CISCO Introduction to IoT Chapter 5 Quiz Answers

Are you looking for CISCO Introduction to IoT Chapter 5 Quiz Answers? ✅✅✅ If yes then here you will find CISCO Introduction to IoT Chapter 5 Answers. Before appearing in the CISCO Introduction to IoT exam, I followed this article, and it helped me with answers to the CISCO IOT Chapter 5 exam answers. If you are following this article, I’m sure you will also pass the exam.

CISCO Introduction to IoT Answers [All Chapter]

CISCO Introduction to IoT Chapter 5 Quiz Answers

CISCO Introduction to IoT Chapter 5 Quiz Answers

1. How can a virtual assistant be a security risk?

  1. Personal devices could be remotely seen.
  2. Sensor options could be modified.
  3. Encryption protocols are not supported.
  4. Personal information could be leaked.

2. Which three passwords are the least secure? (Choose three.)

  1. s3CurE_p@ss
  2. asdfghjkl
  3. randolph
  4. 34%cafe_!
  5. Ci3c0_RocK$
  6. 135792468

3. How are USB flash drives a security risk?

  1. They contain wireless antennas.
  2. They have a controller that can be infected.
  3. They cannot be encrypted.
  4. They contain a remote sensor.

4. Why would an IT person use Zabasearch?

  1. to research a business
  2. to research an app
  3. to research a person
  4. to research an IoT device

5. Which action can help reduce online risk?

  1. only accept unsolicited software updates when logged into a secure network
  2. only click embedded links in email messages from friends
  3. only conduct transactions on websites after verifying the URL is correct
  4. only download programs with the most positive reviews on 3rd party websites

6. What are three examples of personally identifiable information? (Choose three.)

  1. home water usage
  2. vehicle identification number
  3. home thermometer value
  4. vehicle fuel consumption
  5. bank account number
  6. birth date

7. Match the security best practice to the description.

  1. implementing human resource security measures → research and perform background checks on employees
  2. employing access controls → assign user roles and privilege levels
  3. educating users → train users on security
  4. regularly testing incident responses → perform and test emergency response scenarios

8. Which two online activities pose high security risks? (Choose two.)

  1. using a VPN to access the Internet from a Wi-Fi hot spot
  2. following email links that have already been scanned by the email server
  3. creating a very complex password for a new account and storing it in a password manager service
  4. verifying a banking site URL before entering information
  5. sharing information on social media

9. Which three elements should be combined when creating a strong password? (Choose three.)

  1. personal information
  2. combinations of letters and numbers
  3. pet names
  4. special characters
  5. dictionary words
  6. phrases

10. What is a goal of performing a risk assessment?

  1. outlining job duties and expectations
  2. educating users in secure procedures
  3. valuing assets to justify security expenditures
  4. restricting access to physical assets

11. An employee is using a coffee shop Wi-Fi hotspot to access corporate email. What action can the employee take to reduce the security risk of using a hotspot?

  1. Encrypt traffic through a VPN.
  2. Verify the name of the sender of emails before opening them.
  3. Only click on embedded links in email messages from trusted colleagues.
  4. Scan emails with antivirus software.

12. What is the goal of a white hat hacker?

  1. protecting data
  2. modifying data
  3. stealing data
  4. validating data

13. What is a wireless router security best practice that limits access to only specific internal hosts?

  1. MAC address filtering
  2. disabling SSID advertisements
  3. enabling encryption
  4. enabling the built-in firewall

14. What is used to identify a wireless network?

  1. IP address
  2. MAC address
  3. SPI
  4. SSID

15. What are two recommended steps to protect and secure a wireless network? (Choose two.)

  1. Use WPA2-AES encryption.
  2. Locate the wireless router where it is accessible to users.
  3. Update firmware.
  4. Use the default SSID.
  5. Enable remote management.

Conclusion

I hope now you know the correct answer to all the CISCO Introduction to IoT Chapter 5. If this article helped you find the CISCO Introduction to IoT Chapter 5 Answer, don’t forget to share it with your friends looking for the Introduction to IoT Answers.

Leave a Comment