Thursday , October 10 2024
Breaking News

CISCO Introduction to IoT Chapter 5 Quiz Answers

Q1) How can a virtual assistant be a security risk?

Group of answer choices

  • Personal devices could be remotely seen.
  • Sensor options could be modified.
  • Encryption protocols are not supported.
  • Personal information could be leaked.

Q2) Which three passwords are the least secure? (Choose three.)

Group of answer choices

  • s3CurE_p@ss
  • asdfghjkl
  • randolph
  • 34%cafe_!
  • Ci3c0_RocK$
  • 135792468

Q3) How are USB flash drives a security risk?

Group of answer choices

  • They contain wireless antennas.
  • They have a controller that can be infected.
  • They cannot be encrypted.
  • They contain a remote sensor.

Q4) Why would an IT person use Zabasearch?

Group of answer choices

  • to research a business
  • to research an app
  • to research a person
  • to research an IoT device

Q5) Which action can help reduce online risk?

Group of answer choices

  • only accept unsolicited software updates when logged into a secure network
  • only click embedded links in email messages from friends
  • only conduct transactions on websites after verifying the URL is correct
  • only download programs with the most positive reviews on 3rd party websites

Q6) What are three examples of personally identifiable information? (Choose three.)

Group of answer choices

  • home water usage
  • vehicle identification number
  • home thermometer value
  • vehicle fuel consumption
  • bank account number
  • birth date

Q7) Match the security best practice to the description.

Group of answer choices

  • implementing human resource security measures : research and perform background checks on employees
  • employing access controls: assign user roles and privilege levels
  • educating users: train users on security
  • regularly testing incident responses: perform and test emergency response scenarios

Q8) Which two online activities pose high security risks? (Choose two.)

Group of answer choices

  • using a VPN to access the Internet from a Wi-Fi hot spot
  • following email links that have already been scanned by the email server
  • creating a very complex password for a new account and storing it in a password manager service
  • verifying a banking site URL before entering information
  • sharing information on social media

Q9) Which three elements should be combined when creating a strong password? (Choose three.)

Group of answer choices

  • personal information
  • combinations of letters and numbers
  • pet names
  • special characters
  • dictionary words
  • phrases

Q10) What is a goal of performing a risk assessment?

Group of answer choices

  • outlining job duties and expectations
  • educating users in secure procedures
  • valuing assets to justify security expenditures
  • restricting access to physical assets

Q11) An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?

Group of answer choices

  • Encrypt traffic through a VPN.
  • Verify the name of the sender of emails before opening them.
  • Only click on embedded links in email messages from trusted colleagues.
  • Scan emails with antivirus software.

Q12) What is the goal of a white hat hacker?

Group of answer choices

  • protecting data
  • modifying data
  • stealing data
  • validating data

Q13) What is a wireless router security best practice that limits access to only specific internal hosts?

Group of answer choices

  • MAC address filtering
  • disabling SSID advertisements
  • enabling encryption
  • enabling the built-in firewall

Q14) What is used to identify a wireless network?

Group of answer choices

  • IP address
  • MAC address
  • SPI
  • SSID

Q15) What are two recommended steps to protect and secure a wireless network? (Choose two.)

Group of answer choices

  • Use WPA2-AES encryption.
  • Locate the wireless router where it is accessible to users.
  • Update firmware.
  • Use the default SSID.
  • Enable remote management.

About Clear My Certification

Check Also

cybersecurity awareness CERTIFICATE

Certiprof Cybersecurity Awareness Professional Certification Answers

Enroll For : Cybersecurity Awareness Professional Certification What is the main focus of Cybersecurity? Protecting …

Leave a Reply

Your email address will not be published. Required fields are marked *