When data is stored on local hard disk which method will secure the data from unauthorized access?

Try the new Google Books

Check out the new look and enjoy easier access to your favorite features

When data is stored on local hard disk which method will secure the data from unauthorized access?

  • Group of answer choices a duplicate hard drive copy
  • two factor authentication
  • deletion of sensitive files
  • data encryption
    Answers Explanation & Hints:

    Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.

In this Blog, we have provided the answers of ITC Chapter 3 Quiz.

Q1. Which technology removes direct equipment and maintenance costs from the user for data backups?

  • a cloud service
  • network attached storage
  • a tape
  • an external hard driveA user is surfing the Internet using a laptop from a public WiFi cafe.
Explanation: The cost of cloud storage commonly depends on the amount of storage space needed. The cloud provider will maintain the equipment and the cloud user will have access to the backup data.

Q2. A user is surfing the Internet using a laptop from a public WiFi cafe. What should be checked first when the user connects to the public network?

  • if the laptop has a master password set to secure the passwords stored in the password manager
  • if the laptop requires user authentication for file and media sharing
  • if the laptop web browser is operating in private mode
  • if the laptop Bluetooth adapter is disabled
Explanation: When a user connects to a public network, it is important to know if the computer is configured with file and media sharing and that it requires user authentication with encryption.

Q3. How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?

  • Use only an encrypted connection to access websites.
  • Move any downloaded files to the recycle bin.
  • Reboot the computer after closing the web browser.
  • Operate the web browser in private browser mode.
Explanation: When a computer user browses the web in private mode, the following occurs: Cookies are disabled. Temporary Internet files are removed after closing the window. Browsing history is removed after closing the window.

Q4. Why do IoT devices pose a greater risk than other computing devices on a network?

  • Most IoT devices do not receive frequent firmware updates.
  • IoT devices cannot function on an isolated network with only an Internet connection.
  • Most IoT devices do not require an Internet connection and are unable to receive new updates.
  • IoT devices require unencrypted wireless connections.
Explanation: IoT devices commonly operate using their original firmware and do not receive updates as frequently as laptops, desktops, and mobile platforms.

Q5. A consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After successfully logging into the cloud account, the customer is automatically given access to the third party online printing service. What allowed this automatic authentication to occur?

  • The user is on an unencrypted network and the password for the cloud storage service is viewable by the online printing service.
  • The cloud storage service is an approved application for the online printing service.
  • The account information for the cloud storage service was intercepted by a malicious application.
  • The password entered by the user for the online printing service is the same as the password used on the cloud storage service.

Q6. How can a user prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hot spot?

  • Use WPA2 encryption.
  • Connect with a VPN service.
  • Disable Bluetooth.
  • Create strong and unique passwords.

Q7. A network administrator is conducting a training session to office staff on how to create a strong and effective password. Which password would most likely take the longest for a malicious user to guess or break?

  • super3secret2password1
  • 10characters
  • drninjaphd
  • mk$$cittykat104#

Q8. Which configuration on a wireless router is not considered to be adequate security for a wireless network?

  • prevent the broadcast of an SSID
  • implement WPA2 encryption
  • enabling wireless security
  • modify the default SSID and password of a wireless router

Q9. What is the best method to prevent Bluetooth from being exploited?

  • Always disable Bluetooth when it is not actively used.
  • Always use a VPN when connecting with Bluetooth.
  • Only use Bluetooth when connecting to a known SSID.
  • Only use Bluetooth to connect to another smartphone or tablet.

Q10. Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?

  • two factor authentication
  • firewall
  • password manager
  • antispyware

Q11. A user is having difficulty remembering passwords for multiple online accounts. What is the best solution for the user to try?

  • Share the passwords with the network administrator or computer technician.
  • Create a single strong password to be used across all online accounts.
  • Save the passwords in a centralized password manager program.
  • Write the passwords down and place them out of sight.

Q12. As data is being stored on a local hard disk, which method would secure the data from unauthorized access?

  • a duplicate hard drive copy
  • two factor authentication
  • data encryption
  • deletion of sensitive files

Q13. A user is surfing the Internet using a laptop at a public WiFi cafe. What should be checked first when the user connects to the public network? Select one:

  • if the laptop requires user authentication for file and media sharing
  • if the laptop Bluetooth adapter is disabled
  • if the laptop web browser is operating in private mode
  • if the laptop has a master password set to secure the passwords stored in the password manager

Join Our Telegram For PDF Download

NOTE: If you have a new question on this test, please comment Question and Multiple-Choice list in the form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website

ITC Chapter 1 Ethics Quiz Answers

ITC Chapter 1 Quiz Answers

ITC Chapter 2 Quiz Answers

Would love your thoughts, please comment.x

← What is another name for confidentiality of information?

← What popular encryption algorithm requires that both the sender and receiver know a pre-shared key?

Last Updated on June 14, 2021 by Admin

IT Essentials 7 Chapter 13 Quiz Answers 2020 correct 100%

    • Group of answer choices ports
    • protocols
    • packet speed
    • MAC addresses
    • packet size
      Answers Explanation & Hints:

      Hardware firewalls can be configured as packet filters, application layer firewalls, or proxies. Application layer firewalls read all of the traffic data and look for unwanted traffic. Proxies act as relays, scanning traffic and allowing or denying traffic based on established rules. Packet filters only concern themselves with port data, IP address data, and destination services.

    • Group of answer choices a duplicate hard drive copy
    • two factor authentication
    • deletion of sensitive files
    • data encryption
      Answers Explanation & Hints:

      Data encryption is the process of converting data into a form where only a trusted, authorized person with a secret key or password can decrypt the data and access the original form.

    • Group of answer choices worm
    • stealth virus
    • phishing
    • adware
      Answers Explanation & Hints:

      Phishing attacks use social engineering to obtain user personal information. Viruses carry malicious executable code that runs on target machines. Worms propagate through the network consuming bandwidth resources. Adware, on the other hand, results in pop-up windows directing users to malicious sites.

    • Group of answer choices TPM
    • BitLocker
    • BitLocker To Go
    • VPN
      Answers Explanation & Hints:

      BitLocker To Go supports encrypting removable drives, but does not require a TPM chip. However, it does require a password.

    • Group of answer choices ActiveX
    • permission
    • right
    • firewall
      Answers Explanation & Hints:

      A right authorizes a user to perform an action on a computer like performing backups. A permission is a rule that is associated with a particular object like a file, folder, or printer.

    • Group of answer choices Ensure that all applications are working.
    • Ask what the problem is that the customer is experiencing.
    • Boot the system in Safe Mode.
    • Disconnect the system from the network.
      Answers Explanation & Hints:

      The last step before documenting findings is to verify full system functionality. Ensuring that all of the applications are working would be an example of verifying functionality. Asking what problem is that the user is experiencing is part of the first step: identifying the problem. Disconnecting from the network and rebooting in Safe Mode are both examples of the third step: determining an exact cause.

    • Group of answer choices Immediately remove the device from the network.
    • Add an authorized wireless access point to the network to extend coverage for the employee.
    • Make sure that the wireless router is not broadcasting an SSID.
    • Consult the company security policy to decide on actions to take against the employee.
    • Create a guest account for the employee to use when outside the building.
      Answers Explanation & Hints:

      Adding an unauthorized wireless router or access point to a company network is a serious potential security threat. The device should be removed from the network immediately in order to mitigate the threat. In addition, the employee should be disciplined. The company security policy, which employees agree to, should describe penalties for behavior that threatens the security of the company.

    • Group of answer choices identification and authentication policy
    • remote access policy
    • acceptable use policy
    • incident handling policy
      Answers Explanation & Hints:

      A company security policy commonly contains incident handling procedures used when a security breach occurs.

    • Group of answer choices login
    • synchronous
    • multifactor
    • cryptic
    • BIOS
      Answers Explanation & Hints:

      Three types of password protection that can be used to secure a workstation are the BIOS password configured through the BIOS Setup program; a login password such as a PIN, Windows, or picture password; and a network password that is kept on a server.

    • Group of answer choices adware
    • ransomware
    • spyware
    • Trojan
      Answers Explanation & Hints:

      Ransomware requires payment for access to the computer or files. Bitcoin is a type of digital currency that does not go through a particular bank.

    • Group of answer choices multifactor
    • low-level
    • standard
    • EFS
      Answers Explanation & Hints:

      The two types of formatting that can be performed on a mechanical hard drive are low-level and standard. The low-level format is commonly performed at the factory. The standard format only recreates the boot sector and file allocation table.

    • Group of answer choices Enforce password history
    • Maximum password age
    • Password must meet complexity requirements
    • Minimum password length
      Answers Explanation & Hints:

      The maximum password age setting defines the maximum number of days that can pass before the password must be changed.

    • Group of answer choices Unseat and then reconnect the hard drive connectors on the host.
    • Disconnect the host from the network.
    • Examine the Device Manager on the host for device conflicts.
    • Check the host hard drive for errors and file system issues.
      Answers Explanation & Hints:

      If a network is experiencing an extremely high volume of traffic, disconnecting a host from the network may confirm that the host is compromised and is flooding traffic onto the network. The other issues are hardware issues, and not typically security-related.

    • Group of answer choices an unidentified person claiming to be a technician collecting user information from employees
    • a computer displaying unauthorized pop-ups and adware
    • the infection of a computer by a virus carried by a Trojan
    • an anonymous programmer directing a DDoS attack on a data center
      Answers Explanation & Hints:

      A social engineer attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, pop-ups, and viruses are all examples of software based security threats, not social engineering.

    • Group of answer choices autorun
    • phishing
    • privacy screen
    • pop-up
      Answers Explanation & Hints:

      Most web browsers offer a pop-up blocker. In Internet Explorer, use the Tools icon to enable.