Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Quiz 8b
Test Description: ...
Instructions: Answer all questions to get your test result.
1) Typosquatting is the unethical practice of:
A
sending unsolicited and unwanted email messages to multiple users while making it appear as if it came from a trusted source.
B
registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high
C
using someone's copyright-protected material without receiving permission to do so.
D
secretly placing a software application on a user's system to gather information and relay it to outside parties
2) The most common business firewall technique is to use a firewall server in conjunction with:
A
a screen saver.
B
a proxy server.
C
an anti-virus program.
D
an encryption key.
3) Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' email messages and restricting their access to certain Websites?
A
Employees may be forced to use company resources only for business purposes.
B
Employees may not be able to view or download malware.
C
Employees may not be able to view or download spyware.
D
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
4) What is the term for an electronic stamp that identifies a message's source and contents?
A
Digital certificate
B
Digital signature
C
Hash
D
Encryption key
5) What is spyware?
A
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
B
A software application that is designed to harm computer systems
C
A software application that scans disks and programs for known viruses and eliminates them
D
A self-replicating program or algorithm that consumes system and network resources
6) What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
A
Cookie
B
Digital signature
C
Encryption key
D
Digital certificate
7) Why would some corporate IT departments disable JavaScript on browsers used within the company?
A
Because JavaScript places a large amount of cookies on your system.
B
Because JavaScript cannot be authenticated.
C
Because JavaScript cannot be encrypted.
D
Because JavaScript allows information to be downloaded and run on your system.
8) Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
A
Because some countries do not allow encryption keys of any size to be exported
B
Because some countries do not allow large encryption keys to be exported
C
Because using encryption keys that originated in another country can be considered copyright infringement by the country of o
D
Because encryption keys can only be used in the country of origin
9) What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
A
Trademark
B
Copyright
C
Intellectual property
D
License
10) Malware is a generic term for software:
A
that is secretly placed on a user's system to gather information and relay it to outside parties.
B
that scans disks and programs for known viruses and eliminates them.
C
that replicates itself to consume system and network resources.
D
whose specific intent is to harm computer systems.
11) What is an illicit server?
A
A self-replicating program or algorithm that consumes system resources
B
A program that appears to be harmless but actually produces harmful results
C
An application that installs hidden services on systems
D
A malicious program that assumes control of system operations, and damages or destroys data
12) In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
A
Asymmetric encryption
B
Hash encryption
C
Symmetric encryption
D
MD6 encryption
13) Why are firewalls considered the first line of defense against LAN security breaches?
A
Because they provide data confidentiality
B
Because they ensure non-repudiation
C
Because they ensure data integrity
D
Because they encrypt and authenticate data
14) What is authentication?
A
The process of providing proof that a transaction occurred between identified parties
B
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
C
The process of converting data that has been converted into an unreadable form of text back to its original form
D
The process of converting data into an unreadable form of text
15) To comply with many Website requirements for added security, nearly all browsers support a minimum of:
A
512-bit encryption.
B
128-bit-encryption.
C
256-bit encryption.
D
40-bit encryption.
16) Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
A
Symmetric encryption
B
Hash encryption
C
RSA encryption
D
Asymmetric encryption
17) What is a disadvantage of using spyware-detection software?
A
Companies can be prevented from collecting your personal information.
B
Legitimate applications can be incorrectly identified as spyware.
C
Memory resources and bandwidth may be adversely affected.
D
Companies can be prevented from tracking your Internet activity.
18) What is encryption?
A
The process of converting data that has been converted into an unreadable form of text back to its original form
B
The process of providing proof that a transaction occurred between identified parties
C
The process of converting data into an unreadable form of text
D
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
19) What does https:// at the start of a URL mean?
A
You are visiting a secure Website in which data transmissions are encrypted
B
You are visiting a website that is known to download malware
C
You are visiting a Website that has no protection from unauthorized users
D
You are visiting a secure Website that has an expired digital certificate
20) The connectivity that makes the Internet possible also makes systems vulnerable to:
A
updates.
B
authentication.
C
encryption.
D
unwanted activity.
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?