Quiz 7c - 8a Question Preview (ID: 48435)


... TEACHERS: click here for quick copy question ID numbers.

Which of the following is an appropriate use of email in a business environment?
a) Sending jokes to co-workers
b) Discussing salary increases with co-workers
c) Discussing the status of a project with co-workers
d) Disclosing confidential information to co-workers

Which of the following can administrators use to filter out the IP addresses of known spammers?
a) Open relay
b) Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)
c) Blackhole list
d) Spam filter

What can a personal information management (PIM) program be used for?
a) Enable an operating system to access databases from various vendors
b) Store, access and manipulate database information
c) Exchange various types of data files over the Internet
d) Schedule appointments and meetings, store contact information, and manage tasks

When sending an email message, you must have:
a) an address in the To field and the sender's contact information in the Signature field.
b) an address in the To field.
c) an address in the To field and a subject in the Subject field.
d) an address in the To field and text in the Message field.

Which of the following email response options should you use to respond only to the original sender of an email message?
a) Forward All
b) Reply All
c) Forward
d) Reply

Which of the following scans incoming email attachments to ensure they do not contain malicious code?
a) At the email server
b) At the email client on the user's computer
c) At the LAN firewall
d) At the Web server

The term netiquette refers to:
a) general rules regarding the use of proper grammar and correct spelling in email messages.
b) general rules to prevent cyberbullying.
c) general rules for common sense Web browsing techniques.
d) general rules for Internet courtesy.

What can Website developers use to prevent fake email accounts from being registered?
a) Blackhole list
b) Spam filter
c) Open relay
d) CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

Post Office Protocol version 3 (POP3) is referred to as a store-and-forward email service because
a) POP3 servers receive and hold incoming email messages in the appropriate mailbox on the server until users log on
b) Once messages are downloaded, they are removed from the server.
c) authenticate themselves with a user name and password
d) all of the above

Because messages are downloaded immediately with a POP3 server, you do not need a constant connection with the server in order to work with your email, which is beneficial for people who have dial-up connections.
a) True
b) False
c)
d)

What is a firewall?
a) A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
b) Software designed to harm computer systems
c) A graphic or moving image that appears on your screen when your computer is idle
d) A security barrier that prevents unauthorized access to or from private networks

Which term collectively refers to industrial property and copyrighted works?
a) Invention
b) License
c) Trademark
d) Intellectual property

A major update with significant software improvements is often marketed as a new:
a) patch.
b) key.
c) release.
d) download.

Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?
a) Hypertext Transfer Protocol (HTTP)
b) Network News Transfer Protocol (NNTP)
c) Simple Mail Transfer Protocol (SMTP)
d) Transport Layer Security (TLS) protocol

What is currently the most common way to authenticate users on private and public computer networks?
a) Requiring user names and passwords
b) Requiring digital signatures and digital certificates
c) Providing public and private encryption keys
d) Providing patches and updates

What is a disadvantage to installing program patches and updates?
a) They may affect the efficiency and stability of computer operations by consuming memory resources and bandwidth.
b) They may solve persistent programming problems.
c) They may introduce incompatibility issues or new security issues.
d) They may hinder your ability to upgrade to a new software release.

If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
a) Use anti-virus software to disinfect your hard drive and remove the virus from your system.
b) Destroy the CD.
c) Email the infected file to your IT department so they can eliminate the virus.
d) Reformat your hard disk and reload all your programs and files.

What is symmetric encryption?
a) An encryption method in which a key is required to encrypt a message but not required to decrypt it
b) An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of tra
c) An encryption method in which two keys (one private, one public) are used to encrypt and decrypt a message
d) An encryption method in which the same key is used to encrypt and decrypt a message

What is a cookie?
a) An technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text
b) A tool that verifies the identity of a user who logs on to a computer system
c) A small text file that contains information sent between a server and a client to help track user activities
d) A tool that guides users step-by-step through a software installation process

Which organization is responsible for codifying copyright law as it applies to digital information?
a) World Intellectual Property Organization (WIPO)
b) World Wide Web Consortium (W3C)
c) Information Infrastructure Task Force (IITF)
d) Library of Congress

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 48435 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register