Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Introduction To Information Technology Lesson 8 Part III
Test Description: 3rd Part of the review of CIW Lesson 8 quiz questions
Instructions: Answer all questions to get your test result.
1) You receive a text message on your cell phone from an unknown number. The message includes an attachment. You try to call the number but you get no answer. What is the best action for you to take next?
A
Delete the message without opening the attachment.
B
Open the attachment.
C
Forward the message to your e-mail so you can open the attachment using your computer.
D
Call the phone number of the sender again.
2) Which of the following is an example of a trademark?
A
The apple icon on the covers of many Beatles albums
B
A contract allowing you to use the Beatles' digital graphics on your Web site
C
A chapter from John Lennon's book In His Own Write
D
An MP3 file containing the Beatles' song Hey Jude
3) A cookie is a text file that is placed on a Web site visitor's computer. Cookies allow a Web site manager to:
A
customize the site to the site visitor's Web browsing preferences.
B
customize the security options on the site visitor's browser.
C
customize the frequency with which the site visitor's browser cache checks for newer pages.
D
customize the browser cache size on the site visitor's computer.
4) How does a proxy server protect a corporate network from unwanted Internet activity?
A
A proxy server restricts users by requiring a user name and password for every transmission.
B
A proxy server runs only the corporate extranet.
C
A proxy server runs only the corporate intranet.
D
A proxy server replaces the network IP address with another, contingent address.
5) Which statement best describes symmetric-key encryption?
A
An encryption method in which the same key is used to encrypt and decrypt a message
B
An encryption method in which a key is required to encrypt data for storage and to verify its integrity
C
An encryption method in which two separate keys - private key and public key - are used to encrypt and decrypt a message
D
An encryption method where numbers generated by an algorithm from a text string are used to verify the integrity of messages
6) Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?
A
Virus
B
Illicit server
C
Worm
D
Trojan
7) As part of the IT department, you configure the employee workstations for your company. When configuring a user's system, you always set the browser security levels to the company standard settings. What are users restricted from downloading?
A
Cookies
B
Active content
C
Pop-under windows
D
Pop-up windows
8) Which statement is true regarding a virus attack on your system?
A
Most viruses cannot be removed from your system once your files have been infected.
B
Most viruses can be removed without permanent damage to your system if they have not commenced their attack.
C
Most viruses can be halted after they commence an attack and can be removed without permanent damage to your system.
D
Most viruses can be removed from your system, but only after they have run their course.
9) Your parents want to buy a rare wine from RareVintage.com. They go to checkout and see this: http://www.RareVintage.com/vprod/checkout.html/ref=chk_out_TLS128_1b?. You tell them to cancel their online transaction instead of proceeding. Why?
A
Because the URL uses SSL/TLS encryption, which you know is not compatible with the browser they are using
B
Because the URL does not use SSL/TLS encryption and therefore any information they enter would not be secure
C
Because the URL uses abbreviations and is not completely readable, so the domain name cannot be identified
D
Because the site uses 128-bit encryption, which is illegal for companies that are located overseas
10) A firewall can perform which task?
A
Prevent unauthorized access to proprietary data on an intranet
B
Increase browser interpretation of HTML
C
Provide public access to previously controlled information
D
Read and censor internal e-mail messages
11) Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption?
A
Asymmetric-key encryption
B
Hash encryption
C
Symmetric-key encryption
D
RSA encryption
12) You are a network administrator for your company. Most of the data from your company is sensitive so you determine that encrypting company transmissions is critical. What is the disadvantage of your decision to encrypt company transmissions?
A
Encrypting transmissions requires you to obtain a license from the copyright owner.
B
Encrypting transmissions violates your employees' privacy rights.
C
Encrypting transmissions slows communication because each data packet must be encrypted and decrypted.
D
Encrypting transmissions encourages hackers and places data at risk for interception by malicious outsiders.
13) Secure authentication requires:
A
a user name only.
B
either a user name or a password.
C
a user name, a password, and encryption of this information.
D
a user name and a password.
14) Which of the following is the most common method for spreading viruses?
A
Opening attachments
B
Downloading files
C
Installing programs
D
Swapping disks or drives
15) Sarah just made a purchase on an online shopping site (such as amazon.com) and completed the checkout process by paying with her credit card. Which protocol was most likely used for the transmission of her information?
A
HTTPS
B
POP3
C
IMAPS
D
FTPS
16) You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. Which of the following will help prevent additional malware from being installed on his computer?
A
Examine the cached files from the Internet on this employee's computer.
B
Restrict this employee's access to the Internet.
C
Audit the contents of this employee's hard drive.
D
Monitor the messages this employee sends and receives via e-mail.
17) Which term is used to describe a computer security program that is enabled when no keystrokes or mouse actions have occurred on the system for a specified duration?
A
Desktop firewall
B
Automated update
C
Screen saver
D
Automated patch
18) You work for a marketing company and your team is assigned to rebrand published work from an independent author who has legal ownership of all her works. You get permission to use her work in exchange for a royalty fee. What is this called?
A
License
B
Encryption
C
Copyright
D
Trademark
19) Sensitive data (such as credit card information) should be secured using authentication and encryption when transmitting it over the Internet. Which protocol do most servers use to exchange sensitive data over the Internet?
A
Secure Sockets Layer (SSL)
B
Hypertext Transfer Protocol (HTTP)
C
File Transfer Protocol (FTP)
D
Simple Mail Transfer Protocol (SMTP)
20) Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?
A
Encrypted key
B
Digital certificate
C
Digital signature
D
Firewall
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?