Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
The level of secrecy offered by encryption is dependent on:
User names and passwords
the type of encryption used and the size of the key.
An international copyright does not exist.
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
The lessons explaining DNA concepts on the www.DNAftb.org Web site
You opened an e-mail attachment.
Scramble text using mathematical algorithms
Preventing data from being intercepted by malicious outsiders
You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?
User names and passwords
the type of encryption used and the size of the key.
An international copyright does not exist.
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
The lessons explaining DNA concepts on the www.DNAftb.org Web site
You opened an e-mail attachment.
Scramble text using mathematical algorithms
Preventing data from being intercepted by malicious outsiders
Which is the most common method used to authenticate users on private and public computer networks?
User names and passwords
the type of encryption used and the size of the key.
An international copyright does not exist.
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
The lessons explaining DNA concepts on the www.DNAftb.org Web site
You opened an e-mail attachment.
Scramble text using mathematical algorithms
Preventing data from being intercepted by malicious outsiders
Which of the following is protected by copyright?
User names and passwords
the type of encryption used and the size of the key.
An international copyright does not exist.
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
The lessons explaining DNA concepts on the www.DNAftb.org Web site
You opened an e-mail attachment.
Scramble text using mathematical algorithms
Preventing data from being intercepted by malicious outsiders
Which statement best describes asymmetric-key encryption?
User names and passwords
the type of encryption used and the size of the key.
An international copyright does not exist.
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
The lessons explaining DNA concepts on the www.DNAftb.org Web site
You opened an e-mail attachment.
Scramble text using mathematical algorithms
Preventing data from being intercepted by malicious outsiders
What do encryption applications do to render text unreadable?
User names and passwords
the type of encryption used and the size of the key.
An international copyright does not exist.
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
The lessons explaining DNA concepts on the www.DNAftb.org Web site
You opened an e-mail attachment.
Scramble text using mathematical algorithms
Preventing data from being intercepted by malicious outsiders
Which statement is true regarding international copyrights of digital information?
User names and passwords
the type of encryption used and the size of the key.
An international copyright does not exist.
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
The lessons explaining DNA concepts on the www.DNAftb.org Web site
You opened an e-mail attachment.
Scramble text using mathematical algorithms
Preventing data from being intercepted by malicious outsiders
Your company's IT department enforces the use of 128-bit encryption. Your department also protects the company encryption keys to ensure secure transmissions. Which choice is an important reason for encrypting the company's network transmissions?
User names and passwords
the type of encryption used and the size of the key.
An international copyright does not exist.
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
The lessons explaining DNA concepts on the www.DNAftb.org Web site
You opened an e-mail attachment.
Scramble text using mathematical algorithms
Preventing data from being intercepted by malicious outsiders
Check it!