Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Introduction To Information Technology Lesson 8 Review Part II
Test Description: Review of CIW Lesson 8 quiz questions
Instructions: Answer all questions to get your test result.
1) Which is the most common method used to authenticate users on private and public computer networks?
A
Digital signatures
B
Digital certificates
C
Encrypted keys
D
User names and passwords
2) Which term is used to describe a program that appears to be harmless but actually produces malicious or harmful results?
A
Worm
B
Trojan
C
Firewall
D
Virus
3) Computer viruses can cause very little up to severe damage. You can protect your system by using virus-detection software to get rid of viruses. Because new viruses are created so rapidly, what must you do to make sure your anti-virus can protect you
A
Install anti-virus software program updates to keep the signature profiles current.
B
Install at least two different anti-virus programs and alternate their use randomly.
C
After you install the anti-virus software, scan your system at least weekly.
D
After you install the anti-virus software, scan your system every day.
4) Which of the following is protected by copyright?
A
The lessons explaining DNA concepts on the www.DNAftb.org Web site
B
The concept of how DNA functions in human hereditary behavior
C
The graphical double-helix representation of DNA
D
The permission you obtained to reprint another author's essay about DNA
5) When your company's private LAN is protected by a firewall, which of the following is true?
A
Users on the LAN cannot access information from the Internet, but outside users can access information stored on the LAN.
B
Neither outside users nor users on the LAN can access information from the Internet.
C
Neither outside users nor users on the LAN can access information stored on the LAN.
D
Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.
6) SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are two common protocols used to secure Internet communication exchanges. Which of the following is true about SSL and TLS?
A
SSL is the successor to TLS and has become more common.
B
TLS is the successor to SSL and has become more common.
C
TLS and SSL are deprecated protocols that have been replaced by HTTPS.
D
TLS and SSL are newer protocols that have replaced HTTPS.
7) Brea opened an e-mail attachment with a virus. After running anti-virus software, the damage is still extensive and she has to reformat her hard drive. Which step, if she had taken it prior to the virus, would have reduced the impact of the virus?
A
Performing regularly scheduled backups so that she can reload all files if lost or damaged
B
Printing and then deleting files, thus limiting the number of electronic files vulnerable to virus attacks
C
Restoring data files from backup on a regular basis
D
Following a policy of never opening attachments
8) The level of secrecy offered by encryption is dependent on:
A
the type of encryption used and the size of the key.
B
whether or not the data you are encrypting is licensed.
C
whether or not the data you are encrypting is copyrighted.
D
the transmission speed used to encrypt or decrypt data.
9) You suspect that an attacker has gained control of your computer system. What action should you take next?
A
Run anti-virus software on all disks associated with this system.
B
Shut down the computer.
C
Unplug the computer network cable and/or disable the computer's wireless NIC.
D
Enable strong encryption on all files on the hard disk.
10) You avoid adding yourself to unwanted mailing lists, you conduct online transactions through secure Web sites, and you are selective when posting information to newsgroups. These actions will help you:
A
minimize the amount of spam you receive.
B
enforce the company's encryption policy for e-mail.
C
perform the IT job of Web site analyst.
D
protect original works of authorship under copyright law.
11) What do encryption applications do to render text unreadable?
A
Compress the text so that only abbreviated portions of words remain
B
Scramble text using benign viruses
C
Remove all formatting and punctuation from the text
D
Scramble text using mathematical algorithms
12) Which statement best describes asymmetric-key encryption?
A
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
B
An encryption method in which the same key is used to encrypt and decrypt a message
C
An encryption method where numbers generated by an algorithm from a text string are used to verify the integrity of messages
D
An encryption method in which a key is required to encrypt data for storage and verify its integrity
13) You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?
A
You opened an e-mail attachment.
B
You sent an e-mail message with an attachment to a co-worker.
C
You printed a file that was stored on your hard drive.
D
You logged in to your company's portal.
14) Which of the following is a vital part of any firewall strategy?
A
The security policies created by firewall administrators
B
The inclusion of a Web server
C
The inclusion of an FTP server
D
The use of Internet plug-ins that can function through firewalls
15) Your company's IT department enforces the use of 128-bit encryption. Your department also protects the company encryption keys to ensure secure transmissions. Which choice is an important reason for encrypting the company's network transmissions?
A
Providing employees privacy to use company e-mail for personal purposes
B
Avoiding licenses that allow you to use a copyrighted software program
C
Preventing data from being intercepted by malicious outsiders
D
Legally protecting your company's original product content
16) The availability of vendor-supplied services and support, and the availability of regular updates and patches from vendors are considered advantages of:
A
using software licensed by the GNU General Public License (GPL).
B
using proprietary software.
C
using software that is hosted by a service provider.
D
using open-source software.
17) Which statement is true regarding international copyrights of digital information?
A
An international copyright does not exist but your material is protected as long as you use the copyright symbol (©).
B
An international copyright does not exist.
C
An international copyright protects digital information in countries that belong to the World Intellectual Property Org.
D
An international copyright is designed to protect digital information in all countries worldwide.
18) Which term best describes a file of programming code that provides a temporary fix to a known bug?
A
Update
B
Firewall
C
Patch
D
Algorithm
19) Bob opened an e-mail attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?
A
Call his local authorities to report computer fraud.
B
Let the virus run and hope that the damage is minimal.
C
Attach his backup drive and try to back up important files as quickly as possible.
D
Turn off his computer and reboot from a clean system disk.
20) Which of the following can protect your company's data, prevent data from being intercepted by malicious outsiders, and deter hackers?
A
Trademark
B
Encryption
C
License
D
Copyright
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?