AAQ IT Unit 2 A2.1 System Vulnerabilities

AAQ IT Unit 2 A2.1 System Vulnerabilities

11th Grade

40 Qs

quiz-placeholder

Similar activities

KUIS TKJ KE-1

KUIS TKJ KE-1

1st Grade - University

40 Qs

IGCSE ICT 0417 SDLC / SLC Advanced

IGCSE ICT 0417 SDLC / SLC Advanced

8th - 12th Grade

37 Qs

Grade 6-Sistem Komputer

Grade 6-Sistem Komputer

6th Grade - University

40 Qs

98-368 Mobility and Devices Fundamentals Study Guide

98-368 Mobility and Devices Fundamentals Study Guide

9th - 12th Grade

40 Qs

PowerPoint  2016

PowerPoint 2016

7th Grade - University

40 Qs

Y9 Computing Test - Phase 1

Y9 Computing Test - Phase 1

8th - 11th Grade

40 Qs

SIMULASI DIGITAL - X

SIMULASI DIGITAL - X

KG - Professional Development

40 Qs

iMedia R093 Mix Up#2

iMedia R093 Mix Up#2

9th - 12th Grade

45 Qs

AAQ IT Unit 2 A2.1 System Vulnerabilities

AAQ IT Unit 2 A2.1 System Vulnerabilities

Assessment

Quiz

Computers

11th Grade

Practice Problem

Hard

Created by

Jen Reece

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: A vulnerability is a _______ in a system that can be exploited by cybercriminals, and used to gain unauthorised access.

weakness

advantage

protocol

update

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A port is a __________ point for network traffic. Ports can be physical (USB for example) or logical within software (port 80 allows HTTP traffic, for example).

connection

storage

display

power

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ is a common network vulnerability that occurs when software is not updated to the latest version.

Strong encryption

Multi-factor authentication


Outdated software


Regular backups

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ is a common network vulnerability that happens when security rules are not properly set up in a firewall.

Firewall misconfiguration

Phishing attack

SQL injection

Man-in-the-middle attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ are a common network vulnerability that can allow unauthorized access to a network.

Unsecured network access points

Encrypted passwords

Firewall rules

Strong authentication methods

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ and social engineering attacks are common network vulnerabilities that trick users into giving away sensitive information.

Spoofing

Phishing

Sniffing

Brute force

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: Lack of regular ________ is a common network vulnerability that can leave security gaps undetected.

user training

software updates

security audits

hardware upgrades

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?