Cybersecurity v1.1 Module 7
Quiz
This quiz covers the content of the videos presented in Cybersecurity
Module 7. This quiz is designed for practice. You will be allowed
multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some
task types, partial credit scoring is allowed to foster learning. Please note
that on tasks with multiple answers, points can be deducted
for selecting incorrect options.
Short answer or essay questions may appear on
some of the quizzes. These questions are designed for self-assessment and
reflection and are not scored. Sample answers are provided
for self-evaluation.
At the completion of the quiz, some items may display feedback. The
feedback will reference the source of the content. Example: Refer to
curriculum topic: 1.2.0 - indicates that the source of the material for this
task is in module 1, presentation 2.
Pregunta 1
What is one way to deter hackers from attacking medical devices?
|
Create a firewall within the device.
|
|
|
Do not allow the device to connect to the Internet.
|
|
Ensure that the device cannot be taken out of the hospital.
|
|
|
Use an electrical mechanism that provides an electrical shock to any
attacker.
|
Pregunta 2
Why do some medical devices not use WPA2 for wireless network security?
|
Manufacturers are afraid WPA2 will expose their devices to hackers.
|
|
|
Medical devices lack the memory and processing power required to use
WPA2.
|
|
Hospitals do not employ personnel who are qualified to implement WPA2.
|
|
|
Medical devices that use WPA2 can create long network delays.
|
Pregunta 3
What is cybernetics?
|
the use of technology to create films
|
|
|
the use of the Internet to send messages
|
|
the use of video techniques to create superheroes
|
|
|
the use of medical devices to augment the functions of the human body
|
Pregunta 4
What type of wireless protocols should be used by medical devices?
|
open-standard protocols, because they use strong security methods
|
|
|
proprietary protocols, because they are less likely to be understood and
targeted by hackers
|
|
high-speed wireless protocols, because high data throughput is required
by medical devices
|
|
TCP, because the SYN-ACK mechanism makes the protocol more secure than
other protocols
|
|
personal-area network (PAN) protocols, because medical devices use
sensors that are worn on the body
|
Pregunta 5
True or False?
A life saving, technologically advanced medical device could be hacked and become a weapon.
A life saving, technologically advanced medical device could be hacked and become a weapon.
|
true
|
|
|
false
|
Great!! Thanks
ResponderEliminarcanlı sex hattı
ResponderEliminarhttps://girisadresi.info/
heets
salt likit
salt likit
XİJ7