Which is the most common method used to authenticate users on private and public computer networks?

Which term is used to describe a program that appears to be harmless but actually produces malicious or harmful results?

Computer viruses can cause very little up to severe damage. You can protect your system by using virus-detection software to get rid of viruses. Because new viruses are created so rapidly, what must you do to make sure your anti-virus can protect you

Which of the following is protected by copyright?

When your company's private LAN is protected by a firewall, which of the following is true?

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are two common protocols used to secure Internet communication exchanges. Which of the following is true about SSL and TLS?

Brea opened an e-mail attachment with a virus. After running anti-virus software, the damage is still extensive and she has to reformat her hard drive. Which step, if she had taken it prior to the virus, would have reduced the impact of the virus?

The level of secrecy offered by encryption is dependent on:

You suspect that an attacker has gained control of your computer system. What action should you take next?

You avoid adding yourself to unwanted mailing lists, you conduct online transactions through secure Web sites, and you are selective when posting information to newsgroups. These actions will help you:

What do encryption applications do to render text unreadable?

Which statement best describes asymmetric-key encryption?

You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?

Which of the following is a vital part of any firewall strategy?

Your company's IT department enforces the use of 128-bit encryption. Your department also protects the company encryption keys to ensure secure transmissions. Which choice is an important reason for encrypting the company's network transmissions?

The availability of vendor-supplied services and support, and the availability of regular updates and patches from vendors are considered advantages of:

Which statement is true regarding international copyrights of digital information?

Which term best describes a file of programming code that provides a temporary fix to a known bug?

Bob opened an e-mail attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?

Which of the following can protect your company's data, prevent data from being intercepted by malicious outsiders, and deter hackers?

Teachers: Create FREE classroom games with your questions Click for more info!
©2007-2025 Review Game Zone | About | Privacy | Contact | Terms | Site Map