Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

2– CC317-Information Assurance and Security

Instructions: Kindly fill-up with necessary information in the space provided.

BS5AA
Section
Student’s Name UNDAP EPRIEL JEAN T.
(Last Name First Name Middle Initial) School Year 2020-2021
 1st Year
Degree Program Bachelor of Science in Computer Science Year Level  2nd Year
CC317  3rd Year
Course Code  4th Year
APPLICATION DEVELOPMENT AND EMERGING  1st Semester
Course Title Semester
TECHNOLOGIES  2nd Semester
Instructor/Professo Mr. Glenn Arwin Bristol
Week(s) Covered
r
DO NOT FORGET TO SAVE YOUR FILE AS :
<Lastname_CourseCode_Section_WeekNo_Semester_ACTIVITYNo.docx> Example: Delacruz_CC111_BS1MA_Week1_1stSem_ACT1.docx
* You may write below this line.

Instruction: You May Answer based on your understanding, do not copy paste on any browser

Choose The Correct Answer and Explain (5 points each )

1. Which of the following should you do to restrict access to your files and devices?
A. Update your software once a year.

B. Share passwords only with colleagues you trust.

C. Have your staff members access information via an open Wi-Fi network.

D. Use multi-factor authentication.

Explaination: Because sometimes the user used a weak passwords which the hackers might
easily hacked. When using a multi-factor authentication these compensates the user’s weak pin
password. The multi-factor auathentication is composed of something the only user knows.

2. Backing up important files offline, on an external hard drive or in the


cloud, will help protect your business in the event of a cyber attack. True or
False?
True

False

Explaination: Backing up import files not just for your business but also for an individual is a
great way of protecting your sensitive business and personal information from cyber criminals
or sometimes the human error; accidentally deleted and natural disasters and sometimes
robbery or fire.

3. Which is the best answer for which people in a business should be


responsible for cybersecurity?
A. Business owners. They run the business, so they need to know cybersecurity basics and put
them in practice to reduce the risk of cyber-attacks.

BSCS Department Page 1 of 2 /mlcds


2– CC317-Information Assurance and Security

B. IT specialists, because they are in the best position to know about and promote cybersecurity
within a business.

C. Managers, because they are responsible for making sure that staff members are following the
right practices

D. All staff members should know some cybersecurity basics to reduce the risk of cyber attacks.

Explanaination: In this digital era, half of the world’s population is using the internet cybersecurity is
important because it includes eveyrthing that concerns to protecting our sensitive datas and
informations. Cyber threats can occur from anywhere and cyber criminals can be anyone we must
educate ourselves about internet scams such as phishing.

4. Cyber criminals only target large companies. True or False?


True

False

Explaination: Cyber criminals tagets large companies so that they asked for a money in return
of the business’s vital informations.

 5. Which of the following is the best answer for how to secure your router?
A. Change the default name and password of the router.

B. Turn off the router’s remote management.

C. Log out as the administrator once the router is set up.

D. All of the above.

Explaination: Because if someone will hack and remotely accessed your device through your
administrator account they can easily access ALL the informations such as usernames and
passwords and can all the devices that is connected to your router.

RUBRICS FOR GRADING


PERCENTAGE
CRITERIA Excellent Good Average Poor
Development of Ideas 5 4 3 2
Evidence of Critical Thinking 5 4 3 2
Clarity 5 4 3 2

BSCS Department Page 2 of 2 /mlcds

You might also like