Quiz 8b Question Preview (ID: 48603)


... TEACHERS: click here for quick copy question ID numbers.

What is authentication?
a) The process of converting data that has been converted into an unreadable form of text back to its original form
b) The process of providing proof that a transaction occurred between identified parties
c) The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
d) The process of converting data into an unreadable form of text

To comply with many Website requirements for added security, nearly all browsers support a minimum of:
a) 40-bit encryption.
b) 512-bit encryption.
c) 128-bit-encryption.
d) 256-bit encryption.

In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
a) Symmetric encryption
b) Hash encryption
c) Asymmetric encryption
d) MD6 encryption

Why are firewalls considered the first line of defense against LAN security breaches?
a) Because they ensure data integrity
b) Because they ensure non-repudiation
c) Because they encrypt and authenticate data
d) Because they provide data confidentiality

What is an illicit server?
a) A malicious program that assumes control of system operations, and damages or destroys data
b) An application that installs hidden services on systems
c) A program that appears to be harmless but actually produces harmful results
d) A self-replicating program or algorithm that consumes system resources

Malware is a generic term for software:
a) that scans disks and programs for known viruses and eliminates them.
b) whose specific intent is to harm computer systems.
c) that replicates itself to consume system and network resources.
d) that is secretly placed on a user's system to gather information and relay it to outside parties.

What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
a) Trademark
b) License
c) Intellectual property
d) Copyright

Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
a) Because some countries do not allow large encryption keys to be exported
b) Because some countries do not allow encryption keys of any size to be exported
c) Because using encryption keys that originated in another country can be considered copyright infringement by the country of o
d) Because encryption keys can only be used in the country of origin

Why would some corporate IT departments disable JavaScript on browsers used within the company?
a) Because JavaScript cannot be authenticated.
b) Because JavaScript cannot be encrypted.
c) Because JavaScript allows information to be downloaded and run on your system.
d) Because JavaScript places a large amount of cookies on your system.

What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
a) Digital certificate
b) Digital signature
c) Encryption key
d) Cookie

What is spyware?
a) A software application that is secretly placed on a user's system to gather information and relay it to outside parties
b) A software application that scans disks and programs for known viruses and eliminates them
c) A software application that is designed to harm computer systems
d) A self-replicating program or algorithm that consumes system and network resources

What is the term for an electronic stamp that identifies a message's source and contents?
a) Encryption key
b) Hash
c) Digital signature
d) Digital certificate

The most common business firewall technique is to use a firewall server in conjunction with:
a) an encryption key.
b) a screen saver.
c) a proxy server.
d) an anti-virus program.

Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' email messages and restricting their access to certain Websites?
a) Employees may not be able to view or download spyware.
b) Employees may not be able to view or download malware.
c) Employees may be denied access to legitimate Internet resources that may help them do their jobs.
d) Employees may be forced to use company resources only for business purposes.

Typosquatting is the unethical practice of:
a) secretly placing a software application on a user's system to gather information and relay it to outside parties
b) sending unsolicited and unwanted email messages to multiple users while making it appear as if it came from a trusted source.
c) using someone's copyright-protected material without receiving permission to do so.
d) registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high

Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
a) Hash encryption
b) Asymmetric encryption
c) Symmetric encryption
d) RSA encryption

What is a disadvantage of using spyware-detection software?
a) Memory resources and bandwidth may be adversely affected.
b) Companies can be prevented from tracking your Internet activity.
c) Legitimate applications can be incorrectly identified as spyware.
d) Companies can be prevented from collecting your personal information.

What is encryption?
a) The process of converting data into an unreadable form of text
b) The process of converting data that has been converted into an unreadable form of text back to its original form
c) The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
d) The process of providing proof that a transaction occurred between identified parties

What does https:// at the start of a URL mean?
a) You are visiting a secure Website that has an expired digital certificate
b) You are visiting a Website that has no protection from unauthorized users
c) You are visiting a secure Website in which data transmissions are encrypted
d) You are visiting a website that is known to download malware

The connectivity that makes the Internet possible also makes systems vulnerable to:
a) authentication.
b) unwanted activity.
c) encryption.
d) updates.

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 48603 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register