Last Updated on December 11, 2018 by Admin
Learning with Cisco Netacad, there are many exams and lab activities to do. Some instructor require students to complete all Chapter exams, Final Exam and Chapter Quiz. No mater what instructors want you to do, examict.com offers all exams answers with clear explanation. Our Experts have verified all exam answers before we published to the website. We recommended you to chose any relevant chapter from the following:
Assignments | |
Answers | Online Test |
Final Exam | Online |
Practice Quizzes | |
Answers | Online Test |
Chapter 1 Ethics Quiz | Online |
Chapter 1 Quiz | Online |
Chapter 2 Quiz | Online |
Chapter 3 Quiz | Online |
Chapter 4 Quiz | Online |
ITC -- Chapter 3 Ethics Quiz
Quiz-summary
0 of 12 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
Information
ITC -- Chapter 3 Ethics Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 12 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- Answered
- Review
-
Question 1 of 12
1. Question
1 pointsA network administrator is conducting a training session to office staff on how to create a strong and effective password. Which password would most likely take the longest for a malicious user to guess or break?Correct
Incorrect
When choosing a good password:
- Do not use dictionary words or names in any languages.
- Do not use common misspellings of dictionary words.
- Do not use computer names or account names.
- If possible use special characters, such as ! @ # $ % ^ & * ( ).
- Use a ten character password or more.
-
Question 2 of 12
2. Question
1 pointsWhich technology removes direct equipment and maintenance costs from the user for data backups?Correct
Incorrect
The cost of cloud storage commonly depends on the amount of storage space needed. The cloud provider will maintain the equipment and the cloud user will have access to the backup data.
-
Question 3 of 12
3. Question
1 pointsHow can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?Correct
Incorrect
When a computer user browses the web in private mode, the following occurs:
- Cookies are disabled.
- Temporary Internet files are removed after closing the window.
- Browsing history is removed after closing the window.
-
Question 4 of 12
4. Question
1 pointsA user is having difficulty remembering passwords for multiple online accounts. What is the best solution for the user to try?Correct
Incorrect
A password manager can be used to store and encrypt multiple passwords. A master password can be implemented to protect the password manager software.
-
Question 5 of 12
5. Question
1 pointsAs data is being stored on a local hard disk, which method would secure the data from unauthorized access?Correct
Incorrect
Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.
-
Question 6 of 12
6. Question
1 pointsHow can a user prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hot spot?Correct
Incorrect
When a user connects through an encrypted VPN tunnel on a public Wi-Fi network, any data being sent or received from the user will be undecipherable.
-
Question 7 of 12
7. Question
1 pointsA consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After successfully logging into the cloud account, the customer is automatically given access to the third party online printing service. What allowed this automatic authentication to occur?Correct
Incorrect
Open Authorization is an open standard protocol that allows end users to access third party applications without exposing the user password.
-
Question 8 of 12
8. Question
1 pointsWhat is the best method to prevent Bluetooth from being exploited?Correct
Incorrect
Bluetooth is a wireless technology that can be exploited by hackers to eavesdrop, establish remote access controls, and distribute malware. A user should keep Bluetooth turned off when not in use.
-
Question 9 of 12
9. Question
1 pointsWhich type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?Correct
Incorrect
Antispyware software is commonly installed on a user machine to scan and remove malicious spyware software installed on a device.
-
Question 10 of 12
10. Question
1 pointsWhy do IoT devices pose a greater risk than other computing devices on a network?Correct
Incorrect
IoT devices commonly operate using their original firmware and do not receive updates as frequently as laptops, desktops, and mobile platforms.
-
Question 11 of 12
11. Question
1 pointsWhich configuration on a wireless router is not considered to be adequate security for a wireless network?Correct
Incorrect
A wireless router can be configured to not allow the SSID to be broadcast, but that configuration is not considered to be adequate security for a wireless network
-
Question 12 of 12
12. Question
1 pointsA user is surfing the Internet using a laptop from a public WiFi cafe. What should be checked first when the user connects to the public network?Correct
Incorrect
When a user connects to a public network, it is important to know if the computer is configured with file and media sharing and that it requires user authentication with encryption.
Learning with Cisco Netacad, there are many exams and lab activities to do. Some instructor require students to complete all Chapter exams, Final Exam and Chapter Quiz. No mater what instructors want you to do, examict.com offers all exams answers with clear explanation. Our Experts have verified all exam answers before we published to the website. We recommended you to chose any relevant chapter from the following:
Assignments | |
Answers | Online Test |
Final Exam | Online |
Practice Quizzes | |
Answers | Online Test |
Chapter 1 Ethics Quiz | Online |
Chapter 1 Quiz | Online |
Chapter 2 Quiz | Online |
Chapter 3 Quiz | Online |
Chapter 4 Quiz | Online |