Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Introduction To Information Technology Lesson 8 Review
Test Description: Review of CIW Lesson 8
Instructions: Answer all questions to get your test result.
1) Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:
A
to use anti-virus software to scan the system's hard disk before opening the attachment.
B
to call, text or IM James before opening the attachment, to verify that he intended to send it.
C
to make back-up copies of important files so that she can recover them in case of an incident.
D
to open the file attachment and use anti-virus software to scan it.
2) What does anti-virus software do?
A
It prevents you from opening a program or file sent to you via e-mail or instant messaging.
B
It detects viruses by recognizing patterns called signature profiles, and warns you if your system is infected so you avoid t
C
It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.
D
It fortifies computer systems over time by repeated exposure to weak but similar viruses, building immunity to newer viruses
3) Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against viruses?
A
Disable your Web browser's automatic security settings so you can manually control the content you download.
B
Update the definitions on your anti-virus application frequently.
C
Open e-mail attachments only from unknown senders.
D
Perform regular backups of your hard drive.
4) Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?
A
Private key
B
Digital signature
C
Certificate authority
D
Secure authentication
5) You receive an unexpected e-mail with an attachment from a co-worker. You call her to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. What should the co-worker do?
A
She should ask you to forward the e-mail to your company's management.
B
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
C
She should ask you to open the attachment and describe its contents.
D
She should ask you to forward the e-mail to her so she can open the attachment and check it.
6) Which term is used to describe the process that converts data into an unreadable form of text?
A
Authentication
B
Decryption
C
Encryption
D
Certification
7) Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?
A
Illicit server
B
Spyware
C
Malware
D
Trojan
8) You are ultimately responsible for your Internet use and the possible ramifications of posting personal information to the Web. The explosion in social networking via the Web has given rise to the Right to Be Forgotten argument, which asks:
A
whether people have the right to access social networking sites when they have forgotten their user names and passwords.
B
whether people have the right to reject the receipt of cookies from Web sites they visit.
C
whether people have the right to remove themselves from newsgroups to avoid receiving spam.
D
whether people have the right to remove damaging information about themselves on the Internet.
9) Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
A
Encrypted key
B
Digital certificate
C
Firewall
D
Digital signature
10) Your company has provided you with a desktop computer at work. You have configured your e-mail client on this work computer to include your personal e-mail account so you can download messages and check personal e-mail. Which of the following is true
A
The company can read your personal e-mail messages.
B
The company is required by law to allow you to receive personal e-mail messages at work.
C
The company will ignore your personal e-mail messages out of respect for your privacy.
D
The company will block your personal e-mail account.
11) What can you use to electronically verify your identity without the need to provide data confidentiality?
A
Digital certificate
B
Firewall
C
Digital signature
D
Encrypted key
12) Which of the following is an effective way for Web site owners to prevent typosquatting?
A
Automatically apply operating system updates and patches as they become available
B
Purchase domain names that are similar to their actual domain names
C
Host their Web sites on illicit servers
D
Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys
13) Which statement best describes hash encryption?
A
An encryption method in which a key is required to encrypt data for storage and verify its integrity
B
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
C
An encryption method in which the same key is used to encrypt and decrypt a message
D
An encryption method in which numbers made by an algorithm from a text string are used to verify the integrity of messages
14) Spam can be considered an invasion of privacy because:
A
it is generally encrypted with weak encryption keys.
B
it is generally excluded from Web sites' privacy policies.
C
it is sent to recipients uninvited.
D
it is placed on Web site visitors' computers so that Web site managers can customize their sites to the visitors' preferences
15) What distinguishes a worm from a virus?
A
A worm and a virus are synonymous terms for a malicious program designed to damage computer systems.
B
A worm is capable of replicating itself automatically while affecting data.
C
A worm does not replicate itself; it damages or destroys data.
D
A worm does not replicate itself; it assumes control of system operations.
16) Which statement correctly compares computer viruses and worms?
A
A worm requires user action to replicate, but a virus can replicate by itself.
B
A virus requires user action to replicate, but a worm can replicate by itself.
C
A virus can deposit an illicit server, but a worm cannot.
D
A worm can deposit an illicit server, but a virus cannot.
17) Which term best describes a collection of software tools that provide a permanent solution to known program bugs?
A
Patch
B
Algorithm
C
Update
D
Firewall
18) Hypertext Transfer Protocol (HTTP) can be run over Secure Sockets Layer (SSL) to create the HTTPS protocol. How does HTTPS make HTTP transmission more secure?
A
By eliminating the need for user names and passwords
B
By encrypting and decrypting information transmitted to and from Web servers
C
By eliminating the need for digital certificates
D
By attaching digital certificates to information transmitted to and from Web servers
19) Which cookie type remains on your system after you end your browser session?
A
Third-party cookie
B
First-party cookie
C
Session cookie
D
Persistent cookie
20) Which of the following protects original works of authorship that are fixed in a tangible medium of expression, and defines an original work by the basic elements of expression and originality?
A
Trademark
B
License
C
Copyright
D
Encryption
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?