AAQ IT Unit 2 A2.1 System Vulnerabilities

AAQ IT Unit 2 A2.1 System Vulnerabilities

11th Grade

40 Qs

quiz-placeholder

Similar activities

Computer Essentials

Computer Essentials

9th - 12th Grade

35 Qs

G9 1st term test

G9 1st term test

6th - 12th Grade

41 Qs

ICT SPM : LA3 (Rangkaian Komputer)

ICT SPM : LA3 (Rangkaian Komputer)

10th - 12th Grade

42 Qs

Networking Essentials Quiz for Students

Networking Essentials Quiz for Students

11th Grade

35 Qs

LATIHAN SOAL AIJ KELAS XI TKJ

LATIHAN SOAL AIJ KELAS XI TKJ

11th Grade

41 Qs

IC3 GS6 Domain 1 Assessment

IC3 GS6 Domain 1 Assessment

6th - 12th Grade

37 Qs

MEMILIH PERANGKAT JARINGAN

MEMILIH PERANGKAT JARINGAN

11th Grade

40 Qs

Computer Terms

Computer Terms

6th - 12th Grade

37 Qs

AAQ IT Unit 2 A2.1 System Vulnerabilities

AAQ IT Unit 2 A2.1 System Vulnerabilities

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Jen Reece

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: A vulnerability is a _______ in a system that can be exploited by cybercriminals, and used to gain unauthorised access.

weakness

advantage

protocol

update

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A port is a __________ point for network traffic. Ports can be physical (USB for example) or logical within software (port 80 allows HTTP traffic, for example).

connection

storage

display

power

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ is a common network vulnerability that occurs when software is not updated to the latest version.

Strong encryption

Multi-factor authentication


Outdated software


Regular backups

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ is a common network vulnerability that happens when security rules are not properly set up in a firewall.

Firewall misconfiguration

Phishing attack

SQL injection

Man-in-the-middle attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ are a common network vulnerability that can allow unauthorized access to a network.

Unsecured network access points

Encrypted passwords

Firewall rules

Strong authentication methods

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: ________ and social engineering attacks are common network vulnerabilities that trick users into giving away sensitive information.

Spoofing

Phishing

Sniffing

Brute force

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fill in the blank: Lack of regular ________ is a common network vulnerability that can leave security gaps undetected.

user training

software updates

security audits

hardware upgrades

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers