Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Introduction To Information Technology Lesson 8 Review Part II
Test Description: Review of CIW Lesson 8 quiz questions
Instructions: Answer all questions to get your test result.
1) Which is the most common method used to authenticate users on private and public computer networks?
A
Digital signatures
B
Digital certificates
C
User names and passwords
D
Encrypted keys
2) Which term is used to describe a program that appears to be harmless but actually produces malicious or harmful results?
A
Trojan
B
Virus
C
Firewall
D
Worm
3) Computer viruses can cause very little up to severe damage. You can protect your system by using virus-detection software to get rid of viruses. Because new viruses are created so rapidly, what must you do to make sure your anti-virus can protect you
A
Install anti-virus software program updates to keep the signature profiles current.
B
After you install the anti-virus software, scan your system every day.
C
Install at least two different anti-virus programs and alternate their use randomly.
D
After you install the anti-virus software, scan your system at least weekly.
4) Which of the following is protected by copyright?
A
The permission you obtained to reprint another author's essay about DNA
B
The concept of how DNA functions in human hereditary behavior
C
The graphical double-helix representation of DNA
D
The lessons explaining DNA concepts on the www.DNAftb.org Web site
5) When your company's private LAN is protected by a firewall, which of the following is true?
A
Neither outside users nor users on the LAN can access information from the Internet.
B
Neither outside users nor users on the LAN can access information stored on the LAN.
C
Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.
D
Users on the LAN cannot access information from the Internet, but outside users can access information stored on the LAN.
6) SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are two common protocols used to secure Internet communication exchanges. Which of the following is true about SSL and TLS?
A
TLS is the successor to SSL and has become more common.
B
TLS and SSL are deprecated protocols that have been replaced by HTTPS.
C
TLS and SSL are newer protocols that have replaced HTTPS.
D
SSL is the successor to TLS and has become more common.
7) Brea opened an e-mail attachment with a virus. After running anti-virus software, the damage is still extensive and she has to reformat her hard drive. Which step, if she had taken it prior to the virus, would have reduced the impact of the virus?
A
Following a policy of never opening attachments
B
Printing and then deleting files, thus limiting the number of electronic files vulnerable to virus attacks
C
Performing regularly scheduled backups so that she can reload all files if lost or damaged
D
Restoring data files from backup on a regular basis
8) The level of secrecy offered by encryption is dependent on:
A
the transmission speed used to encrypt or decrypt data.
B
whether or not the data you are encrypting is licensed.
C
the type of encryption used and the size of the key.
D
whether or not the data you are encrypting is copyrighted.
9) You suspect that an attacker has gained control of your computer system. What action should you take next?
A
Run anti-virus software on all disks associated with this system.
B
Shut down the computer.
C
Enable strong encryption on all files on the hard disk.
D
Unplug the computer network cable and/or disable the computer's wireless NIC.
10) You avoid adding yourself to unwanted mailing lists, you conduct online transactions through secure Web sites, and you are selective when posting information to newsgroups. These actions will help you:
A
protect original works of authorship under copyright law.
B
minimize the amount of spam you receive.
C
enforce the company's encryption policy for e-mail.
D
perform the IT job of Web site analyst.
11) What do encryption applications do to render text unreadable?
A
Scramble text using benign viruses
B
Scramble text using mathematical algorithms
C
Compress the text so that only abbreviated portions of words remain
D
Remove all formatting and punctuation from the text
12) Which statement best describes asymmetric-key encryption?
A
An encryption method in which a key is required to encrypt data for storage and verify its integrity
B
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
C
An encryption method where numbers generated by an algorithm from a text string are used to verify the integrity of messages
D
An encryption method in which the same key is used to encrypt and decrypt a message
13) You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?
A
You logged in to your company's portal.
B
You opened an e-mail attachment.
C
You sent an e-mail message with an attachment to a co-worker.
D
You printed a file that was stored on your hard drive.
14) Which of the following is a vital part of any firewall strategy?
A
The inclusion of an FTP server
B
The inclusion of a Web server
C
The security policies created by firewall administrators
D
The use of Internet plug-ins that can function through firewalls
15) Your company's IT department enforces the use of 128-bit encryption. Your department also protects the company encryption keys to ensure secure transmissions. Which choice is an important reason for encrypting the company's network transmissions?
A
Providing employees privacy to use company e-mail for personal purposes
B
Legally protecting your company's original product content
C
Preventing data from being intercepted by malicious outsiders
D
Avoiding licenses that allow you to use a copyrighted software program
16) The availability of vendor-supplied services and support, and the availability of regular updates and patches from vendors are considered advantages of:
A
using open-source software.
B
using software licensed by the GNU General Public License (GPL).
C
using software that is hosted by a service provider.
D
using proprietary software.
17) Which statement is true regarding international copyrights of digital information?
A
An international copyright protects digital information in countries that belong to the World Intellectual Property Org.
B
An international copyright is designed to protect digital information in all countries worldwide.
C
An international copyright does not exist but your material is protected as long as you use the copyright symbol (©).
D
An international copyright does not exist.
18) Which term best describes a file of programming code that provides a temporary fix to a known bug?
A
Update
B
Patch
C
Firewall
D
Algorithm
19) Bob opened an e-mail attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?
A
Call his local authorities to report computer fraud.
B
Let the virus run and hope that the damage is minimal.
C
Turn off his computer and reboot from a clean system disk.
D
Attach his backup drive and try to back up important files as quickly as possible.
20) Which of the following can protect your company's data, prevent data from being intercepted by malicious outsiders, and deter hackers?
A
Encryption
B
License
C
Copyright
D
Trademark
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?