Which of the following data is not considered personal data?
Pet's Name
A vulnerability of the Diffie-Hellman's Key Exchange is a lack of?
authentication
Which file system would be the best choice to use in a drive that will be used with both Windows 10 and macOS?
FAT32
Which of the following settings could be changed in order to increase your browsing speed?
Client-side scripting is disabled
Which statement is true about cross-platform software?
Some features might vary
What does GDPR stand for?
General Data Protection Regulation
What is the term used in cryptography when the same key is used to encrypt and decrypt the data?
Symmetric Encryption
Which of the following file types would enable an audio file to work on both Windows and macOS?
Which of the following can be used to filter which sites are allowed through to the browser?
proxy settings
Which of the following are saved even when in private browsing?
Bookmarks
Which of the following describes the purpose of the GDPR and the CCPA?
To protect individuals' personal data rights
Which of the following statements about passphrases is true?
Passphrases are longer than passwords, making them more secure
Your computer crashed! Your data was not corrupted due to which feature of your NTFS system drive?
journaling
Which of the following security features is put into place to ensure correct authorization?
Account permissions
One tier
In the context of evaluation electronic information resources, what does "bias" refer to?
A skewed or one-sided perspective in the information
Why is multifactor authentication more secure than single-factor authentication?
It requires multiple forms of identify verification
You'd like to add features to a calendar app with the permission of the vendor without paying any licensing fees. What type of license is required to be able to do this?
Open source
You type in pwd and find your current folder path is ~/Users/student/Documents/Cybersecurity/Images. What command will place you inside the Cybersecurity folder?
cd ..
An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert?
Antivirus Software
What is the primary goal of information literacy?
To evaluate, use, and ethically manage information
Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. What is the Ciphertext?
OLSSV
In a three-tier application architecture example, which device runs the presentation layer?
Client computer
Which command will allow you to see all running programs and applications on your computer?
ps
Which of the following is the most secure password?
@ppl3!2
apple-spoon-horse-painting
apple123
@ppL3P!e
apple-spoon-horse-painting