Question and answer
Quiz Question 1 (2.5 points) Saved A ____ allows a user who is outside of a corporate network to take a detour around the firewall and access the internal network from the outside. Question 1 options: SSL URL HTML VPN Question 2 (2.5 points) Saved You don't have to protect yourself from criminal use of your information online. Question 2 options: True False Question 3 (2.5 points) Saved Passwords containing a mixture of letters, numbers and symbols are the strongest. Question 3 options: True False Question 4 (2.5 points) Saved Companies created BYOD policy allows employees to
integrate themselves more fully into their job and can bring higher employee satisfaction and productivity. BYOD means? Question 4 options: Bring Your Own Device Bring Your Own Digital Bring Your Own Dog None of the above Question 5 (2.5 points) Saved It is safe to download files from the internet as long as you have antivirus installed. Question 5 options: True False Question 6 (2.5 points) Saved Most e-mail and social media providers now have a ______ authentication option. Question 6 options: Two-factor Multi-factor Stronger factor None of the above Question 7 (2.5 points) Saved A security policy should be based on the guiding principles of confidentiality, integrity, and availability. Question 7 options: True False Question 8 (2.5 points) Saved Malware is software designed to protect your computer in some way. Question 8 options: True False Question 9 (2.5 points) Saved They will tempt you to click on a link that will direct you to a fake website where their goal is to steal personal information. Question 9 options: Open the attachment Forward the attachment to your colleagues and friends Delete the mail without opening it Do nothing and keep it in the in-box Question 10 (2.5 points) Saved A strong password is essential for protection against cybersecurity threats. Question 10 options: True False Question 11 (2.5 points) Saved Data encryption is a common method of ensuring confidentiality. Question 11 options: True False Question 12 (2.5 points) What is the purpose of encryption? Question 12 options: The process of 'scrambling' data to make it unreadable. The series of steps that are taken in order to solve a particular problem. The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data All of the above Question 13 (2.5 points) Slow down, malfunction, or display repeated error messages is a sign of malware on your computer. Question 13 options: True False Question 14 (2.5 points) Social media is a common place for hackers to steal personal information. Which social media outlet is a hacker's favorite target? Question 14 options: Instagram Facebook Snapchat Myspace Question 15 (2.5 points) What does the term authentication mean? Question 15 options: Making sure someone using the computer is who they say they are by use of passwords and other techniques. Making sure data is accurate. Making sure that data is kept confidential, so only the owner of the data can see it. All of the above. Question 16 (2.5 points) What is a trojan horse? Question 16 options: A large wooden vehicle for soldiers to hide in and take over the city of Troy. A computer program that pretends to be one thing but causes harm when accessed. An email scam None of the above Question 17 (2.5 points) When you are using your Facebook account, a message pop-out, it tells you to click on the link and you can get a iPhone if you win the game. What would you do? Question 17 options: Stop doing any online activity that required your username, password, and other personal information. Keep shopping, banking, using every account about online activity. Try to use anti-virus and anti-spyware software, and a firewall to defend the malware. Try to call a professional help. Question 18 (2.5 points) It is essential that users change their passwords on a regular basis. Question 18 options: True False Question 19 (2.5 points) A good example of methods used to ensure confidentiality is an account number or routing number when banking online. Question 19 options: True False Question 20 (2.5 points) A typical firewall has two interfaces : an external interface connected to the global Internet, and an internal interface connected to a trusted network. Question 20 options: True False Question 21 (2.5 points) What does a URL that starts with https:// signify? Question 21 options: The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data. That you are visiting a secure Web site in which data transmissions are encrypted. RSA algorithm All of the above Question 22 (2.5 points) A pop-out message on your computer wrote "free anti-spyware download", and you don't have a anti-spyware, what would you do? Question 22 options: Click on the link, provide all your personal information and free download it. Click on the link, to see more information about the company and product. Click on the link, provide all your personal information and pay money to buy it. Close the window, and download it from other trustable web page and website that offers anti-spyware software. Question 23 (2.5 points) What is a VPN and why is it useful? Question 23 options: Virtual Private Network for employees outside the firm to securely access the network. Virtual Primary Network where most of the firewalls are set. It is the most secure part of the network. Virtual Primary Network where customers can link to a company for its services. Virtual Public Network where the public has internet access, like at an airport or coffee house. Question 24 (2.5 points) Viruses attach themselves to specific applications on a computer and are activated when the program is first run. Question 24 options: True False Question 25 (2.5 points) What does VPN stand for? Question 25 options: Virtual Previous Network Vertical Private Network Virtual Private Network Visual Progress Network Question 26 (2.5 points) There are certain rules that can optimize a password's effectiveness. Question 26 options: True False Question 27 (2.5 points) _________pose many unique security challenges to an organization. Question 27 options: Printing devices Mobile devices Faxing devices None of the above Question 28 (2.5 points) A firewall can exist as hardware or software (or both). Question 28 options: True False Question 29 (2.5 points) Access control list (ACL) and role-based access control (RBAC) are types of __________. Question 29 options: Access Confidential Limited Controls Access Control Models All of the above Question 30 (2.5 points) Confidentiality is roughly equivalent to privacy. Question 30 options: True False Question 31 (2.5 points) If you know you receive a spam email, what should you do next? Question 31 options: Ignore it and delete it. Send this email to your friend. Still use your personal account on the computer. Just leave it there. Question 32 (2.5 points) The first firewalls included design packet filters. Question 32 options: True False Question 33 (2.5 points) Fast and adaptive disaster recovery is essential for the worst case scenarios; that capacity is reliant on the existence of a comprehensive ___________________. Question 33 options: Security plan Disaster Recovery Plan FEMA None of the above Question 34 (2.5 points) Physical security is the protection of the actual hardware and networking components that store and transmit information resources. Question 34 options: True False Question 35 (2.5 points) If you create a password and don't think you can remember it, you should: Question 35 options: Tattoo it between your toes Write it down and keep it in a safe place. Write down a hint that only makes sense to you and keep it secure. All of the above Question 36 (2.5 points) A __________ certificate confirms your credentials when conducting business or other transactions on the web. Question 36 options: SSL URL HTML All of the above Question 37 (2.5 points) A good antivirus program will both perform scans on your computer and provide real-time protection. Question 37 options: True False Question 38 (2.5 points) Which of the following is not part of the CIA security triad? Question 38 options: Confidentiality Integrity Availability Accessibility Question 39 (2.5 points) Viruses are said to be self-replicating programs and date back as far as the early ___________. Question 39 options: 1980s 1990s 1960s 1970s Question 40 (2.5 points) Phishing emails are designed to mimic emails from trusted institutions. Question 40 options: True False 11 of 40 questions saved
s
9. Open the attachment(Phishing): They will tempt you to click on a link that will direct you to a fake website where their goal is to steal personal information.
Question
Asked 32 days ago|7/7/2022 12:33:26 AM
Updated 32 days ago|7/7/2022 5:26:48 AM
39 Answers/Comments
Get an answer
New answers
Rating
4
9. Open the attachment(Phishing): They will tempt you to click on a link that will direct you to a fake website where their goal is to steal personal information.
Added 32 days ago|7/7/2022 4:08:28 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
10. A strong password is essential for protection against cybersecurity threats. TRUE.
Added 32 days ago|7/7/2022 4:11:40 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
11. Saved Data encryption is a common method of ensuring confidentiality. TRUE.
Added 32 days ago|7/7/2022 4:12:26 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
12. The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data is the purpose of encryption.
Added 32 days ago|7/7/2022 4:15:21 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
13. Slow down, malfunction, or display repeated error messages is a sign of malware on your computer. TRUE.
Added 32 days ago|7/7/2022 4:16:27 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
14. Social media is a common place for hackers to steal personal information. Facebook is a hacker's favorite target.
Added 32 days ago|7/7/2022 4:22:24 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
15. Authentication means: Making sure someone using the computer is who they say they are by use of passwords and other techniques.
Added 32 days ago|7/7/2022 4:29:19 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
16. A Trojan horse is a computer program that pretends to be one thing but causes harm when accessed.
Added 32 days ago|7/7/2022 4:31:10 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
17. When you are using your Facebook account, a message pop-out, it tells you to click on the link and you can get a iPhone if you win the game. You should Try to use anti-virus and anti-spyware software, and a firewall to defend the malware.
Added 32 days ago|7/7/2022 4:33:48 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
18. It is essential that users change their passwords on a regular basis. TRUE.
Added 32 days ago|7/7/2022 4:36:14 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
19. A good example of methods used to ensure confidentiality is an account number or routing number when banking online. TRUE.
Added 32 days ago|7/7/2022 4:37:20 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
20. A typical firewall has two interfaces : an external interface connected to the global Internet, and an internal interface connected to a trusted network. TRUE.
Added 32 days ago|7/7/2022 4:39:10 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
21. signify: That you are visiting a secure Web site in which data transmissions are encrypted.
Added 32 days ago|7/7/2022 4:41:29 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
22. A pop-out message on your computer wrote "free anti-spyware download", and you don't have a anti'spyware, You should Close the window, and download it from other trust-able web page.
Added 32 days ago|7/7/2022 4:44:36 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
23. A VPN is a Virtual Private Network for employees outside the firm to securely access the network.
Added 32 days ago|7/7/2022 4:47:00 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
24. Viruses attach themselves to specific applications on a computer and are activated when the program is first run. TRUE.
Added 32 days ago|7/7/2022 4:48:14 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
25. VPN stand for Vertical Private Network.
Added 32 days ago|7/7/2022 4:49:28 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
26. There are certain rules that can optimize a password's effectiveness. TRUE.
Added 32 days ago|7/7/2022 4:55:33 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
27. Mobile devices can pose many unique security challenges to an organization.
Added 32 days ago|7/7/2022 4:56:34 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
28. A firewall can exist as hardware or software (or both). TRUE.
Added 32 days ago|7/7/2022 4:57:38 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
29. Access control list (ACL) and role-based access control (RBAC) are types of Access Control Models.
Added 32 days ago|7/7/2022 5:00:31 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
30. Confidentiality is roughly equivalent to privacy. TRUE.
Added 32 days ago|7/7/2022 5:01:42 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
31. If you know you receive a spam email, Ignore it and delete it.
Added 32 days ago|7/7/2022 5:03:41 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
32. The first firewalls included design packet filters. TRUE.
Added 32 days ago|7/7/2022 5:05:19 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
33. Fast and adaptive disaster recovery is essential for the worst case scenarios; that capacity is reliant on the existence of a comprehensive disaster recovery plan (DRP).
Added 32 days ago|7/7/2022 5:06:35 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
34. Physical security is the protection of the actual hardware and networking components that store and transmit information resources.
Added 32 days ago|7/7/2022 5:07:32 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
35. If you create a password and don't think you can remember it, you should: Write down a hint that only makes sense to you and keep it secure.
Added 32 days ago|7/7/2022 5:14:03 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
36. A SSL certificate confirms your credentials when conducting business or other transactions on the web.
Added 32 days ago|7/7/2022 5:16:16 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
37. A good antivirus program will both perform scans on your computer and provide real-time protection. TRUE.
Added 32 days ago|7/7/2022 5:18:41 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
38. Accessibility is not part of the CIA security triad.
Added 32 days ago|7/7/2022 5:19:50 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
39. Viruses are said to be self-replicating programs and date back as far as the early 1970s.
Added 32 days ago|7/7/2022 5:25:24 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
4
40. Phishing emails are designed to mimic emails from trusted institutions. TRUE.
Added 32 days ago|7/7/2022 5:26:48 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
3
A VPN allows a user who is outside of a corporate network to take a detour around the firewall and access the internal network from the outside.
Added 32 days ago|7/7/2022 3:52:54 AM
This answer has been confirmed as correct and helpful.
3
You don't have to protect yourself from criminal use of your information online. FALSE.
Added 32 days ago|7/7/2022 3:53:35 AM
This answer has been confirmed as correct and helpful.
3
Companies created BYOD policy allows employees to
integrate themselves more fully into their job and can bring higher employee satisfaction and productivity. BYOD means: Bring Your Own Device.
Added 32 days ago|7/7/2022 3:55:04 AM
This answer has been confirmed as correct and helpful.
3
It is safe to download files from the internet as long as you have antivirus installed. FALSE.
Added 32 days ago|7/7/2022 3:56:15 AM
This answer has been confirmed as correct and helpful.
3
6. Most e-mail and social media providers now have a two-factor authentication option.
Added 32 days ago|7/7/2022 4:00:36 AM
This answer has been confirmed as correct and helpful.
3
7. A security policy should be based on the guiding principles of confidentiality, integrity, and availability.
Added 32 days ago|7/7/2022 4:01:20 AM
This answer has been confirmed as correct and helpful.
3
8. Malware is software designed to protect your computer in some way. FALSE.
Added 32 days ago|7/7/2022 4:04:54 AM
This answer has been confirmed as correct and helpful.
Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
Round 619,168 to the nearest ten. A. 619,170 B. 619,100 C. 619,160 D. 619,200
Weegy: Rounding 619,168 to the nearest ten is: 619,170. (More)
Question
Updated 32 days ago|7/7/2022 2:03:31 AM
0 Answers/Comments
The following are examples of using math in your everyday life EXCEPT:
Weegy: The following are examples of using math in your everyday life EXCEPT: All of the above are examples of using math everyday - Budgeting your time, Baking a cake, and Estimating your monthly budget. [ ] (More)
Question
Expert Answered
Asked 32 days ago|7/6/2022 11:14:19 PM
0 Answers/Comments
A ____ allows a user who is outside of a corporate network to take a detour around the firewall and access the internal network from the outside.
Weegy: A VPN allows a user who is outside of a corporate network to take a detour around the firewall and access the internal network from the [ outside. ] (More)
Question
Expert Answered
Asked 32 days ago|7/7/2022 12:21:12 AM
0 Answers/Comments
Data encryption is a common method of ensuring confidentiality.
Question
Not Answered
Updated 32 days ago|7/7/2022 1:04:41 AM
1 Answer/Comment
Data encryption is a common method of ensuring confidentiality. TRUE.
Added 32 days ago|7/7/2022 1:04:41 AM
This answer has been confirmed as correct and helpful.
Rated good by chucks574
If you know you receive a spam email, what should you do next?
Weegy: If you know you receive a spam email, [ you should: Delete it immediately to prevent yourself from accidentally opening the message in the future. ] (More)
Question|Asked by Teclee3222
Expert Answered
Asked 32 days ago|7/7/2022 1:19:17 AM
0 Answers/Comments
36,377,046
questions answered
Popular Conversations
What is the difference between DNA and RNA? DNA is a protein and RNA ...
Weegy: 2. The main difference between DNA and RNA nucleotides is: DNA has thymine as a nucleotide, while RNA has ...
8/4/2022 12:20:08 PM| 24 Answers
A child s temperament is primarily influenced by _______ factors. The ...
Weegy: A child s temperament is primarily influenced by BIOLOGICAL factors.
8/4/2022 1:10:34 AM| 16 Answers
A society that is dominated by men is called _____.
Weegy: A society dominated by men is called patriarchy. User: Communism a classless society where control of wealth ...
8/3/2022 7:01:40 PM| 15 Answers
The correct plural of the noun attorney is _attorney. The primary ...
Weegy: The correct plural of the noun attorney is attorneys.
8/1/2022 11:49:42 AM| 12 Answers
For each blank, write a word that is an antonym of the italicized ...
Weegy: He couldn’t bear the cold of Alaska after living in the heat of Texas.
8/8/2022 10:35:15 AM| 9 Answers
Questions 1 10: For each blank, write a word that is an antonym of ...
Weegy: He couldn?t bear the cold of Alaska after living in the heat of Texas.
8/2/2022 4:36:17 PM| 9 Answers
Identify the binomial
Weegy: In algebra, a binomial is a polynomial which is the sum of two terms, which are monomials. User: Solve this ...
8/7/2022 6:53:38 PM| 8 Answers
GET
Answers.
GET THE APP.
weegy*
*
Get answers from Weegy and a team of really smart live experts.
S
L
Points 207 [Total 217] Ratings 5 Comments 147 Invitations 1 Offline
S
L
P
R
Points 174 [Total 1923] Ratings 0 Comments 174 Invitations 0 Offline
S
L
Points 132 [Total 224] Ratings 1 Comments 122 Invitations 0 Offline
S
L
R
Points 105 [Total 1579] Ratings 1 Comments 95 Invitations 0 Offline
S
L
P
Points 102 [Total 1066] Ratings 1 Comments 92 Invitations 0 Offline
S
L
Points 95 [Total 391] Ratings 0 Comments 95 Invitations 0 Offline
S
L
Points 66 [Total 226] Ratings 0 Comments 66 Invitations 0 Offline
S
Points 66 [Total 66] Ratings 0 Comments 66 Invitations 0 Offline
S
L
Points 60 [Total 830] Ratings 0 Comments 60 Invitations 0 Offline
S
L
Points 46 [Total 219] Ratings 0 Comments 46 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.