CISCO Introduction to IoT Chapter 5 Quiz Answers

Other answers

What are two recommended steps to protect and secure a wireless network? (Choose two.)
Update firmware.
Use WPA2-AES encryption.

Which three passwords are the least secure? (Choose three.)

Match the security best practice to the description.
implementing human resource security measures : research and perform background checks on employees
employing access controls: assign user roles and privilege levels
educating users: train users on security
regularly testing incident responses: perform and test emergency response scenarios

What is a wireless router security best practice that limits access to only specific internal hosts?
MAC address filtering

What are three examples of personally identifiable information? (Choose three.)
bank account number
birth date
vehicle identification number

How can a virtual assistant be a security risk?
Personal information could be leaked.

Which two online activities pose high security risks? (Choose two.)
following email links that have already been scanned by the email server
sharing information on social media

Which three elements should be combined when creating a strong password? (Choose three.)
special characters
combinations of letters and numbers

What is the goal of a white hat hacker?
protecting data

What is a goal of performing a risk assessment?
valuing assets to justify security expenditures

Which action can help reduce online risk?
only conduct transactions on websites after verifying the URL is correct

How are USB flash drives a security risk?
They have a controller that can be infected.

Why would an IT person use Zabasearch?
to research a person

What is used to identify a wireless network?

An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?
Encrypt traffic through a VPN.