You receive a text message on your cell phone from an unknown number. The message includes an attachment. You try to call the number but you get no answer. What is the best action for you to take next?

Which of the following is an example of a trademark?

A cookie is a text file that is placed on a Web site visitor's computer. Cookies allow a Web site manager to:

How does a proxy server protect a corporate network from unwanted Internet activity?

Which statement best describes symmetric-key encryption?

Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?

As part of the IT department, you configure the employee workstations for your company. When configuring a user's system, you always set the browser security levels to the company standard settings. What are users restricted from downloading?

Which statement is true regarding a virus attack on your system?

Your parents want to buy a rare wine from RareVintage.com. They go to checkout and see this: http://www.RareVintage.com/vprod/checkout.html/ref=chk_out_TLS128_1b?. You tell them to cancel their online transaction instead of proceeding. Why?

A firewall can perform which task?

Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption?

You are a network administrator for your company. Most of the data from your company is sensitive so you determine that encrypting company transmissions is critical. What is the disadvantage of your decision to encrypt company transmissions?

Secure authentication requires:

Which of the following is the most common method for spreading viruses?

Sarah just made a purchase on an online shopping site (such as amazon.com) and completed the checkout process by paying with her credit card. Which protocol was most likely used for the transmission of her information?

You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. Which of the following will help prevent additional malware from being installed on his computer?

Which term is used to describe a computer security program that is enabled when no keystrokes or mouse actions have occurred on the system for a specified duration?

You work for a marketing company and your team is assigned to rebrand published work from an independent author who has legal ownership of all her works. You get permission to use her work in exchange for a royalty fee. What is this called?

Sensitive data (such as credit card information) should be secured using authentication and encryption when transmitting it over the Internet. Which protocol do most servers use to exchange sensitive data over the Internet?

Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?

Teachers: Create FREE classroom games with your questions Click for more info!
©2007-2024 Review Game Zone | About | Privacy | Contact | Terms | Site Map