A consumer would like to print photographs stored on a cloud storage account using a third party online printing service. After successfully logging into the cloud account, the customer is automatically given access to the third party online printing service. What allowed this automatic authentication to occur?
The user is on an unencrypted network and the password for the cloud storage service is viewable by the online printing service.
The cloud storage service is an approved application for the online printing service.
The account information for the cloud storage service was intercepted by a malicious application.
The password entered by the user for the online printing service is the same as the password used on the cloud storage service.
How can a user prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hot spot?
Use WPA2 encryption.
Connect with a VPN service.
Create strong and unique passwords.
A network administrator is conducting a training session to office staff on how to create a strong and effective password. Which password would most likely take the longest for a malicious user to guess or break?
Which configuration on a wireless router is not considered to be adequate security for a wireless network?
prevent the broadcast of an SSID
implement WPA2 encryption
enabling wireless security
modify the default SSID and password of a wireless router
What is the best method to prevent Bluetooth from being exploited?
Always disable Bluetooth when it is not actively used.
Always use a VPN when connecting with Bluetooth.
Only use Bluetooth when connecting to a known SSID.
Only use Bluetooth to connect to another smartphone or tablet.
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?
two factor authentication
A user is having difficulty remembering passwords for multiple online accounts. What is the best solution for the user to try?
Share the passwords with the network administrator or computer technician.
Create a single strong password to be used across all online accounts.
Save the passwords in a centralized password manager program.
Write the passwords down and place them out of sight.
As data is being stored on a local hard disk, which method would secure the data from unauthorized access?ITC Chapter 3 Quiz Answers 005