One way that companies attempt to protect themselves against a DOS attack is:

(1 point)
Responses

asking their users to change their passwords frequently.

asking their users to change their passwords frequently.

using PCs instead of Macs.

using PCs instead of Macs.

testing for excessive traffic flow.

testing for excessive traffic flow.

requiring employees to sign NDAs.
------------------------------------------------------------------------------------------------------------------------------------------------------------------

Which of these is NOT an effective way to minimize a website’s downtime due to regular maintenance?

(1 point)
Responses

having an identical server

having an identical server

scheduling the maintenance at night

scheduling the maintenance at night

scheduling service during less-busy times

scheduling service during less-busy times

using a VPN
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which one of these is NOT likely to result in a data availability issue?

(1 point)
Responses

DOS attack

DOS attack

power outage

power outage

identity theft

identity theft

hardware failure
------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these can help prevent snooping for someone who uses their laptop in busy airports?

(1 point)
Responses

dual-factor authentication

dual-factor authentication

a strong password

a strong password

a screen-darkening filter

a screen-darkening filter

storing data in the cloud

------------------------------------------------------------------------------------------------------------------------------------------------------------------

A thief purchases old phones, tablets, and computers from flea markets in the hopes of finding personal data on them that they can use to steal information. This is an example of:

(1 point)
Responses

dumpster diving.

dumpster diving.

data integration.

data integration.

vishing.

vishing.

social engineering.
------------------------------------------------------------------------------------------------------------------------------------------------------------------

Which strategy is the MOST effective in protecting data from natural disasters?

(1 point)
Responses

two-factor authentication

two-factor authentication

a VPN

a VPN

off-site data storage

off-site data storage

keeping track of the age of hardware

------------------------------------------------------------------------------------------------------------------------------------------------------------------
If someone changes data so that it is no longer accurate, which of the following has been compromised?

(1 point)
Responses

confidentiality

confidentiality

availability

availability

portability

portability

integrity
------------------------------------------------------------------------------------------------------------------------------------------------------------------
What is the difference between a violation of data confidentiality and a man-in-the-middle attack?

(1 point)
Responses

Violations of data confidentiality always involve changing the data.

Violations of data confidentiality always involve changing the data.

Violations of data confidentiality always involve social engineering.

Violations of data confidentiality always involve social engineering.

A man-in-the-middle attack always involves changing the data.

A man-in-the-middle attack always involves changing the data.

A man-in-the-middle attack always involves social engineering.

------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these is an example of data mining?

(1 point)
Responses

Data is converted from CSV to Excel format.

Data is converted from CSV to Excel format.

Data is used to decide which products to stock in a store.

Data is used to decide which products to stock in a store.

Data is moved from the cloud to a hard drive.

Data is moved from the cloud to a hard drive.

Data is stolen from a competitor.

------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these is NOT one of the three main aspects of keeping data secure?

(1 point)
Responses

confidentiality

confidentiality

availability

availability

portability

portability

integrity

------------------------------------------------------------------------------------------------------------------------------------------------------------------
Which of these is NOT a way to help prevent hardware failure?

(1 point)
Responses

performing regular maintenance

performing regular maintenance

using a hard drive instead of the cloud

using a hard drive instead of the cloud

training workers to turn computers off when they aren’t using them

training workers to turn computers off when they aren’t using them

replacing items before they break

------------------------------------------------------------------------------------------------------------------------------------------------------------------
In a movie, a secret agent puts a small device on a telephone line so that they can listen to conversations between two other people. This is an example of:

(1 point)
Responses

snooping.

snooping.

social engineering.

social engineering.

wiretapping.

wiretapping.

data confidentiality.
------------------------------------------------------------------------------------------------------------------------------------------------------------------

A medical office uses a tablet to get information about patients’ health history, but the Wi-Fi might not be secure, and someone could steal private data. This is a concern about:

(1 point)
Responses

data confidentiality.

data confidentiality.

data availability.

data availability.

data portability.

data portability.

data integrity.

------------------------------------------------------------------------------------------------------------------------------------------------------------------

Which of these is NOT an example of intellectual property?

(1 point)
Responses

a song you wrote

a song you wrote

an article you published

an article you published

hardware you purchased

hardware you purchased

a sculpture you created
------------------------------------------------------------------------------------------------------------------------------------------------------------------
What is the difference between data and information?

(1 point)
Responses

Data is private; information is public.

Data is private; information is public.

Data is public; information is private.

Data is public; information is private.

Data is raw facts; information has meaning.

Data is raw facts; information has meaning.

Data has meaning; information is raw facts.

------------------------------------------------------------------------------------------------------------------------------------------------------------------

If a company encrypts data on a server and requires a password to access it, they are protecting the data’s:

(1 point)
Responses

integrity.

integrity.

availability.

availability.

confidentiality.

confidentiality.

portability.
------------------------------------------------------------------------------------------------------------------------------------------------------------------

you only answered one question.. and each question is not more than one answer, so Idk what you even did with that one. There's only one correct answer and it copies what I type more than once.

I apologize for the confusion. Let me provide a single correct response for each of the questions:

1. One way that companies attempt to protect themselves against a DOS attack is: testing for excessive traffic flow.

2. Which of these is NOT an effective way to minimize a website’s downtime due to regular maintenance? Using a VPN.

3. Which one of these is NOT likely to result in a data availability issue? Identity theft.

4. Which of these can help prevent snooping for someone who uses their laptop in busy airports? A screen-darkening filter.

5. A thief purchases old phones, tablets, and computers from flea markets in the hopes of finding personal data on them that they can use to steal information. This is an example of: dumpster diving.

6. Which strategy is the MOST effective in protecting data from natural disasters? Off-site data storage.

7. If someone changes data so that it is no longer accurate, which of the following has been compromised? Integrity.

8. What is the difference between a violation of data confidentiality and a man-in-the-middle attack? A man-in-the-middle attack always involves changing the data.

9. Which of these is an example of data mining? Data is used to decide which products to stock in a store.

10. Which of these is NOT one of the three main aspects of keeping data secure? Portability.

11. Which of these is NOT a way to help prevent hardware failure? Using a hard drive instead of the cloud.

12. In a movie, a secret agent puts a small device on a telephone line so that they can listen to conversations between two other people. This is an example of: wiretapping.

13. A medical office uses a tablet to get information about patients’ health history, but the Wi-Fi might not be secure, and someone could steal private data. This is a concern about: data confidentiality.

14. Which of these is NOT an example of intellectual property? Hardware you purchased.

15. What is the difference between data and information? Data is raw facts; information has meaning.

I hope these responses are helpful. Let me know if you need more information on any of the questions.