Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
A worm is capable of replicating itself automatically while affecting data.
Spyware
Digital signature
Encryption
Digital certificate
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
The company can read your personal e-mail messages.
Purchase domain names that are similar to their actual domain names
Your company has provided you with a desktop computer at work. You have configured your e-mail client on this work computer to include your personal e-mail account so you can download messages and check personal e-mail. Which of the following is true
A worm is capable of replicating itself automatically while affecting data.
Spyware
Digital signature
Encryption
Digital certificate
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
The company can read your personal e-mail messages.
Purchase domain names that are similar to their actual domain names
You receive an unexpected e-mail with an attachment from a co-worker. You call her to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. What should the co-worker do?
A worm is capable of replicating itself automatically while affecting data.
Spyware
Digital signature
Encryption
Digital certificate
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
The company can read your personal e-mail messages.
Purchase domain names that are similar to their actual domain names
Which term is used to describe the process that converts data into an unreadable form of text?
A worm is capable of replicating itself automatically while affecting data.
Spyware
Digital signature
Encryption
Digital certificate
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
The company can read your personal e-mail messages.
Purchase domain names that are similar to their actual domain names
Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?
A worm is capable of replicating itself automatically while affecting data.
Spyware
Digital signature
Encryption
Digital certificate
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
The company can read your personal e-mail messages.
Purchase domain names that are similar to their actual domain names
Which of the following is an effective way for Web site owners to prevent typosquatting?
A worm is capable of replicating itself automatically while affecting data.
Spyware
Digital signature
Encryption
Digital certificate
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
The company can read your personal e-mail messages.
Purchase domain names that are similar to their actual domain names
Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?
A worm is capable of replicating itself automatically while affecting data.
Spyware
Digital signature
Encryption
Digital certificate
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
The company can read your personal e-mail messages.
Purchase domain names that are similar to their actual domain names
What distinguishes a worm from a virus?
A worm is capable of replicating itself automatically while affecting data.
Spyware
Digital signature
Encryption
Digital certificate
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
The company can read your personal e-mail messages.
Purchase domain names that are similar to their actual domain names
Check it!