Introduction to Cybersecurity Modules Quiz Answers


Module 3: Protecting Your Data and Privacy Quiz Answers


                   

1. You have stored your data on a local hard disk. Which method would secure this data from unauthorized access?
a) Data encryption
b) Two factor authentication
c) Duplication of the hard drive
d) Deletion of sensitive files

Solution: a) Data encryption
Explanation: Encryption is the process of converting information into a form in which unauthorized parties cannot read it. Only a trusted, authorized person with the secret key or password can decrypt the data and access it in its original form.

2. How can you keep your personal browsing history hidden from other users on a shared computer?
a) Use only an encrypted connection to access websites
b) Operate the web browser in private browser mode
c) Move any downloaded files to the recycle bin
d) Reboot the computer after closing the web browser

Solution: b) Operate the web browser in private browser mode
Explanation: When private mode is enabled, cookies — files saved to your device to indicate what websites you’ve visited — are disabled. Therefore, any temporary internet files are removed and your browsing history is deleted when you close the window or program. This may help to prevent others from gathering information about your online activities and trying to entice you to buy something with targeted ads.

3. Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?
a) Password manager
b) Antispyware
c) Two factor authentication
d) Firewall

Solution: b) Antispyware
Explanation: Antispyware software is commonly installed on a user machine to scan and remove malicious spyware software installed on a device.

4. Why do IoT devices pose a greater security risk than other computing devices on a network?
a) Most IoT devices do not receive frequent software updates
b) IoT devices require unencrypted wireless connections
c) IoT devices cannot function on an isolated network with only an Internet connection
d) Most IoT devices do not require an Internet connection and are unable to receive new updates

Solution: a) Most IoT devices do not receive frequent software updates

5. What should you do in order to make sure that people you live with do not have access to your secure data?
a) Turn on a firewall
b) Increase the privacy settings on your browser
c) Install antivirus software
d) Set up password protection

Solution: d) Set up password protection

6. Which of the following is an example of two factor authentication?
a) Your answer to a general knowledge question and your password
b) Your password and your username
c) Your fingerprint and your password
d) Your account number and your name

Solution: c) Your fingerprint and your password

7. You are looking to print photos that you have saved on a cloud storage account using a third-party online printing service. After successfully logging into the cloud account, you are automatically given access to the third-party online printing service. What allowed this automatic authentication to occur?
a) The cloud storage service is an approved application for the online printing service
b) Your account information for the cloud storage service was intercepted by a malicious application
c) The password you entered for the online printing service is the same as the password you use for the cloud storage service
d) You are using an unencrypted network which allows the password for the cloud storage service to be viewed by the online printing service

Solution: a) The cloud storage service is an approved application for the online printing service

8. You are having difficulty remembering passwords for all of your online accounts. What should you do?
a) Write the passwords down and keep them out of sight
b) Share the passwords with a network administrator or computer technician
c) Save the passwords in a centralized password manager program
d) Create a single strong password to be used across all online accounts

Solution: c) Save the passwords in a centralized password manager program

9. Which of the following is a requirement of a strong password?
a) Use special characters such as ! @ or $
b) Use at least six characters
c) Use a dictionary word or a common statement that you’ll remember
d) Use your birthdate

Solution: a) Use special characters such as ! @ or $

10. Which of the following passwords would most likely take the longest for an attacker to guess or break?
a) drninjaphd
b) super3secret2password1
c) mk$$cittykat104#
d) 10characters

Solution: c) mk$$cittykat104#

11. What is the best method to prevent Bluetooth from being exploited?
a) Always disable Bluetooth when it is not being used
b) Always use a VPN when connecting with Bluetooth
c) Only use Bluetooth to connect to another smartphone or tablet
d) Only use Bluetooth when connecting to a known SSID

Solution: a) Always disable Bluetooth when it is not being used

12. How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?
a) Create unique and strong passwords
b) Connect with a VPN service
c) Use WPA2 encryption
d) Disable Bluetooth

Solution: b) Connect with a VPN service

13. Which configuration on a wireless router is not considered to be adequate security for a wireless network?
a) Modifying the default SSID and password of a wireless router
b) Implementing WPA2 encryption
c) Enabling wireless security
d) Preventing the broadcast of an SSID

Solution: d) Preventing the broadcast of an SSID

14. Which technology removes direct equipment and maintenance costs from the user for data backups?
a) A cloud service
b) Network attached storage
c) An external hard drive
d) A tape

Solution: a) A cloud service

15. What is the only way of ensuring that deleted files on your computer are irrecoverable?
a) Emptying your computer’s recycle bin
b) Physically destroying your computer’s hard drive
c) Using a software program such as SDelete or Secure Empty Trash
d) Formatting the hard drive

Solution: b) Physically destroying your computer’s hard drive