jueves, 9 de junio de 2016

Cybersecurity v1.1 Module 7 Quiz



Cybersecurity v1.1 Module 7 Quiz


This quiz covers the content of the videos presented in Cybersecurity Module 7. This quiz is designed for practice. You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit scoring is allowed to foster learning. Please note that  on tasks with multiple answers, points can be deducted for selecting incorrect options.
Short answer or essay questions may appear on some of the quizzes. These questions are designed for self-assessment and reflection and are not scored. Sample answers are provided for self-evaluation.
At the completion of the quiz, some items may display feedback. The feedback will reference the source of the content. Example: Refer to curriculum topic: 1.2.0 - indicates that the source of the material for this task is in module 1, presentation 2.Principio del formulario
 
Pregunta 1   

What is one way to deter hackers from attacking medical devices?
Create a firewall within the device.
Do not allow the device to connect to the Internet.

Ensure that the device cannot be taken out of the hospital.
Use an electrical mechanism that provides an electrical shock to any attacker.


Pregunta 2   
Why do some medical devices not use WPA2 for wireless network security?
Manufacturers are afraid WPA2 will expose their devices to hackers.
Medical devices lack the memory and processing power required to use WPA2.

Hospitals do not employ personnel who are qualified to implement WPA2.
Medical devices that use WPA2 can create long network delays.


Pregunta 3   
What is cybernetics?
the use of technology to create films
the use of the Internet to send messages

the use of video techniques to create superheroes
the use of medical devices to augment the functions of the human body


Pregunta 4
What type of wireless protocols should be used by medical devices?
open-standard protocols, because they use strong security methods
proprietary protocols, because they are less likely to be understood and targeted by hackers

high-speed wireless protocols, because high data throughput is required by medical devices
TCP, because the SYN-ACK mechanism makes the protocol more secure than other protocols

personal-area network (PAN) protocols, because medical devices use sensors that are worn on the body


Pregunta 5   
True or False?
A life saving, technologically advanced medical device could be hacked and become a weapon.
true
false

2 comentarios: