One way that companies attempt to protect themselves against a DOS attack is:
(1 point)
Responses
asking their users to change their passwords frequently.
asking their users to change their passwords frequently.
using PCs instead of Macs.
using PCs instead of Macs.
testing for excessive traffic flow.
testing for excessive traffic flow.
requiring employees to sign NDAs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these is NOT an effective way to minimize a website’s downtime due to regular maintenance?
(1 point)
Responses
having an identical server
having an identical server
scheduling the maintenance at night
scheduling the maintenance at night
scheduling service during less-busy times
scheduling service during less-busy times
using a VPN
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which one of these is NOT likely to result in a data availability issue?
(1 point)
Responses
DOS attack
DOS attack
power outage
power outage
identity theft
identity theft
hardware failure
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these can help prevent snooping for someone who uses their laptop in busy airports?
(1 point)
Responses
dual-factor authentication
dual-factor authentication
a strong password
a strong password
a screen-darkening filter
a screen-darkening filter
storing data in the cloud
------------------------------------------------------------------------------------------------------------------------------------------------------------------
A thief purchases old phones, tablets, and computers from flea markets in the hopes of finding personal data on them that they can use to steal information. This is an example of:
(1 point)
Responses
dumpster diving.
dumpster diving.
data integration.
data integration.
vishing.
vishing.
social engineering.
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which strategy is the MOST effective in protecting data from natural disasters?
(1 point)
Responses
two-factor authentication
two-factor authentication
a VPN
a VPN
off-site data storage
off-site data storage
keeping track of the age of hardware
------------------------------------------------------------------------------------------------------------------------------------------------------------------
If someone changes data so that it is no longer accurate, which of the following has been compromised?
(1 point)
Responses
confidentiality
confidentiality
availability
availability
portability
portability
integrity
------------------------------------------------------------------------------------------------------------------------------------------------------------------
What is the difference between a violation of data confidentiality and a man-in-the-middle attack?
(1 point)
Responses
Violations of data confidentiality always involve changing the data.
Violations of data confidentiality always involve changing the data.
Violations of data confidentiality always involve social engineering.
Violations of data confidentiality always involve social engineering.
A man-in-the-middle attack always involves changing the data.
A man-in-the-middle attack always involves changing the data.
A man-in-the-middle attack always involves social engineering.
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these is an example of data mining?
(1 point)
Responses
Data is converted from CSV to Excel format.
Data is converted from CSV to Excel format.
Data is used to decide which products to stock in a store.
Data is used to decide which products to stock in a store.
Data is moved from the cloud to a hard drive.
Data is moved from the cloud to a hard drive.
Data is stolen from a competitor.
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these is NOT one of the three main aspects of keeping data secure?
(1 point)
Responses
confidentiality
confidentiality
availability
availability
portability
portability
integrity
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these is NOT a way to help prevent hardware failure?
(1 point)
Responses
performing regular maintenance
performing regular maintenance
using a hard drive instead of the cloud
using a hard drive instead of the cloud
training workers to turn computers off when they aren’t using them
training workers to turn computers off when they aren’t using them
replacing items before they break
------------------------------------------------------------------------------------------------------------------------------------------------------------------
In a movie, a secret agent puts a small device on a telephone line so that they can listen to conversations between two other people. This is an example of:
(1 point)
Responses
snooping.
snooping.
social engineering.
social engineering.
wiretapping.
wiretapping.
data confidentiality.
------------------------------------------------------------------------------------------------------------------------------------------------------------------
A medical office uses a tablet to get information about patients’ health history, but the Wi-Fi might not be secure, and someone could steal private data. This is a concern about:
(1 point)
Responses
data confidentiality.
data confidentiality.
data availability.
data availability.
data portability.
data portability.
data integrity.
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these is NOT an example of intellectual property?
(1 point)
Responses
a song you wrote
a song you wrote
an article you published
an article you published
hardware you purchased
hardware you purchased
a sculpture you created
------------------------------------------------------------------------------------------------------------------------------------------------------------------
What is the difference between data and information?
(1 point)
Responses
Data is private; information is public.
Data is private; information is public.
Data is public; information is private.
Data is public; information is private.
Data is raw facts; information has meaning.
Data is raw facts; information has meaning.
Data has meaning; information is raw facts.
3 answers
If a company encrypts data on a server and requires a password to access it, they are protecting the data’s:
(1 point)
Responses
integrity.
integrity.
availability.
availability.
confidentiality.
confidentiality.
portability.
------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. One way that companies attempt to protect themselves against a DOS attack is: testing for excessive traffic flow.
2. Which of these is NOT an effective way to minimize a website’s downtime due to regular maintenance? Using a VPN.
3. Which one of these is NOT likely to result in a data availability issue? Identity theft.
4. Which of these can help prevent snooping for someone who uses their laptop in busy airports? A screen-darkening filter.
5. A thief purchases old phones, tablets, and computers from flea markets in the hopes of finding personal data on them that they can use to steal information. This is an example of: dumpster diving.
6. Which strategy is the MOST effective in protecting data from natural disasters? Off-site data storage.
7. If someone changes data so that it is no longer accurate, which of the following has been compromised? Integrity.
8. What is the difference between a violation of data confidentiality and a man-in-the-middle attack? A man-in-the-middle attack always involves changing the data.
9. Which of these is an example of data mining? Data is used to decide which products to stock in a store.
10. Which of these is NOT one of the three main aspects of keeping data secure? Portability.
11. Which of these is NOT a way to help prevent hardware failure? Using a hard drive instead of the cloud.
12. In a movie, a secret agent puts a small device on a telephone line so that they can listen to conversations between two other people. This is an example of: wiretapping.
13. A medical office uses a tablet to get information about patients’ health history, but the Wi-Fi might not be secure, and someone could steal private data. This is a concern about: data confidentiality.
14. Which of these is NOT an example of intellectual property? Hardware you purchased.
15. What is the difference between data and information? Data is raw facts; information has meaning.
I hope these responses are helpful. Let me know if you need more information on any of the questions.