{"id":5947,"date":"2022-11-09T17:20:18","date_gmt":"2022-11-09T11:20:18","guid":{"rendered":"https:\/\/mcqacademy.com\/en\/?post_type=mcq&#038;p=5947"},"modified":"2022-11-24T19:47:31","modified_gmt":"2022-11-24T13:47:31","slug":"a-small-company-is-moving-towards-sharing-printers-to-reduce-the-number-of-printers-used-within-the-company-the-technician-has-security-concerns-what-security-risk-is-associated-with-sharing-a-print","status":"publish","type":"mcq","link":"https:\/\/mcqacademy.com\/en\/mcq\/a-small-company-is-moving-towards-sharing-printers-to-reduce-the-number-of-printers-used-within-the-company-the-technician-has-security-concerns-what-security-risk-is-associated-with-sharing-a-print\/","title":{"rendered":"A small company is moving towards sharing printers to reduce &#8230; The technician has security concerns. What security risk is associated with sharing a printer?"},"content":{"rendered":"\n<p>A small company is moving towards sharing printers to reduce the number of printers used within the company. The technician has security concerns. What security risk is associated with sharing a printer?<\/p>\n","protected":false},"author":1158,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","topic":[955],"subject":[954],"class_list":["post-5947","mcq","type-mcq","status-publish","hentry","topic-introduction-to-computer-studies","subject-information-technology-essentials"],"mcq_note":"<strong>Explanation:<\/strong>\r\n\r\nThree security concerns related to shared printers include (1) cached print files that could contain sensitive data; (2) user authentication is needed to control access to the printer; and (3) print jobs that could be read by others, intercepted, copied, or modified. Dumpster diving and shoulder surfing are security concerns whether the printer is shared or not. A replay attack is where a packet is captured, altered, and sent back to the original destination. Print jobs are not commonly returned to the sender.","mcq_options":[{"right":"no","answer":"shoulder surfing"},{"right":"no","answer":"dumpster diving"},{"right":"yes","answer":"data privacy"},{"right":"no","answer":"replay attacks"}],"multi_answers":"no","subject_terms":[{"id":954,"title":"Information Technology Essentials (ITE)","slug":"information-technology-essentials"}],"topic_terms":[{"id":955,"title":"Introduction to Computer Studies","slug":"introduction-to-computer-studies"}],"_links":{"self":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/mcq\/5947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/mcq"}],"about":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/types\/mcq"}],"author":[{"embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/users\/1158"}],"replies":[{"embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/comments?post=5947"}],"wp:attachment":[{"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/media?parent=5947"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/topic?post=5947"},{"taxonomy":"subject","embeddable":true,"href":"https:\/\/mcqacademy.com\/en\/wp-json\/wp\/v2\/subject?post=5947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}