ICT when then network and internet fails
17 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

deals with the fundamental human rights of a person’s privacy on the Internet, including the rights to the privacy of an owner's displayed, stored, and confidential information.

  • Data Protection
  • Internet Privacy (correct)
  • Cybersecurity
  • Digital Rights Management
  • Web browsers such as ________ and _______ are the most used browsers online for their specific features and familiarity, although a total security guarantee is not automatic.

  • Google Chrome and Mozilla Firefox (correct)
  • Safari and Edge
  • Opera and Brave
  • Internet Explorer and Vivaldi
  • It is the best way to have Internet privacy. It does not just change the IP address; it also protects incoming and outgoing Internet traffic with extensive encryption. Online activities and personal information stay secure and private from snoopers because of this technology

  • Proxy Server
  • Tor Network
  • Virtual Private Network (correct)
  • Firewall
  • Never trust links from suspicious emails, sketchy websites, and advertisements. Double-check the URL to see if it has the correct format before clicking

    <p>True</p> Signup and view all the answers

    Social media platforms like Instagram, Facebook, and Twitter are all publicly inaccessible. Their privacy protection is optional by locking the account or making it private.

    <p>False</p> Signup and view all the answers

    What is an added verification step besides a conventional password?

    <p>Multi-factor Authentication</p> Signup and view all the answers

    It ensures the integrity, confidentiality, and accessibility of computer networks. It is relevant when cybercriminals are becoming more dominant in exploiting new users and enterprises, then it is vital to take extra precautions to avoid any data breach.

    <p>Network Security</p> Signup and view all the answers

    It was previously stated that it monitors and filters incoming and outgoing network traffic. Additionally, it serves as a “wall,” either hardware or software, between the trusted internal and untrusted external Internet by only allowing the verified traffic based on the predetermined set of rules in place.

    <p>Firewall</p> Signup and view all the answers

    What is the software or device used for closely monitoring a network for any malicious activity or intrusion?

    <p>Intrusion Detection System (IDS)</p> Signup and view all the answers

    What is the latest wireless network security certificate protocol by the Wi-Fi alliance that focuses its filtering at the 'entry' when a new device requests to connect to the network?

    <p>Wi-Fi Protected Access 3 (WPA3)</p> Signup and view all the answers

    t connects any remote device to an enterprise server wherein company data is hosted. 1It piggybacks on a public network to directly access the server, ensuring that the users' online activities are publicly hidden. This feature makes it one of the most powerful network security tools.

    <p>Virtual Private Network (VPN)</p> Signup and view all the answers

    As emails allow scripts to be embedded inside the device, it is easier for anyone to write a code, attach it to an email, then send it. Receivers tend to click this email which can comprise the device.

    <p>Email Security</p> Signup and view all the answers

    One of the most significant consequences companies face during an internet or network downtime is _______. Even if the downtime only lasts minutes, it still puts operations and transactions on hold, which is considered a _______ for these companies.

    <p>Revenue Loss</p> Signup and view all the answers

    Repairing damaged internet and network lines consumes both time and ________, including acquiring new cables and upgraded network devices for replacement. Daily monitoring of the cables and network devices is encouraged to prevent sudden company downtime.

    <p>Maintenance Cost</p> Signup and view all the answers

    Internet and network failure significantly affect productivity as tasks heavily rely on the internet. Employees will remain stagnant until the downtime is fixed, causing low productivity outcomes

    <p>Lesser Productivity</p> Signup and view all the answers

    If internet and network failures regularly occur, it negatively impacts the employees and the company’s clients and partners. Reoccurring internet and network problems could be interpreted as negligence, reflecting bad management and maintenance

    <p>Damaged Reputation</p> Signup and view all the answers

    Failures in operations and transactions mean failure to meet agreed-upon outputs and deliverables on time. It could lead to _______, especially when crucial outputs are at risk.

    <p>Legal Repercussions</p> Signup and view all the answers

    More Like This

    Internet Privacy and Data Sources Quiz
    6 questions
    Privacy and Internet Security
    5 questions
    Internet Privacy Awareness Quiz
    6 questions

    Internet Privacy Awareness Quiz

    GreatestHeliotrope6567 avatar
    GreatestHeliotrope6567
    Internet Privacy and Software Ethics Quiz
    17 questions
    Use Quizgecko on...
    Browser
    Browser