Saturday , July 20 2024
Breaking News

CISCO Introduction to IoT Chapter 5 Quiz Answers

Q1) How can a virtual assistant be a security risk?

Group of answer choices

  • Personal devices could be remotely seen.
  • Sensor options could be modified.
  • Encryption protocols are not supported.
  • Personal information could be leaked.

Q2) Which three passwords are the least secure? (Choose three.)

Group of answer choices

  • s3CurE_p@ss
  • asdfghjkl
  • randolph
  • 34%cafe_!
  • Ci3c0_RocK$
  • 135792468

Q3) How are USB flash drives a security risk?

Group of answer choices

  • They contain wireless antennas.
  • They have a controller that can be infected.
  • They cannot be encrypted.
  • They contain a remote sensor.

Q4) Why would an IT person use Zabasearch?

Group of answer choices

  • to research a business
  • to research an app
  • to research a person
  • to research an IoT device

Q5) Which action can help reduce online risk?

Group of answer choices

  • only accept unsolicited software updates when logged into a secure network
  • only click embedded links in email messages from friends
  • only conduct transactions on websites after verifying the URL is correct
  • only download programs with the most positive reviews on 3rd party websites

Q6) What are three examples of personally identifiable information? (Choose three.)

Group of answer choices

  • home water usage
  • vehicle identification number
  • home thermometer value
  • vehicle fuel consumption
  • bank account number
  • birth date

Q7) Match the security best practice to the description.

Group of answer choices

  • implementing human resource security measures : research and perform background checks on employees
  • employing access controls: assign user roles and privilege levels
  • educating users: train users on security
  • regularly testing incident responses: perform and test emergency response scenarios

Q8) Which two online activities pose high security risks? (Choose two.)

Group of answer choices

  • using a VPN to access the Internet from a Wi-Fi hot spot
  • following email links that have already been scanned by the email server
  • creating a very complex password for a new account and storing it in a password manager service
  • verifying a banking site URL before entering information
  • sharing information on social media

Q9) Which three elements should be combined when creating a strong password? (Choose three.)

Group of answer choices

  • personal information
  • combinations of letters and numbers
  • pet names
  • special characters
  • dictionary words
  • phrases

Q10) What is a goal of performing a risk assessment?

Group of answer choices

  • outlining job duties and expectations
  • educating users in secure procedures
  • valuing assets to justify security expenditures
  • restricting access to physical assets

Q11) An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?

Group of answer choices

  • Encrypt traffic through a VPN.
  • Verify the name of the sender of emails before opening them.
  • Only click on embedded links in email messages from trusted colleagues.
  • Scan emails with antivirus software.

Q12) What is the goal of a white hat hacker?

Group of answer choices

  • protecting data
  • modifying data
  • stealing data
  • validating data

Q13) What is a wireless router security best practice that limits access to only specific internal hosts?

Group of answer choices

  • MAC address filtering
  • disabling SSID advertisements
  • enabling encryption
  • enabling the built-in firewall

Q14) What is used to identify a wireless network?

Group of answer choices

  • IP address
  • MAC address
  • SPI
  • SSID

Q15) What are two recommended steps to protect and secure a wireless network? (Choose two.)

Group of answer choices

  • Use WPA2-AES encryption.
  • Locate the wireless router where it is accessible to users.
  • Update firmware.
  • Use the default SSID.
  • Enable remote management.

About Clear My Certification

Check Also

ISRO

ISRO Launched MOOC Course on “Overview of Space Exploration” for July 2024

Indian Institute of Remote Sensing (IIRS), ISRO Dehradun announces a Massive Open Online Course (MOOC) …

Leave a Reply

Your email address will not be published. Required fields are marked *