Introduction To Information Technology Lesson 8 Review: Question Preview (ID: 21897)


Below is a preview of the questions contained within the game titled INTRODUCTION TO INFORMATION TECHNOLOGY LESSON 8 REVIEW: Review Of CIW Lesson 8 .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]


Play games to reveal the correct answers. Click here to play a game and get the answers.

Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:
a) to make back-up copies of important files so that she can recover them in case of an incident. b) to call, text or IM James before opening the attachment, to verify that he intended to send it. c) to open the file attachment and use anti-virus software to scan it. d) to use anti-virus software to scan the system's hard disk before opening the attachment.
What does anti-virus software do?
a) It prevents you from opening a program or file sent to you via e-mail or instant messaging. b) It detects viruses by recognizing patterns called signature profiles, and warns you if your system is infected so you avoid t c) It fortifies computer systems over time by repeated exposure to weak but similar viruses, building immunity to newer viruses d) It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against viruses?
a) Perform regular backups of your hard drive. b) Update the definitions on your anti-virus application frequently. c) Disable your Web browser's automatic security settings so you can manually control the content you download. d) Open e-mail attachments only from unknown senders.
Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?
a) Digital signature b) Certificate authority c) Secure authentication d) Private key
You receive an unexpected e-mail with an attachment from a co-worker. You call her to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. What should the co-worker do?
a) She should ask you to forward the e-mail to her so she can open the attachment and check it. b) She should ask you to open the attachment and describe its contents. c) She should ask you to read her the e-mail message including the full name of the attachment and its extension. d) She should ask you to forward the e-mail to your company's management.
Which term is used to describe the process that converts data into an unreadable form of text?
a) Authentication b) Decryption c) Encryption d) Certification
Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?
a) Spyware b) Malware c) Illicit server d) Trojan
You are ultimately responsible for your Internet use and the possible ramifications of posting personal information to the Web. The explosion in social networking via the Web has given rise to the Right to Be Forgotten argument, which asks:
a) whether people have the right to reject the receipt of cookies from Web sites they visit. b) whether people have the right to access social networking sites when they have forgotten their user names and passwords. c) whether people have the right to remove damaging information about themselves on the Internet. d) whether people have the right to remove themselves from newsgroups to avoid receiving spam.
Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
a) Encrypted key b) Digital signature c) Firewall d) Digital certificate
Your company has provided you with a desktop computer at work. You have configured your e-mail client on this work computer to include your personal e-mail account so you can download messages and check personal e-mail. Which of the following is true
a) The company will ignore your personal e-mail messages out of respect for your privacy. b) The company will block your personal e-mail account. c) The company is required by law to allow you to receive personal e-mail messages at work. d) The company can read your personal e-mail messages.
What can you use to electronically verify your identity without the need to provide data confidentiality?
a) Digital signature b) Digital certificate c) Firewall d) Encrypted key
Which of the following is an effective way for Web site owners to prevent typosquatting?
a) Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys b) Automatically apply operating system updates and patches as they become available c) Host their Web sites on illicit servers d) Purchase domain names that are similar to their actual domain names
Which statement best describes hash encryption?
a) An encryption method in which a key is required to encrypt data for storage and verify its integrity b) An encryption method in which the same key is used to encrypt and decrypt a message c) An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message d) An encryption method in which numbers made by an algorithm from a text string are used to verify the integrity of messages
Spam can be considered an invasion of privacy because:
a) it is sent to recipients uninvited. b) it is generally excluded from Web sites' privacy policies. c) it is generally encrypted with weak encryption keys. d) it is placed on Web site visitors' computers so that Web site managers can customize their sites to the visitors' preferences
What distinguishes a worm from a virus?
a) A worm and a virus are synonymous terms for a malicious program designed to damage computer systems. b) A worm is capable of replicating itself automatically while affecting data. c) A worm does not replicate itself; it assumes control of system operations. d) A worm does not replicate itself; it damages or destroys data.
Which statement correctly compares computer viruses and worms?
a) A virus can deposit an illicit server, but a worm cannot. b) A worm can deposit an illicit server, but a virus cannot. c) A virus requires user action to replicate, but a worm can replicate by itself. d) A worm requires user action to replicate, but a virus can replicate by itself.
Which term best describes a collection of software tools that provide a permanent solution to known program bugs?
a) Algorithm b) Patch c) Update d) Firewall
Hypertext Transfer Protocol (HTTP) can be run over Secure Sockets Layer (SSL) to create the HTTPS protocol. How does HTTPS make HTTP transmission more secure?
a) By attaching digital certificates to information transmitted to and from Web servers b) By eliminating the need for user names and passwords c) By eliminating the need for digital certificates d) By encrypting and decrypting information transmitted to and from Web servers
Which cookie type remains on your system after you end your browser session?
a) Session cookie b) Persistent cookie c) First-party cookie d) Third-party cookie
Which of the following protects original works of authorship that are fixed in a tangible medium of expression, and defines an original work by the basic elements of expression and originality?
a) Trademark b) Encryption c) Copyright d) License
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from the data set above, visit ReviewGameZone.com and enter game ID number: 21897 in the upper right hand corner at ReviewGameZone.com or simply click on the link above this text.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register