Cisco !#&? be a network ninja


To the top Chapter 3.6.1 Chapter 3.6.2

Introduction to Cybersecurity

One course of Cisco's "Skills for all"

On completing this course, you will be able to:

Module 3 - Protecting your Data and Privacy

Welcome to this module, which looks at how to protect yourself online and maintain your privacy.

Remember, your online data is valuable to cybercriminals. So what can you do to stay safe?

There are some simple strategies that you can use to protect your personal devices and maintain your data securely. Let’s take a look at what these are.

Chapter 3.6 - Quiz

3.6.1 Module 3 quiz

Question

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?

Question

What should you do in order to make sure that people you live with do not have access to your secure data?

Question

Why do IoT devices pose a greater security risk than other computing devices on a network?

Question

Which of the following is an example of two factor authentication?

Question

How can you keep your personal browsing history hidden from other users on a shared computer?

Question

You are looking to print photos that you have saved on a cloud storage account using a third-party online printing service. After successfully logging into the cloud account, you are automatically given access to the third-party online printing service. What allowed this automatic authentication to occur?

Question

Which of the following passwords would most likely take the longest for an attacker to guess or break?

Question

Which of the following is a requirement of a strong password?

Question

Which configuration on a wireless router is not considered to be adequate security for a wireless network?

Question

How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?

Question

What is the only way of ensuring that deleted files on your computer are irrecoverable?

Question

You have stored your data on a local hard disk. Which method would secure this data from unauthorized access?

3.6.2 Module 3 Quiz explanations

Question

Which technology removes direct equipment and maintenance costs from the user for data backups?

  1. an external hard drive
  2. a cloud service
  3. a tape
  4. network attached storage
Explanations

The cost of cloud storage commonly depends on the amount of storage space needed. The cloud provider will maintain the equipment and the cloud user will have access to the backup data.

Answer: a cloud service

Question

A network administrator is conducting a training session to office staff on how to create a strong and effective password. Which password would most likely take the longest for a malicious user to guess or break?

  1. 10characters
  2. drninjaphd
  3. mk$$cittykat104#
  4. super3secret2password1
Explanations

When choosing a good password:

  1. – Do not use dictionary words or names in any languages.
  2. – Do not use common misspellings of dictionary words.
  3. – Do not use computer names or account names.
  4. – If possible use special characters, such as ! @ # $ % ^ & * ( ).
  5. – Use a ten character password or more.

Answer: An emk$$cittykat104#

Question

How can a user prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hot spot?

  1. Connect with a VPN service.
  2. Disable Bluetooth.
  3. Create strong and unique passwords.
  4. Use WPA2 encryption.
Explanations

When a user connects through an encrypted VPN tunnel on a public Wi-Fi network, any data being sent or received from the user will be undecipherable.

Answer: Connect with a VPN service.

Question

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?

  1. firewall
  2. antispyware
  3. two factor authentication
  4. password manager
Explanations

Antispyware software is commonly installed on a user machine to scan and remove malicious spyware software installed on a device.

Answer: antispyware

Question

As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

  1. deletion of sensitive files
  2. a duplicate hard drive copy
  3. data encryption
  4. two factor authentication
Explanations

Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.

Answer: data encryption

Question

What is the best method to prevent Bluetooth from being exploited?

  1. Only use Bluetooth when connecting to a known SSID.
  2. Only use Bluetooth to connect to another smartphone or tablet.
  3. Always use a VPN when connecting with Bluetooth.
  4. Always disable Bluetooth when it is not actively used.
Explanations

Bluetooth is a wireless technology that can be exploited by hackers to eavesdrop, establish remote access controls, and distribute malware. A user should keep Bluetooth turned off when not in use.

Answer: Always disable Bluetooth when it is not actively used.

Question

Why do IoT devices pose a greater risk than other computing devices on a network?

  1. IoT devices require unencrypted wireless connections.
  2. Most IoT devices do not require an Internet connection and are unable to receive new updates.
  3. Most IoT devices do not receive frequent firmware updates.
  4. IoT devices cannot function on an isolated network with only an Internet connection.
Explanations

IoT devices commonly operate using their original firmware and do not receive updates as frequently as laptops, desktops, and mobile platforms.

Answer: Most IoT devices do not receive frequent firmware updates.

Question

Which configuration on a wireless router is not considered to be adequate security for a wireless network?

  1. enabling wireless security
  2. prevent the broadcast of an SSID
  3. implement WPA2 encryption
  4. modify the default SSID and password of a wireless router
Explanations

A wireless router can be configured to not allow the SSID to be broadcast, but that configuration is not considered to be adequate security for a wireless network

Answer: prevent the broadcast of an SSID

Question

How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?

  1. Reboot the computer after closing the web browser.
  2. Move any downloaded files to the recycle bin.
  3. Operate the web browser in private browser mode.
  4. Use only an encrypted connection to access websites.
Explanations

When a computer user browses the web in private mode, the following occurs:

  1. – Cookies are disabled.
  2. – Temporary Internet files are removed after closing the window.
  3. – Browsing history is removed after closing the window.

Answer: Operate the web browser in private browser mode.

Question

A user is surfing the Internet using a laptop at a public WiFi cafe. What should be checked first when the user connects to the public network?

  1. if the laptop has a master password set to secure the passwords stored in the password manager
  2. if the laptop web browser is operating in private mode
  3. if the laptop Bluetooth adapter is disabled
  4. if the laptop requires user authentication for file and media sharing
Explanations

When a user connects to a public network, it is important to know if the computer is configured with file and media sharing and that it requires user authentication with encryption.

Answer: if the laptop requires user authentication for file and media sharing

Question

A consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After successfully logging into the cloud account, the customer is automatically given access to the third party online printing service. What allowed this automatic authentication to occur?

  1. The account information for the cloud storage service was intercepted by a malicious application.
  2. The password entered by the user for the online printing service is the same as the password used on the cloud storage service.
  3. The cloud storage service is an approved application for the online printing service.
  4. The user is on an unencrypted network and the password for the cloud storage service is viewable by the online printing service.
Explanations

Open Authorization is an open standard protocol that allows end users to access third party applications without exposing the user password.

Answer: The cloud storage service is an approved application for the online printing service.

Question

A user is having difficulty remembering passwords for multiple online accounts. What is the best solution for the user to try?

  1. Share the passwords with the network administrator or computer technician.
  2. Write the passwords down and place them out of sight.
  3. Save the passwords in a centralized password manager program.
  4. Create a single strong password to be used across all online accounts.
Explanations

A password manager can be used to store and encrypt multiple passwords. A master password can be implemented to protect the password manager software.

Answer: Save the passwords in a centralized password manager program.

Solved quizzes

Skills for all