Digital Security Awareness
Module 8: Security from End-to-End
- True or False Hand held electronics offer a variety of encryption, location, and wiping software solutions in case of theft.
Answer true or false
- True
- False
==================================================
2. The best protection for data on your laptop is what?
Choose one answer.
- Compression
- Encryption
- Password protection
- Cable lock
==================================================
3. True or False: There are no downsides to running AV software on the workstation.
Answer true or false
- True
- False
==================================================
4. ______________ is the best protection for data being transmitted.
Choose one answer.
- Encryption
- Decryption
- Compression
- Direct connection
==================================================
5. True or False: Your home could be the place a hacker is targeting.
Answer true or false
- True
- False
==================================================
6. True or False: By default, e-mail is sent as unencrypted text files.
Answer true or false
- True
- False
==================================================
7. What could you use to prevent shoulder surfing data on your monitor?
- Verbal warnings
- Turn off the monitor
- Cover with paper
- A screen cover
==================================================
8. Opening a door at a secure facility for someone else to enter without using their key card would be an example of what?
Choose one answer.
- Burglary
- Tailgating
- Piggybacking
- Lock picking
==================================================
9. What does Windows incorporate for an entire disk encryption scheme?
Choose one answer.
- Winrar
- Winzip
- EFS
- BitLocker
==================================================
10. What file-based encryption does Windows build into the NTFS file system?
Choose one answer.
- Winrar
- EFS
- BitLocker
- Winzip