Module 3 Protecting your Data and Privacy Quiz Answer | CISCO

Module 3 Protecting your Data and Privacy Quiz Answer

Module 3 Protecting your Data and Privacy Quiz Answer CISCO

In this article, i am gone to Share CISCO Introduction to Cybersecurity. Module 3 Protecting your Data and Privacy Quiz Answer



Module-3 

Protecting your Data and Privacy


Question 1)

Why do IoT devices pose a greater security risk than other computing devices on a network?

  • Most IoT devices do not receive frequent software updates
  • IoT devices require unencrypted wireless connections
  • Most IoT devices do not require an Internet connection and are unable to receive new updates
  • IoT devices cannot function on an isolated network with only an Internet connection


Question 2)

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?

  • Antispyware
  • Two factor authentication
  • Password manager
  • Firewall


Question 3)

What should you do in order to make sure that people you live with do not have access to your secure data?

  • Increase the privacy settings on your browser
  • Turn on a firewall
  • Install antivirus software
  • Set up password protection


Question 4)

You are looking to print photos that you have saved on a cloud storage account using a third-party online printing service. After successfully logging into the cloud account, you are automatically given access to the third-party online printing service. What allowed this automatic authentication to occur?

  • The cloud storage service is an approved application for the online printing service
  • You are using an unencrypted network which allows the password for the cloud storage service to be viewed by the online printing service
  • Your account information for the cloud storage service was intercepted by a malicious application
  • The password you entered for the online printing service is the same as the password you use for the cloud storage service


Question 5)

How can you keep your personal browsing history hidden from other users on a shared computer?

  • Operate the web browser in private browser mode
  • Use only an encrypted connection to access websites
  • Reboot the computer after closing the web browser
  • Move any downloaded files to the recycle bin


Question 6)

Which of the following is an example of two factor authentication?

  • Your fingerprint and your password
  • Your answer to a general knowledge question and your password
  • Your password and your username
  • Your account number and your name


Question 7)

Which of the following passwords would most likely take the longest for an attacker to guess or break?

  • mk$$cittykat104#
  • drninjaphd
  • super3secret2password1
  • 10characters


Question 8)

Which of the following is a requirement of a strong password?

  • Use special characters such as ! @ or $
  • Use at least six characters
  • Use a dictionary word or a common statement that you’ll remember


Question 9)

How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?

  • Create unique and strong passwords
  • Connect with a VPN service
  • Disable Bluetooth
  • Use WPA2 encryption


Question 10)

Which configuration on a wireless router is not considered to be adequate security for a wireless network?

  • Modifying the default SSID and password of a wireless router
  • Implementing WPA2 encryption
  • Enabling wireless security
  • Preventing the broadcast of an SSID


Question 11)

Which technology removes direct equipment and maintenance costs from the user for data backups?

  • A cloud service
  • Network attached storage
  • An external hard drive
  • A tape


Question 12)

What is the only way of ensuring that deleted files on your computer are irrecoverable?

  • Emptying your computer’s recycle bin
  • Physically destroying your computer’s hard drive
  • Using a software program such as SDelete or Secure Empty Trash








Post a Comment

0 Comments