Professional Documents
Culture Documents
PC2.5: Exam - Chapter 3 Online Exam: Attempt Review
PC2.5: Exam - Chapter 3 Online Exam: Attempt Review
PC2.5: Exam - Chapter 3 Online Exam: Attempt Review
Home / I'm Learning / Security Intelligence and Digital Forensics / Chapter 3: Protecting Your Data and Privacy / PC2.5: Exam – Chapter 3 online exam
!
Course Security Intelligence and Digital Forensics
Home
$ Question 1 How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this
Calendar Correct computer?
Question 2 Which technology removes direct equipment and maintenance costs from the user for data backups?
Correct
Select one:
Mark 2.00 out of
a cloud service !
2.00
a tape
Question 3 A consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After
Incorrect successfully logging into the cloud account, the customer is automatically given access to the third party online printing service.
What allowed this automatic authentication to occur?
Mark 0.00 out of
2.00
Select one:
The cloud storage service is an approved application for the online printing service.
The password entered by the user for the online printing service is the same as the password used on the cloud storage "
service.
The account information for the cloud storage service was intercepted by a malicious application.
The user is on an unencrypted network and the password for the cloud storage service is viewable by the online printing
service.
By continuing to use our website, you acknowledge the use of
cookies. Privacy Statement | Change
Refer to Settings
curriculum topic: 3.2.1
Open Authorization is an open standard protocol that allows end users to access third party applications without exposing the user
password.
https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 1 of 5
PC2.5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM
The correct answer is: The cloud storage service is an approved application for the online printing service.
Question 4 What is the best method to prevent Bluetooth from being exploited?
Correct
Select one:
Mark 2.00 out of
2.00 Only use Bluetooth when connecting to a known SSID.
Question 5
Correct
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?
Select one:
data encryption !
Question 6
Correct
https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 2 of 5
PC2.5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM
A user is having difficulty remembering passwords for multiple online accounts. What is the best solution for the user to try?
Select one:
Write the passwords down and place them out of sight.
Question 7 Why do IoT devices pose a greater risk than other computing devices on a network?
Correct
Select one:
Mark 2.00 out of
2.00 IoT devices require unencrypted wireless connections.
IoT devices cannot function on an isolated network with only an Internet connection.
Most IoT devices do not require an Internet connection and are unable to receive new updates.
Question 8
Correct
A network administrator is conducting a training session to office staff on how to create a strong and effective password. Which
password would most likely take the longest for a malicious user to guess or break?
Select one:
mk$$cittykat104# !
super3secret2password1
drninjaphd
10characters
https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 3 of 5
PC2.5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM
Question 9
Correct
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and
producing unwanted pop-up ads on a user computer?
Select one:
two factor authentication
antispyware !
password manager
firewall
Question 10 A user is surfing the Internet using a laptop at a public WiFi cafe. What should be checked first when the user connects to the
Correct public network?
if the laptop has a master password set to secure the passwords stored in the password manager
if the laptop requires user authentication for file and media sharing !
Question 11
Correct
https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 4 of 5
PC2.5: Exam – Chapter 3 online exam: Attempt review 03/06/2022, 4:57 PM
Which configuration on a wireless router is not considered to be adequate security for a wireless network?
Select one:
implement WPA2 encryption
Question 12
Correct
How can a user prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hot spot?
Select one:
Use WPA2 encryption.
Disable Bluetooth.
NetAcad, a Cisco Corporate Social Responsibility program, is an IT skills and career building program available to learning institutions and individuals worldwide.
Terms and Conditions Privacy Statement Cookie Policy Data Protection Trademarks Data Protection Accessibility
https://lms.netacad.com/mod/quiz/review.php?attempt=35898983&cmid=47217872 Page 5 of 5