Time limit: 0
Quiz-summary
0 of 15 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
Information
Introduction to Cybersecurity Module 3 Quiz Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 15 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Answered
- Review
-
Question 1 of 15
1. Question
1 pointsYou have stored your data on a local hard disk. Which method would secure this data from unauthorized access?Correct
Incorrect
Hint
Encryption is the process of converting information into a form in which unauthorized parties cannot read it. Only a trusted, authorized person with the secret key or password can decrypt the data and access it in its original form. -
Question 2 of 15
2. Question
1 pointsHow can you keep your personal browsing history hidden from other users on a shared computer?Correct
Incorrect
Hint
When private mode is enabled, cookies — files saved to your device to indicate what websites you’ve visited — are disabled. Therefore, any temporary internet files are removed and your browsing history is deleted when you close the window or program. This may help to prevent others from gathering information about your online activities and trying to entice you to buy something with targeted ads. -
Question 3 of 15
3. Question
1 pointsWhich type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?Correct
Incorrect
Hint
Antispyware software is commonly installed on a user machine to scan and remove malicious spyware software installed on a device. -
Question 4 of 15
4. Question
1 pointsWhy do IoT devices pose a greater security risk than other computing devices on a network?Correct
Incorrect
-
Question 5 of 15
5. Question
1 pointsWhat should you do in order to make sure that people you live with do not have access to your secure data?Correct
Incorrect
-
Question 6 of 15
6. Question
1 pointsWhich of the following is an example of two factor authentication?Correct
Incorrect
-
Question 7 of 15
7. Question
1 pointsYou are looking to print photos that you have saved on a cloud storage account using a third-party online printing service. After successfully logging into the cloud account, you are automatically given access to the third-party online printing service. What allowed this automatic authentication to occur?Correct
Incorrect
-
Question 8 of 15
8. Question
1 pointsYou are having difficulty remembering passwords for all of your online accounts. What should you do?Correct
Incorrect
-
Question 9 of 15
9. Question
1 pointsWhich of the following is a requirement of a strong password?Correct
Incorrect
-
Question 10 of 15
10. Question
1 pointsWhich of the following passwords would most likely take the longest for an attacker to guess or break?Correct
Incorrect
-
Question 11 of 15
11. Question
1 pointsWhat is the best method to prevent Bluetooth from being exploited?Correct
Incorrect
Hint
Don’t forget that the Bluetooth wireless protocol, found on many smartphones and tablets, can also be exploited by hackers to eavesdrop, establish remote access controls, distribute malware and drain batteries. Therefore, my top tip is to keep Bluetooth turned off when you aren’t using it. -
Question 12 of 15
12. Question
1 pointsHow can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?Correct
Incorrect
Hint
You should use an encrypted VPN service to prevent others from intercepting your information (known as ‘eavesdropping’) over a public wireless network. This service gives you secure access to the Internet, by encrypting the connection between your device and the VPN server. Even if hackers intercept a data transmission in an encrypted VPN tunnel, they will not be able to decipher it. -
Question 13 of 15
13. Question
1 pointsWhich configuration on a wireless router is not considered to be adequate security for a wireless network?Correct
Incorrect
Hint
Although a wireless router can be configured so that it doesn’t broadcast the SSID, this should not be considered adequate security for a wireless network. -
Question 14 of 15
14. Question
1 pointsWhich technology removes direct equipment and maintenance costs from the user for data backups?Correct
Incorrect
Hint
The cost of cloud storage commonly depends on the amount of storage space needed. The cloud provider will maintain the equipment and the cloud user will have access to the backup data. -
Question 15 of 15
15. Question
1 pointsWhat is the only way of ensuring that deleted files on your computer are irrecoverable?Correct
Incorrect
Hint
The only way to be certain that data or files are not recoverable is to physically destroy the hard drive or storage device.