0% found this document useful (0 votes)
409 views5 pages

CISCO Introduction To IoT Chapter 5 Quiz Answers

This document contains 15 multiple choice questions and their answer choices from Cisco's Introduction to IoT Chapter 5 quiz. The questions cover topics like security risks of virtual assistants, weak passwords, security best practices for wireless networks and more. The document lists each question, possible answer choices for each, and the full answers provided by Priya Dogra to help students learn about IoT security concepts.

Uploaded by

craf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
409 views5 pages

CISCO Introduction To IoT Chapter 5 Quiz Answers

This document contains 15 multiple choice questions and their answer choices from Cisco's Introduction to IoT Chapter 5 quiz. The questions cover topics like security risks of virtual assistants, weak passwords, security best practices for wireless networks and more. The document lists each question, possible answer choices for each, and the full answers provided by Priya Dogra to help students learn about IoT security concepts.

Uploaded by

craf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

15/10/2021 11:02 CISCO Introduction to IoT Chapter 5 Quiz Answers

CISCO Introduction to IoT Chapter 5 Quiz


Answers
18th July 2020

Q1)How can a virtual assistant be a security risk?

Group of answer choices

Personal devices could be remotely seen.


Sensor options could be modified.
Encryption protocols are not supported.
Personal information could be leaked.

Q2)Which three passwords are the least secure? (Choose three.)

Group of answer choices

s3CurE_p@ss
asdfghjkl
randolph
34%cafe_!
Ci3c0_RocK$
135792468

Q3)How are USB flash drives a security risk?

Group of answer choices

They contain wireless antennas.


They have a controller that can be infected.
They cannot be encrypted.
They contain a remote sensor.

https://priyadogra.com/cisco-introduction-to-iot-chapter-5-quiz-answers/ 1/5
15/10/2021 11:02 CISCO Introduction to IoT Chapter 5 Quiz Answers

Q4)Why would an IT person use Zabasearch?

Group of answer choices

to research a business
to research an app
to research a person
to research an IoT device

Q5)Which action can help reduce online risk?

Group of answer choices

only accept unsolicited software updates when logged into a secure network
only click embedded links in email messages from friends
only conduct transactions on websites after verifying the URL is correct
only download programs with the most positive reviews on 3rd party websites

 Q6)What are three examples of personally identifiable information? (Choose three.)

Group of answer choices

home water usage


vehicle identification number
home thermometer value
vehicle fuel consumption
bank account number
birth date

Q7)Match the security best practice to the description.

Group of answer choices

implementing human resource security measures : research and perform background


checks on employees
employing access controls: assign user roles and privilege levels
educating users: train users on security
regularly testing incident responses: perform and test emergency response scenarios

Q8)Which two online activities pose high security risks? (Choose two.)

Group of answer choices

https://priyadogra.com/cisco-introduction-to-iot-chapter-5-quiz-answers/ 2/5
15/10/2021 11:02 CISCO Introduction to IoT Chapter 5 Quiz Answers

using a VPN to access the Internet from a Wi-Fi hot spot


following email links that have already been scanned by the email server
creating a very complex password for a new account and storing it in a password manager
service
verifying a banking site URL before entering information
sharing information on social media

Q9)Which three elements should be combined when creating a strong password?


(Choose three.)

Group of answer choices

personal information
combinations of letters and numbers
pet names
special characters
dictionary words
phrases

Q10)What is a goal of performing a risk assessment?

Group of answer choices

outlining job duties and expectations


educating users in secure procedures
valuing assets to justify security expenditures
restricting access to physical assets

 Q11)An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What
action can the employee take to reduce the security risk of using a hotspot?

Group of answer choices

Encrypt traffic through a VPN.


Verify the name of the sender of emails before opening them.
Only click on embedded links in email messages from trusted colleagues.
Scan emails with antivirus software.

 Q12)What is the goal of a white hat hacker?

Group of answer choices

https://priyadogra.com/cisco-introduction-to-iot-chapter-5-quiz-answers/ 3/5
15/10/2021 11:02 CISCO Introduction to IoT Chapter 5 Quiz Answers

protecting data
modifying data
stealing data
validating data

Q13)What is a wireless router security best practice that limits access to only specific
internal hosts?

Group of answer choices

MAC address filtering


disabling SSID advertisements
enabling encryption
enabling the built-in firewall

Q14)What is used to identify a wireless network?

Group of answer choices

IP address
MAC address
SPI
SSID

Q15)What are two recommended steps to protect and secure a wireless network?
(Choose two.)

Group of answer choices

Use WPA2-AES encryption.


Locate the wireless router where it is accessible to users.
Update firmware.
Use the default SSID.
Enable remote management.

https://priyadogra.com/cisco-introduction-to-iot-chapter-5-quiz-answers/ 4/5
15/10/2021 11:02 CISCO Introduction to IoT Chapter 5 Quiz Answers

Er Priya Dogra

https://priyadogra.com/cisco-introduction-to-iot-chapter-5-quiz-answers/ 5/5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy