Introduction to Cybersecurity (CISCO)

IT6205A-2113T Introduction to Cybersecurity Introduction
(Chapter 3 Quiz)

 

Question text




Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?

Select one:
antispyware
two factor authentication
firewall
password manager

Feedback

Question text




A network administrator is conducting a training session to office staff on how to create a strong and effective password. Which password would most likely take the longest for a malicious user to guess or break?

Select one:
mk$$cittykat104#
drninjaphd
super3secret2password1
10characters

Feedback

Question text

What is the best method to prevent Bluetooth from being exploited?
Select one:
Always use a VPN when connecting with Bluetooth.
Always disable Bluetooth when it is not actively used.
Only use Bluetooth to connect to another smartphone or tablet.
Only use Bluetooth when connecting to a known SSID.

Feedback

Question text

Why do IoT devices pose a greater risk than other computing devices on a network?
Select one:
IoT devices cannot function on an isolated network with only an Internet connection.
IoT devices require unencrypted wireless connections.
Most IoT devices do not require an Internet connection and are unable to receive new updates.
Most IoT devices do not receive frequent firmware updates.

Feedback

Question text

A consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After successfully logging into the cloud account, the customer is automatically given access to the third party online printing service. What allowed this automatic authentication to occur?
Select one:
The user is on an unencrypted network and the password for the cloud storage service is viewable by the online printing service.
The password entered by the user for the online printing service is the same as the password used on the cloud storage service.
The cloud storage service is an approved application for the online printing service.
The account information for the cloud storage service was intercepted by a malicious application.

Feedback

Question text

A user is surfing the Internet using a laptop at a public WiFi cafe. What should be checked first when the user connects to the public network?
Select one:
if the laptop web browser is operating in private mode
if the laptop Bluetooth adapter is disabled
if the laptop requires user authentication for file and media sharing
if the laptop has a master password set to secure the passwords stored in the password manager

Feedback

Question text

Which technology removes direct equipment and maintenance costs from the user for data backups?
Select one:
an external hard drive
a tape
network attached storage
a cloud service

Feedback

Question text




How can a user prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hot spot?

Select one:
Use WPA2 encryption.
Connect with a VPN service.
Disable Bluetooth.
Create strong and unique passwords.

Feedback

Question text




Which configuration on a wireless router is not considered to be adequate security for a wireless network?

Select one:
prevent the broadcast of an SSID
implement WPA2 encryption
enabling wireless security
modify the default SSID and password of a wireless router

Feedback

Question text

How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?
Select one:
Use only an encrypted connection to access websites.
Operate the web browser in private browser mode.
Reboot the computer after closing the web browser.
Move any downloaded files to the recycle bin.

Feedback

Question text




A user is having difficulty remembering passwords for multiple online accounts. What is the best solution for the user to try?

Select one:
Save the passwords in a centralized password manager program.
Create a single strong password to be used across all online accounts.
Write the passwords down and place them out of sight.
Share the passwords with the network administrator or computer technician.

Feedback