CISCO Introduction to IoT Chapter 5 Quiz Answers
What are two recommended steps to protect and secure a wireless network? (Choose two.)
Use WPA2-AES encryption.
Which three passwords are the least secure? (Choose three.)
Match the security best practice to the description.
What is a wireless router security best practice that limits access to only specific internal hosts?
MAC address filtering
What are three examples of personally identifiable information? (Choose three.)
bank account number
vehicle identification number
How can a virtual assistant be a security risk?
Personal information could be leaked.
Which two online activities pose high security risks? (Choose two.)
following email links that have already been scanned by the email server
sharing information on social media
Which three elements should be combined when creating a strong password? (Choose three.)
combinations of letters and numbers
What is the goal of a white hat hacker?
What is a goal of performing a risk assessment?
valuing assets to justify security expenditures
Which action can help reduce online risk?
only conduct transactions on websites after verifying the URL is correct
How are USB flash drives a security risk?
They have a controller that can be infected.
Why would an IT person use Zabasearch?
to research a person
What is used to identify a wireless network?
An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?
Encrypt traffic through a VPN.