Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Quiz 7c - 8a
Test Description: ...
Instructions: Answer all questions to get your test result.
1) Which of the following is an appropriate use of email in a business environment?
A
Discussing salary increases with co-workers
B
Discussing the status of a project with co-workers
C
Disclosing confidential information to co-workers
D
Sending jokes to co-workers
2) Which of the following can administrators use to filter out the IP addresses of known spammers?
A
Spam filter
B
Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
C
Open relay
D
Blackhole list
3) What can a personal information management (PIM) program be used for?
A
Schedule appointments and meetings, store contact information, and manage tasks
B
Exchange various types of data files over the Internet
C
Store, access and manipulate database information
D
Enable an operating system to access databases from various vendors
4) When sending an email message, you must have:
A
an address in the To field and text in the Message field.
B
an address in the To field and a subject in the Subject field.
C
an address in the To field.
D
an address in the To field and the sender's contact information in the Signature field.
5) Which of the following email response options should you use to respond only to the original sender of an email message?
A
Reply All
B
Forward All
C
Forward
D
Reply
6) Which of the following scans incoming email attachments to ensure they do not contain malicious code?
A
At the email client on the user's computer
B
At the LAN firewall
C
At the email server
D
At the Web server
7) The term netiquette refers to:
A
general rules regarding the use of proper grammar and correct spelling in email messages.
B
general rules for common sense Web browsing techniques.
C
general rules for Internet courtesy.
D
general rules to prevent cyberbullying.
8) What can Website developers use to prevent fake email accounts from being registered?
A
Spam filter
B
Blackhole list
C
Open relay
D
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
9) Post Office Protocol version 3 (POP3) is referred to as a store-and-forward email service because
A
all of the above
B
Once messages are downloaded, they are removed from the server.
C
authenticate themselves with a user name and password
D
POP3 servers receive and hold incoming email messages in the appropriate mailbox on the server until users log on
10) Because messages are downloaded immediately with a POP3 server, you do not need a constant connection with the server in order to work with your email, which is beneficial for people who have dial-up connections.
A
False
B
True
11) What is a firewall?
A
Software designed to harm computer systems
B
A graphic or moving image that appears on your screen when your computer is idle
C
A security barrier that prevents unauthorized access to or from private networks
D
A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
12) Which term collectively refers to industrial property and copyrighted works?
A
Intellectual property
B
Trademark
C
Invention
D
License
13) A major update with significant software improvements is often marketed as a new:
A
release.
B
key.
C
download.
D
patch.
14) Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?
A
Simple Mail Transfer Protocol (SMTP)
B
Hypertext Transfer Protocol (HTTP)
C
Network News Transfer Protocol (NNTP)
D
Transport Layer Security (TLS) protocol
15) What is currently the most common way to authenticate users on private and public computer networks?
A
Requiring digital signatures and digital certificates
B
Requiring user names and passwords
C
Providing public and private encryption keys
D
Providing patches and updates
16) What is a disadvantage to installing program patches and updates?
A
They may hinder your ability to upgrade to a new software release.
B
They may affect the efficiency and stability of computer operations by consuming memory resources and bandwidth.
C
They may solve persistent programming problems.
D
They may introduce incompatibility issues or new security issues.
17) If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
A
Destroy the CD.
B
Reformat your hard disk and reload all your programs and files.
C
Use anti-virus software to disinfect your hard drive and remove the virus from your system.
D
Email the infected file to your IT department so they can eliminate the virus.
18) What is symmetric encryption?
A
An encryption method in which a key is required to encrypt a message but not required to decrypt it
B
An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of tra
C
An encryption method in which the same key is used to encrypt and decrypt a message
D
An encryption method in which two keys (one private, one public) are used to encrypt and decrypt a message
19) What is a cookie?
A
An technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text
B
A tool that verifies the identity of a user who logs on to a computer system
C
A small text file that contains information sent between a server and a client to help track user activities
D
A tool that guides users step-by-step through a software installation process
20) Which organization is responsible for codifying copyright law as it applies to digital information?
A
Information Infrastructure Task Force (IITF)
B
Library of Congress
C
World Intellectual Property Organization (WIPO)
D
World Wide Web Consortium (W3C)
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?