Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Quiz 8b
Test Description: ...
Instructions: Answer all questions to get your test result.
1) Typosquatting is the unethical practice of:
A
sending unsolicited and unwanted email messages to multiple users while making it appear as if it came from a trusted source.
B
using someone's copyright-protected material without receiving permission to do so.
C
secretly placing a software application on a user's system to gather information and relay it to outside parties
D
registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high
2) The most common business firewall technique is to use a firewall server in conjunction with:
A
an anti-virus program.
B
a proxy server.
C
an encryption key.
D
a screen saver.
3) Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' email messages and restricting their access to certain Websites?
A
Employees may be forced to use company resources only for business purposes.
B
Employees may not be able to view or download spyware.
C
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
D
Employees may not be able to view or download malware.
4) What is the term for an electronic stamp that identifies a message's source and contents?
A
Digital signature
B
Digital certificate
C
Hash
D
Encryption key
5) What is spyware?
A
A software application that scans disks and programs for known viruses and eliminates them
B
A self-replicating program or algorithm that consumes system and network resources
C
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
D
A software application that is designed to harm computer systems
6) What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
A
Digital certificate
B
Cookie
C
Encryption key
D
Digital signature
7) Why would some corporate IT departments disable JavaScript on browsers used within the company?
A
Because JavaScript cannot be authenticated.
B
Because JavaScript cannot be encrypted.
C
Because JavaScript allows information to be downloaded and run on your system.
D
Because JavaScript places a large amount of cookies on your system.
8) Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
A
Because some countries do not allow large encryption keys to be exported
B
Because using encryption keys that originated in another country can be considered copyright infringement by the country of o
C
Because encryption keys can only be used in the country of origin
D
Because some countries do not allow encryption keys of any size to be exported
9) What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
A
Intellectual property
B
Copyright
C
Trademark
D
License
10) Malware is a generic term for software:
A
that replicates itself to consume system and network resources.
B
that is secretly placed on a user's system to gather information and relay it to outside parties.
C
that scans disks and programs for known viruses and eliminates them.
D
whose specific intent is to harm computer systems.
11) What is an illicit server?
A
An application that installs hidden services on systems
B
A program that appears to be harmless but actually produces harmful results
C
A malicious program that assumes control of system operations, and damages or destroys data
D
A self-replicating program or algorithm that consumes system resources
12) In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
A
Asymmetric encryption
B
MD6 encryption
C
Hash encryption
D
Symmetric encryption
13) Why are firewalls considered the first line of defense against LAN security breaches?
A
Because they provide data confidentiality
B
Because they ensure non-repudiation
C
Because they ensure data integrity
D
Because they encrypt and authenticate data
14) What is authentication?
A
The process of providing proof that a transaction occurred between identified parties
B
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
C
The process of converting data that has been converted into an unreadable form of text back to its original form
D
The process of converting data into an unreadable form of text
15) To comply with many Website requirements for added security, nearly all browsers support a minimum of:
A
256-bit encryption.
B
40-bit encryption.
C
128-bit-encryption.
D
512-bit encryption.
16) Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
A
Asymmetric encryption
B
Symmetric encryption
C
RSA encryption
D
Hash encryption
17) What is a disadvantage of using spyware-detection software?
A
Companies can be prevented from tracking your Internet activity.
B
Memory resources and bandwidth may be adversely affected.
C
Legitimate applications can be incorrectly identified as spyware.
D
Companies can be prevented from collecting your personal information.
18) What is encryption?
A
The process of converting data into an unreadable form of text
B
The process of converting data that has been converted into an unreadable form of text back to its original form
C
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
D
The process of providing proof that a transaction occurred between identified parties
19) What does https:// at the start of a URL mean?
A
You are visiting a secure Website that has an expired digital certificate
B
You are visiting a Website that has no protection from unauthorized users
C
You are visiting a website that is known to download malware
D
You are visiting a secure Website in which data transmissions are encrypted
20) The connectivity that makes the Internet possible also makes systems vulnerable to:
A
unwanted activity.
B
authentication.
C
encryption.
D
updates.
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?