Professional Documents
Culture Documents
2 - CC317-Information Assurance and Security: Choose The Correct Answer and Explain (5 Points Each)
2 - CC317-Information Assurance and Security: Choose The Correct Answer and Explain (5 Points Each)
BS5AA
Section
Student’s Name UNDAP EPRIEL JEAN T.
(Last Name First Name Middle Initial) School Year 2020-2021
1st Year
Degree Program Bachelor of Science in Computer Science Year Level 2nd Year
CC317 3rd Year
Course Code 4th Year
APPLICATION DEVELOPMENT AND EMERGING 1st Semester
Course Title Semester
TECHNOLOGIES 2nd Semester
Instructor/Professo Mr. Glenn Arwin Bristol
Week(s) Covered
r
DO NOT FORGET TO SAVE YOUR FILE AS :
<Lastname_CourseCode_Section_WeekNo_Semester_ACTIVITYNo.docx> Example: Delacruz_CC111_BS1MA_Week1_1stSem_ACT1.docx
* You may write below this line.
Instruction: You May Answer based on your understanding, do not copy paste on any browser
1. Which of the following should you do to restrict access to your files and devices?
A. Update your software once a year.
C. Have your staff members access information via an open Wi-Fi network.
Explaination: Because sometimes the user used a weak passwords which the hackers might
easily hacked. When using a multi-factor authentication these compensates the user’s weak pin
password. The multi-factor auathentication is composed of something the only user knows.
False
Explaination: Backing up import files not just for your business but also for an individual is a
great way of protecting your sensitive business and personal information from cyber criminals
or sometimes the human error; accidentally deleted and natural disasters and sometimes
robbery or fire.
B. IT specialists, because they are in the best position to know about and promote cybersecurity
within a business.
C. Managers, because they are responsible for making sure that staff members are following the
right practices
D. All staff members should know some cybersecurity basics to reduce the risk of cyber attacks.
Explanaination: In this digital era, half of the world’s population is using the internet cybersecurity is
important because it includes eveyrthing that concerns to protecting our sensitive datas and
informations. Cyber threats can occur from anywhere and cyber criminals can be anyone we must
educate ourselves about internet scams such as phishing.
False
Explaination: Cyber criminals tagets large companies so that they asked for a money in return
of the business’s vital informations.
5. Which of the following is the best answer for how to secure your router?
A. Change the default name and password of the router.
Explaination: Because if someone will hack and remotely accessed your device through your
administrator account they can easily access ALL the informations such as usernames and
passwords and can all the devices that is connected to your router.