Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?
Blackhole list
A small text file that contains information sent between a server and a client to help track user activities
Transport Layer Security (TLS) protocol
They may introduce incompatibility issues or new security issues.
True
Information Infrastructure Task Force (IITF)
all of the above
Schedule appointments and meetings, store contact information, and manage tasks
What is a cookie?
Blackhole list
A small text file that contains information sent between a server and a client to help track user activities
Transport Layer Security (TLS) protocol
They may introduce incompatibility issues or new security issues.
True
Information Infrastructure Task Force (IITF)
all of the above
Schedule appointments and meetings, store contact information, and manage tasks
What can a personal information management (PIM) program be used for?
Blackhole list
A small text file that contains information sent between a server and a client to help track user activities
Transport Layer Security (TLS) protocol
They may introduce incompatibility issues or new security issues.
True
Information Infrastructure Task Force (IITF)
all of the above
Schedule appointments and meetings, store contact information, and manage tasks
Which of the following can administrators use to filter out the IP addresses of known spammers?
Blackhole list
A small text file that contains information sent between a server and a client to help track user activities
Transport Layer Security (TLS) protocol
They may introduce incompatibility issues or new security issues.
True
Information Infrastructure Task Force (IITF)
all of the above
Schedule appointments and meetings, store contact information, and manage tasks
Post Office Protocol version 3 (POP3) is referred to as a store-and-forward email service because
Blackhole list
A small text file that contains information sent between a server and a client to help track user activities
Transport Layer Security (TLS) protocol
They may introduce incompatibility issues or new security issues.
True
Information Infrastructure Task Force (IITF)
all of the above
Schedule appointments and meetings, store contact information, and manage tasks
What is a disadvantage to installing program patches and updates?
Blackhole list
A small text file that contains information sent between a server and a client to help track user activities
Transport Layer Security (TLS) protocol
They may introduce incompatibility issues or new security issues.
True
Information Infrastructure Task Force (IITF)
all of the above
Schedule appointments and meetings, store contact information, and manage tasks
Because messages are downloaded immediately with a POP3 server, you do not need a constant connection with the server in order to work with your email, which is beneficial for people who have dial-up connections.
Blackhole list
A small text file that contains information sent between a server and a client to help track user activities
Transport Layer Security (TLS) protocol
They may introduce incompatibility issues or new security issues.
True
Information Infrastructure Task Force (IITF)
all of the above
Schedule appointments and meetings, store contact information, and manage tasks
Which organization is responsible for codifying copyright law as it applies to digital information?
Blackhole list
A small text file that contains information sent between a server and a client to help track user activities
Transport Layer Security (TLS) protocol
They may introduce incompatibility issues or new security issues.
True
Information Infrastructure Task Force (IITF)
all of the above
Schedule appointments and meetings, store contact information, and manage tasks
Check it!