Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:
What does anti-virus software do?
Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against viruses?
Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?
You receive an unexpected e-mail with an attachment from a co-worker. You call her to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. What should the co-worker do?
Which term is used to describe the process that converts data into an unreadable form of text?
Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?
You are ultimately responsible for your Internet use and the possible ramifications of posting personal information to the Web. The explosion in social networking via the Web has given rise to the Right to Be Forgotten argument, which asks:
Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
Your company has provided you with a desktop computer at work. You have configured your e-mail client on this work computer to include your personal e-mail account so you can download messages and check personal e-mail. Which of the following is true
What can you use to electronically verify your identity without the need to provide data confidentiality?
Which of the following is an effective way for Web site owners to prevent typosquatting?
Which statement best describes hash encryption?
Spam can be considered an invasion of privacy because:
What distinguishes a worm from a virus?
Which statement correctly compares computer viruses and worms?
Which term best describes a collection of software tools that provide a permanent solution to known program bugs?
Hypertext Transfer Protocol (HTTP) can be run over Secure Sockets Layer (SSL) to create the HTTPS protocol. How does HTTPS make HTTP transmission more secure?
Which cookie type remains on your system after you end your browser session?
Which of the following protects original works of authorship that are fixed in a tangible medium of expression, and defines an original work by the basic elements of expression and originality?
Teachers: Create FREE classroom games with your questions Click for more info!
©2007-2024 Review Game Zone | About | Privacy | Contact | Terms | Site Map
©2007-2024 Review Game Zone | About | Privacy | Contact | Terms | Site Map