Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
Sensitive data (such as credit card information) should be secured using authentication and encryption when transmitting it over the Internet. Which protocol do most servers use to exchange sensitive data over the Internet?
Digital signature
A proxy server replaces the network IP address with another, contingent address.
Opening attachments
Illicit server
Secure Sockets Layer (SSL)
customize the site to the site visitor's Web browsing preferences.
a user name, a password, and encryption of this information.
Monitor the messages this employee sends and receives via e-mail.
How does a proxy server protect a corporate network from unwanted Internet activity?
Digital signature
A proxy server replaces the network IP address with another, contingent address.
Opening attachments
Illicit server
Secure Sockets Layer (SSL)
customize the site to the site visitor's Web browsing preferences.
a user name, a password, and encryption of this information.
Monitor the messages this employee sends and receives via e-mail.
Which of the following is the most common method for spreading viruses?
Digital signature
A proxy server replaces the network IP address with another, contingent address.
Opening attachments
Illicit server
Secure Sockets Layer (SSL)
customize the site to the site visitor's Web browsing preferences.
a user name, a password, and encryption of this information.
Monitor the messages this employee sends and receives via e-mail.
A cookie is a text file that is placed on a Web site visitor's computer. Cookies allow a Web site manager to:
Digital signature
A proxy server replaces the network IP address with another, contingent address.
Opening attachments
Illicit server
Secure Sockets Layer (SSL)
customize the site to the site visitor's Web browsing preferences.
a user name, a password, and encryption of this information.
Monitor the messages this employee sends and receives via e-mail.
Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?
Digital signature
A proxy server replaces the network IP address with another, contingent address.
Opening attachments
Illicit server
Secure Sockets Layer (SSL)
customize the site to the site visitor's Web browsing preferences.
a user name, a password, and encryption of this information.
Monitor the messages this employee sends and receives via e-mail.
Secure authentication requires:
Digital signature
A proxy server replaces the network IP address with another, contingent address.
Opening attachments
Illicit server
Secure Sockets Layer (SSL)
customize the site to the site visitor's Web browsing preferences.
a user name, a password, and encryption of this information.
Monitor the messages this employee sends and receives via e-mail.
Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?
Digital signature
A proxy server replaces the network IP address with another, contingent address.
Opening attachments
Illicit server
Secure Sockets Layer (SSL)
customize the site to the site visitor's Web browsing preferences.
a user name, a password, and encryption of this information.
Monitor the messages this employee sends and receives via e-mail.
You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. Which of the following will help prevent additional malware from being installed on his computer?
Digital signature
A proxy server replaces the network IP address with another, contingent address.
Opening attachments
Illicit server
Secure Sockets Layer (SSL)
customize the site to the site visitor's Web browsing preferences.
a user name, a password, and encryption of this information.
Monitor the messages this employee sends and receives via e-mail.
Check it!