process?

Disconnect from the internet permanently

Reinstall the operating system

Delete all user files

Re-initialize the backup software and complete a new backup

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?