3.2.2.3 Lab – Discover Your Own Risky Online Behavior Answers

3.2.2.3 Lab – Discover Your Own Risky Online Behavior Answers Lab – Discover Your Own Risky Online Behavior (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Explore actions performed online that may compromise your safety or privacy. Background / Scenario The Internet is […]
Continue reading…

 

3.1.1.5 Lab – Create and Store Strong Passwords Answers

3.1.1.5 Lab – Create and Store Strong Passwords Answers Lab – Create and Store Strong Passwords (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Understand the concepts behind a strong password. Part 1: Explore the concepts behind creating a strong password. Part 2: […]
Continue reading…

 

1.2.2.5 Lab – What was Taken Answers

1.2.2.5 Lab – What was Taken Answers Lab – What was Taken? (Answers Version) Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only. Objectives Search for and read about a few recent occurrences of security breaches. Background / Scenario Security breaches occur when individuals or applications are […]
Continue reading…

 

ITC Chapter 1 Quiz Answers

ITC Chapter 1 Quiz Answers What three items are components of the CIA triad? (Choose three.) intervention availability scalability confidentiality integrity access Explanation: The CIA triad contains three components: confidentiality, integrity, and availability. It is a guideline for information security for an organization. What is another name for confidentiality of information? trustworthiness privacy accuracy consistency […]
Continue reading…