0% found this document useful (0 votes)
102 views

Chapter 3 Quiz - Introduction To Cybersecurity 0420

This quiz covers content from Chapter 3 of an Introduction to Cybersecurity course. It contains 12 multiple choice questions to test knowledge of topics like password management, wireless security, cloud backups, IoT risks, private browsing, and single sign-on authentication. The quiz allows unlimited attempts and partial credit to foster learning, with a maximum score of 24 points.

Uploaded by

Egy Renata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views

Chapter 3 Quiz - Introduction To Cybersecurity 0420

This quiz covers content from Chapter 3 of an Introduction to Cybersecurity course. It contains 12 multiple choice questions to test knowledge of topics like password management, wireless security, cloud backups, IoT risks, private browsing, and single sign-on authentication. The quiz allows unlimited attempts and partial credit to foster learning, with a maximum score of 24 points.

Uploaded by

Egy Renata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

Chapter 3 Quiz
Due No due date Points 24 Questions 12 Time Limit None
Allowed Attempts Unlimited

Instructions
This quiz covers the content in Introduction to Cybersecurity 2.1 Chapter 3 . It is designed to provide
an additional opportunity to practice the skills and knowledge presented in the chapter and to prepare for
the Chapter Exam. You will be allowed multiple attempts and the grade does not appear in the
gradebook.

NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes
can also be deducted for answering incorrectly.

Form 35480

Take the Quiz Again

Attempt History
Attempt Time Score
LATEST Attempt 1 7 minutes 24 out of 24

Submitted May 8 at 6:07am

Question 1 2 / 2 pts

A user is having difficulty remembering passwords for multiple online


accounts. What is the best solution for the user to try?
https://373583482 .netacad.com/courses/1014521/quizzes/9036276 1/10
5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

Correct - • Save the passwords in a centralized password manager program.

Share the passwords with the network administrator or computer


technician.

Create a single strong password to be used across all online accounts.

Write the passwords down and place them out of sight.

y\

Refer to curriculum topic: 3.1.1


A password manager can be used to store and encrypt multiple
passwords. A master password can be implemented to protect the
password manager software.

Question 2 2 / 2 pts

Which type of technology can prevent malicious software from monitoring


user activities , collecting personal information, and producing unwanted
pop-up ads on a user computer?

firewall

two factor authentication

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 2/10


5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

Correct -
• antispyware

password manager

/\

Refer to curriculum topic: 3.1.1


Antispyware software is commonly installed on a user machine to
scan and remove malicious spyware software installed on a
device.

Question 3 2 / 2 pts

Which configuration on a wireless router is not considered to be adequate


security for a wireless network ?

enabling wireless security

modify the default SSID and password of a wireless router

implement WPA2 encryption

Correct • prevent the broadcast of an SSID

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 3/10


5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

Refer to curriculum topic: 3.1.1


A wireless router can be configured to not allow the SSID to be
broadcast , but that configuration is not considered to be adequate
security for a wireless network

Question 4 2 / 2 pts

A network administrator is conducting a training session to office staff on


how to create a strong and effective password. Which password would
most likely take the longest for a malicious user to guess or break?

drninjaphd

10characters

super3secret 2password1

Correct '

mk $$cittykat104#

Refer to curriculum topic: 3.1.1


When choosing a good password:

• Do not use dictionary words or names in any languages.


• Do not use common misspellings of dictionary words.
• Do not use computer names or account names.
• If possible use special characters, such as ! @ # $ % A & * ( ).
• Use a ten character password or more.

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 4/10


5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

Question 5 2 / 2 pts

Which technology removes direct equipment and maintenance costs from


the user for data backups?

network attached storage

a tape

an external hard drive

Correct - a cloud service

Refer to curriculum topic: 3.1.2


The cost of cloud storage commonly depends on the amount of
storage space needed. The cloud provider will maintain the
equipment and the cloud user will have access to the backup data.

Question 6 2 / 2 pts

Why do loT devices pose a greater risk than other computing devices on
a network?

loT devices require unencrypted wireless connections.

Most loT devices do not require an Internet connection and are unable to
receive new updates.

loT devices cannot function on an isolated network with only an Internet


connection.

Correct -
• Most loT devices do not receive frequent firmware updates.

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 5/10


5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

Refer to curriculum topic: 3.1.1


loT devices commonly operate using their original firmware and do
not receive updates as frequently as laptops, desktops , and mobile
platforms.

Question 7 2 / 2 pts

How can users working on a shared computer keep their personal


browsing history hidden from other workers that may use this computer?

Move any downloaded files to the recycle bin .

Correct • Operate the web browser in private browser mode.

Use only an encrypted connection to access websites.

Reboot the computer after closing the web browser.

Refer to curriculum topic: 3.2.2


When a computer user browses the web in private mode , the
following occurs:

• Cookies are disabled.


• Temporary Internet files are removed after closing the window.
• Browsing history is removed after closing the window.

Question 8 2 / 2 pts

A consumer would like to print photographs stored on a cloud storage


account using a third party online printing service. After successfully
logging into the cloud account, the customer is automatically given access
to the third party online printing service. What allowed this automatic
authentication to occur?

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 6/10


5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

The password entered by the user for the online printing service is the
same as the password used on the cloud storage service.

The user is on an unencrypted network and the password for the cloud
storage service is viewable by the online printing service.

Correct;
The cloud storage service is an approved application for the online printing
service.

The account information for the cloud storage service was intercepted by a
malicious application.

Refer to curriculum topic: 3.2.1


Open Authorization is an open standard protocol that allows end
users to access third party applications without exposing the user
password.

Question 9 2 / 2 pts

What is the best method to prevent Bluetooth from being exploited?

Always use a VPN when connecting with Bluetooth.

Only use Bluetooth to connect to another smartphone or tablet.

Correct!
• Always disable Bluetooth when it is not actively used.

Only use Bluetooth when connecting to a known SSID.

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 7/10


5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

Refer to curriculum topic: 3.1.1


Bluetooth is a wireless technology that can be exploited by
hackers to eavesdrop, establish remote access controls, and
distribute malware. A user should keep Bluetooth turned off when
not in use.

Question 10 2 / 2 pts

A user is surfing the Internet using a laptop at a public WiFi cafe. What
should be checked first when the user connects to the public network?

if the laptop has a master password set to secure the passwords stored in
the password manager

Correct ^
• if the laptop requires user authentication for file and media sharing

if the laptop Bluetooth adapter is disabled

if the laptop web browser is operating in private mode

/\

Refer to curriculum topic: 3.1.1


When a user connects to a public network, it is important to know if
the computer is configured with file and media sharing and that it
requires user authentication with encryption.

Question 11 2 / 2 pts

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 8/10


5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

As data is being stored on a local hard disk, which method would secure
the data from unauthorized access?

a duplicate hard drive copy

two factor authentication

Correct! • data encryption

deletion of sensitive files

Refer to curriculum topic: 3.1.2


Data encryption is the process of converting data into a form
where only a trusted, authorized person with a secret key or
password can decrypt the data and access the original form.

Question 12 2 / 2 pts

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 9/10


5/8/2020 Chapter 3 Quiz: Introduction to Cybersecurity 0420

How can a user prevent others from eavesdropping on network traffic


when operating a PC on a public Wi-Fi hot spot?

Disable Bluetooth.

Correct - Connect with a VPN service.

Create strong and unique passwords.

Use WPA2 encryption.

Refer to curriculum topic: 3.1.1


When a user connects through an encrypted VPN tunnel on a
public Wi-Fi network, any data being sent or received from the
user will be undecipherable.

https://373583482 .netacad.com/courses/1014521/quizzes/9036276 10/10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy