What was surprising about the 2012 vulnerability discussed in the video?
Why attackers can still exploit a MS Office vulnerability patched in 2012

Interactive Video
•
Architecture, Information Technology (IT)
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It was never patched by Microsoft.
It was a new vulnerability discovered in 2019.
It was still being exploited in 2019 despite being from 2012.
It only affected Office 365.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which library does the 2012 vulnerability exploit in older Office versions?
Microsoft Word Processing Library
Microsoft Excel Data Library
Microsoft Office Security Library
Microsoft Windows Common Control Library
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a major issue in patch management discussed in the video?
Patches are always applied immediately.
Patches are often skipped and not revisited.
Patches are only available for new software.
Patches are automatically applied without user consent.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the Click-to-Run platform designed to address?
Skipping problematic patches
Enhancing antivirus software
Automatic software upgrades
Improving user interface design
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should organizations do if they still have Office 2010 deployed?
Ignore older patches
Upgrade to Office 365 immediately
Review and apply all skipped updates
Disable all antivirus software
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key recommendation for end-user education?
Always open files from unknown sources
Disable all security warnings
Enable editing on all files immediately
Verify the source of files before opening
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What should users do when they receive a file from an unknown source?
Delete it without checking
Verify its origin before opening
Forward it to others
Open it immediately
Similar Resources on Quizizz
6 questions
How to monitor Windows to prevent credential theft attacks

Interactive video
•
University
8 questions
7 dumb ways to be a ransomware victim, and how to avoid the embarrassment

Interactive video
•
University
8 questions
CompTIA Security+ Certification SY0-601: The Total Course - Web App Vulnerability Scanning

Interactive video
•
University
8 questions
The four pillars of Windows network security

Interactive video
•
University
6 questions
New Cyber Attack Goes Global

Interactive video
•
University
6 questions
Semiconductor Industry Meltdown Exposes Security Vulnerabilities

Interactive video
•
University
8 questions
Microsoft changes its security update guide: What you need to know

Interactive video
•
University
6 questions
How to patch the Zerologon vulnerability in Windows Netlogon Remote Protocol

Interactive video
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade