Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
What is spyware?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
256-bit encryption.
Asymmetric encryption
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
whose specific intent is to harm computer systems.
An application that installs hidden services on systems
You are visiting a Website that has no protection from unauthorized users
The connectivity that makes the Internet possible also makes systems vulnerable to:
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
256-bit encryption.
Asymmetric encryption
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
whose specific intent is to harm computer systems.
An application that installs hidden services on systems
You are visiting a Website that has no protection from unauthorized users
Malware is a generic term for software:
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
256-bit encryption.
Asymmetric encryption
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
whose specific intent is to harm computer systems.
An application that installs hidden services on systems
You are visiting a Website that has no protection from unauthorized users
To comply with many Website requirements for added security, nearly all browsers support a minimum of:
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
256-bit encryption.
Asymmetric encryption
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
whose specific intent is to harm computer systems.
An application that installs hidden services on systems
You are visiting a Website that has no protection from unauthorized users
What is authentication?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
256-bit encryption.
Asymmetric encryption
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
whose specific intent is to harm computer systems.
An application that installs hidden services on systems
You are visiting a Website that has no protection from unauthorized users
In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
256-bit encryption.
Asymmetric encryption
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
whose specific intent is to harm computer systems.
An application that installs hidden services on systems
You are visiting a Website that has no protection from unauthorized users
What is an illicit server?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
256-bit encryption.
Asymmetric encryption
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
whose specific intent is to harm computer systems.
An application that installs hidden services on systems
You are visiting a Website that has no protection from unauthorized users
What does https:// at the start of a URL mean?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
256-bit encryption.
Asymmetric encryption
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
whose specific intent is to harm computer systems.
An application that installs hidden services on systems
You are visiting a Website that has no protection from unauthorized users
Check it!