PC2.5: Exam - Chapter 3 Online Exam: Attempt Review

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

PC2.

5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM

Home / I'm Learning / Security Intelligence and Digital Forensics / Chapter 3: Protecting Your Data and Privacy / PC2.5: Exam – Chapter 3 online exam

!
Course Security Intelligence and Digital Forensics
Home

Started on Wednesday, 1 June 2022, 2:32 PM


" State Finished
Grades
Completed on Wednesday, 1 June 2022, 2:40 PM
Time taken 8 mins 10 secs
# Marks 22.00/24.00
Messages
Grade 91.67 out of 100.00

$ Question 1 How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this
Calendar Correct computer?

Mark 2.00 out of


Select one:
2.00
Operate the web browser in private browser mode. !

Move any downloaded files to the recycle bin.

Reboot the computer after closing the web browser.

Use only an encrypted connection to access websites.

Refer to curriculum topic: 3.2.2


When a computer user browses the web in private mode, the following occurs:
Cookies are disabled.
Temporary Internet files are removed after closing the window.
Browsing history is removed after closing the window.
The correct answer is: Operate the web browser in private browser mode.

Question 2 Which technology removes direct equipment and maintenance costs from the user for data backups?
Correct
Select one:
Mark 2.00 out of
a cloud service !
2.00

a tape

network attached storage

an external hard drive

Refer to curriculum topic: 3.1.2


The cost of cloud storage commonly depends on the amount of storage space needed. The cloud provider will maintain the
equipment and the cloud user will have access to the backup data.
The correct answer is: a cloud service

Question 3 A consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After
Incorrect successfully logging into the cloud account, the customer is automatically given access to the third party online printing service.
What allowed this automatic authentication to occur?
Mark 0.00 out of
2.00
Select one:
The cloud storage service is an approved application for the online printing service.

The password entered by the user for the online printing service is the same as the password used on the cloud storage "
service.

The account information for the cloud storage service was intercepted by a malicious application.

The user is on an unencrypted network and the password for the cloud storage service is viewable by the online printing
service.
By continuing to use our website, you acknowledge the use of
cookies. Privacy Statement | Change
Refer to Settings
curriculum topic: 3.2.1
Open Authorization is an open standard protocol that allows end users to access third party applications without exposing the user
password.

https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 1 of 5
PC2.5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM

The correct answer is: The cloud storage service is an approved application for the online printing service.

Question 4 What is the best method to prevent Bluetooth from being exploited?
Correct
Select one:
Mark 2.00 out of
2.00 Only use Bluetooth when connecting to a known SSID.

Always disable Bluetooth when it is not actively used. !

Only use Bluetooth to connect to another smartphone or tablet.

Always use a VPN when connecting with Bluetooth.

Refer to curriculum topic: 3.1.1


Bluetooth is a wireless technology that can be exploited by hackers to eavesdrop, establish remote access controls, and distribute
malware. A user should keep Bluetooth turned off when not in use.
The correct answer is: Always disable Bluetooth when it is not actively used.

Question 5

Correct

Mark 2.00 out of


2.00

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

Select one:
data encryption !

a duplicate hard drive copy

deletion of sensitive files

two factor authentication

Refer to curriculum topic: 3.1.2


Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or
password can decrypt the data and access the original form.
The correct answer is: data encryption

Question 6

Correct

Mark 2.00 out of


2.00

https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 2 of 5
PC2.5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM

A user is having difficulty remembering passwords for multiple online accounts. What is the best solution for the user to try?

Select one:
Write the passwords down and place them out of sight.

Create a single strong password to be used across all online accounts.

Save the passwords in a centralized password manager program. !

Share the passwords with the network administrator or computer technician.

Refer to curriculum topic: 3.1.1


A password manager can be used to store and encrypt multiple passwords. A master password can be implemented to protect the
password manager software.
The correct answer is: Save the passwords in a centralized password manager program.

Question 7 Why do IoT devices pose a greater risk than other computing devices on a network?
Correct
Select one:
Mark 2.00 out of
2.00 IoT devices require unencrypted wireless connections.

IoT devices cannot function on an isolated network with only an Internet connection.

Most IoT devices do not require an Internet connection and are unable to receive new updates.

Most IoT devices do not receive frequent firmware updates. !

Refer to curriculum topic: 3.1.1


IoT devices commonly operate using their original firmware and do not receive updates as frequently as laptops, desktops, and
mobile platforms.
The correct answer is: Most IoT devices do not receive frequent firmware updates.

Question 8

Correct

Mark 2.00 out of


2.00

A network administrator is conducting a training session to office staff on how to create a strong and effective password. Which
password would most likely take the longest for a malicious user to guess or break?

Select one:
mk$$cittykat104# !

super3secret2password1

drninjaphd

10characters

Refer to curriculum topic: 3.1.1


When choosing a good password:
Do not use dictionary words or names in any languages.
Do not use common misspellings of dictionary words.
Do not use computer names or account names.
If possible use special characters, such as ! @ # $ % ^ & * ( ).
Use a ten character password or more.
The correct answer is: mk$$cittykat104#

https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 3 of 5
PC2.5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM

Question 9

Correct

Mark 2.00 out of


2.00

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and
producing unwanted pop-up ads on a user computer?

Select one:
two factor authentication

antispyware !

password manager

firewall

Refer to curriculum topic: 3.1.1


Antispyware software is commonly installed on a user machine to scan and remove malicious spyware software installed on a
device.
The correct answer is: antispyware

Question 10 A user is surfing the Internet using a laptop at a public WiFi cafe. What should be checked first when the user connects to the
Correct public network?

Mark 2.00 out of


Select one:
2.00
if the laptop web browser is operating in private mode

if the laptop has a master password set to secure the passwords stored in the password manager

if the laptop Bluetooth adapter is disabled

if the laptop requires user authentication for file and media sharing !

Refer to curriculum topic: 3.1.1


When a user connects to a public network, it is important to know if the computer is configured with file and media sharing and that
it requires user authentication with encryption.
The correct answer is: if the laptop requires user authentication for file and media sharing

Question 11

Correct

Mark 2.00 out of


2.00

https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 4 of 5
PC2.5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM

Which configuration on a wireless router is not considered to be adequate security for a wireless network?

Select one:
implement WPA2 encryption

modify the default SSID and password of a wireless router

prevent the broadcast of an SSID !

enabling wireless security

Refer to curriculum topic: 3.1.1


A wireless router can be configured to not allow the SSID to be broadcast, but that configuration is not considered to be adequate
security for a wireless network
The correct answer is: prevent the broadcast of an SSID

Question 12

Correct

Mark 2.00 out of


2.00

How can a user prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hot spot?

Select one:
Use WPA2 encryption.

Disable Bluetooth.

Connect with a VPN service. !

Create strong and unique passwords.

Refer to curriculum topic: 3.1.1


When a user connects through an encrypted VPN tunnel on a public Wi-Fi network, any data being sent or received from the user
will be undecipherable.
The correct answer is: Connect with a VPN service.

◀ Chapter 3: Terms and Concepts


Jump to... Individual Activity: (5mins) ▶︎
Practice

NetAcad, a Cisco Corporate Social Responsibility program, is an IT skills and career building program available to learning institutions and individuals worldwide.

Terms and Conditions Privacy Statement Cookie Policy Data Protection Trademarks Data Protection Accessibility

https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 5 of 5

You might also like