Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Quiz 7c - 8a
Test Description: ...
Instructions: Answer all questions to get your test result.
1) Which of the following is an appropriate use of email in a business environment?
A
Disclosing confidential information to co-workers
B
Sending jokes to co-workers
C
Discussing the status of a project with co-workers
D
Discussing salary increases with co-workers
2) Which of the following can administrators use to filter out the IP addresses of known spammers?
A
Blackhole list
B
Open relay
C
Spam filter
D
Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
3) What can a personal information management (PIM) program be used for?
A
Enable an operating system to access databases from various vendors
B
Exchange various types of data files over the Internet
C
Schedule appointments and meetings, store contact information, and manage tasks
D
Store, access and manipulate database information
4) When sending an email message, you must have:
A
an address in the To field and text in the Message field.
B
an address in the To field and the sender's contact information in the Signature field.
C
an address in the To field.
D
an address in the To field and a subject in the Subject field.
5) Which of the following email response options should you use to respond only to the original sender of an email message?
A
Forward
B
Reply
C
Reply All
D
Forward All
6) Which of the following scans incoming email attachments to ensure they do not contain malicious code?
A
At the email server
B
At the email client on the user's computer
C
At the LAN firewall
D
At the Web server
7) The term netiquette refers to:
A
general rules for Internet courtesy.
B
general rules to prevent cyberbullying.
C
general rules regarding the use of proper grammar and correct spelling in email messages.
D
general rules for common sense Web browsing techniques.
8) What can Website developers use to prevent fake email accounts from being registered?
A
Open relay
B
Spam filter
C
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
D
Blackhole list
9) Post Office Protocol version 3 (POP3) is referred to as a store-and-forward email service because
A
Once messages are downloaded, they are removed from the server.
B
all of the above
C
authenticate themselves with a user name and password
D
POP3 servers receive and hold incoming email messages in the appropriate mailbox on the server until users log on
10) Because messages are downloaded immediately with a POP3 server, you do not need a constant connection with the server in order to work with your email, which is beneficial for people who have dial-up connections.
A
True
B
False
11) What is a firewall?
A
Software designed to harm computer systems
B
A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
C
A security barrier that prevents unauthorized access to or from private networks
D
A graphic or moving image that appears on your screen when your computer is idle
12) Which term collectively refers to industrial property and copyrighted works?
A
Trademark
B
Invention
C
Intellectual property
D
License
13) A major update with significant software improvements is often marketed as a new:
A
download.
B
release.
C
key.
D
patch.
14) Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?
A
Transport Layer Security (TLS) protocol
B
Hypertext Transfer Protocol (HTTP)
C
Network News Transfer Protocol (NNTP)
D
Simple Mail Transfer Protocol (SMTP)
15) What is currently the most common way to authenticate users on private and public computer networks?
A
Providing public and private encryption keys
B
Providing patches and updates
C
Requiring digital signatures and digital certificates
D
Requiring user names and passwords
16) What is a disadvantage to installing program patches and updates?
A
They may introduce incompatibility issues or new security issues.
B
They may hinder your ability to upgrade to a new software release.
C
They may solve persistent programming problems.
D
They may affect the efficiency and stability of computer operations by consuming memory resources and bandwidth.
17) If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
A
Email the infected file to your IT department so they can eliminate the virus.
B
Use anti-virus software to disinfect your hard drive and remove the virus from your system.
C
Destroy the CD.
D
Reformat your hard disk and reload all your programs and files.
18) What is symmetric encryption?
A
An encryption method in which two keys (one private, one public) are used to encrypt and decrypt a message
B
An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of tra
C
An encryption method in which the same key is used to encrypt and decrypt a message
D
An encryption method in which a key is required to encrypt a message but not required to decrypt it
19) What is a cookie?
A
A tool that guides users step-by-step through a software installation process
B
A tool that verifies the identity of a user who logs on to a computer system
C
An technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text
D
A small text file that contains information sent between a server and a client to help track user activities
20) Which organization is responsible for codifying copyright law as it applies to digital information?
A
Information Infrastructure Task Force (IITF)
B
World Wide Web Consortium (W3C)
C
World Intellectual Property Organization (WIPO)
D
Library of Congress
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?