Lesson 8 Test Review

18 October 2022
4.7 (114 reviews)
72 test answers

Unlock all answers in this set

Unlock answers (68)
question
Which of the following statements is true of cookies?
answer
You can view the file content of cookies sent to browsers, but they are partially encrypted.
question
Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages and restricting their access to certain Web sites?
answer
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
question
Because spam is sent to you uninvited, it can be considered
answer
an invasion of privacy.
question
What is a cookie?
answer
A small text file that contains information sent between a server and a client to help track user activities
question
To what does "The Right to Be Forgotten" argument relate?
answer
Protecting your image and personal information in the world of social networking
question
Which of the following Windows Internet Explorer privacy level settings blocks cookies from third-party Web sites that do not have a compact policy, and deletes cookies from third-party Web sites that use your personal information without your consent?
answer
Low
question
What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?
answer
Persistent cookie
question
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
answer
Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.
question
What can be considered a drawback of networked computing and Internet use?
answer
Your computer activities and personal information are no longer private.
question
For what purpose should you use automatic cookie handling in most browsers?
answer
To control when and from whom cookies are accepted
question
Which two authentication types require a user name and password?
answer
Basic authentication and secure authentication
question
Which of the following is used to enforce non-repudiation?
answer
Digital signature
question
What is encryption?
answer
The process of converting data into an unreadable form of text
question
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
answer
Digital certificate
question
What is currently the most common way to authenticate users on private and public computer networks?
answer
Requiring user names and passwords
question
What is the term for an electronic stamp that identifies a message's source and contents?
answer
Digital signature
question
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
answer
Digital certificate
question
What is authentication?
answer
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
question
Which of the following entities possesses the digital certificate during an Internet transaction?
answer
The server
question
Encryption is the primary means of:
answer
ensuring data security and privacy on the Internet.
question
Which of the following protocols was developed by the Internet Engineering Task Force (IETF) and is considered the successor to the Secure Sockets Layer (SSL) protocol?
answer
Transport Layer Security (TLS) protocol
question
Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?
answer
Secure Sockets Layer (SSL) protocol
question
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
answer
Key
question
What is the relationship between encryption and authentication?
answer
Authentication occurs before an encryption session can begin, but authentication does not ensure that the ensuing session will be encrypted.
question
What is decryption?
answer
The process of converting data that has been converted into an unreadable form of text back to its original form
question
What does a URL that starts with https:// signify?
answer
That you are visiting a secure Web site in which data transmissions are encrypted
question
What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?
answer
The protocols are made more secure because data transmissions are encrypted.
question
What is ciphertext?
answer
Encrypted data
question
Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
answer
Because some countries do not allow large encryption keys to be exported
question
What is a hash?
answer
A number generated by an algorithm from a string of text
question
What is hash encryption?
answer
An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of transmitted messages
question
Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
answer
Hash encryption
question
Which of the following has become the most common asymmetric encryption algorithm, and is included in Web browsers and many other products?
answer
RSA algorithm
question
What is symmetric encryption?
answer
An encryption method in which the same key is used to encrypt and decrypt a message
question
In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
answer
Asymmetric encryption
question
What is asymmetric encryption?
answer
An encryption method in which two keys (one private, one public) are used to encrypt and decrypt a message
question
For which encryption method is it critical that the secrecy of the key be maintained by the sending and receiving parties in order for the encryption to be effective?
answer
Symmetric encryption
question
What is an illicit server?
answer
An application that installs hidden services on systems
question
What is the term for software that scans disks and programs for the purpose of eliminating software designed to harm computer systems?
answer
Anti-virus software
question
Malware is a generic term for software:
answer
whose specific intent is to harm computer systems.
question
What is a virus?
answer
A malicious program that assumes control of system operations, and damages or destroys data
question
What is a trojan?
answer
A program that appears to be harmless but actually produces harmful results
question
If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
answer
Use anti-virus software to disinfect your hard drive and remove the virus from your system.
question
Which of the following is the most effective way to spread viruses?
answer
Sending e-mail attachments
question
What is a worm?
answer
A self-replicating program or algorithm that consumes system resources
question
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
answer
the user need only receive the virus for it to cause damage.
question
To comply with many Web site requirements for added security, nearly all browsers support a minimum of:
answer
128-bit encryption.
question
It is important to install updates to e-mail clients to minimize security breaches. You can install updates to support a higher level of encryption because some e-mail clients default to:
answer
40-bit encryption levels.
question
Which of the following is designed to provide an immediate, temporary solution to fix a known problem in programming code?
answer
Patch
question
What can be considered a disadvantage to installing program patches and updates?
answer
They may introduce incompatibility issues or new security issues.
question
What is an update?
answer
A file or collection of software tools that resolves system liabilities and improves software performance
question
What is spyware?
answer
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
question
A major update with significant software improvements is often marketed as a new:
answer
release.
question
What is a patch?
answer
A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
question
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
answer
Legitimate applications can be incorrectly identified as spyware.
question
Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
answer
Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.
question
Which of the following hypothetical Web site URLs is most likely an example of typosquatting?
answer
www.goggle.com
question
You can use screen savers to:
answer
hide your work while you are away from your desk, providing a measure of security.
question
Why are firewalls considered the first line of defense against LAN security breaches?
answer
Because they provide data confidentiality
question
A screen saver is a graphic or moving image that appears on your screen:
answer
when your computer is idle.
question
The most common business firewall technique is to use a firewall server in conjunction with:
answer
a proxy server.
question
Typosquatting is the unethical practice of:
answer
registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.
question
The connectivity that makes the Internet possible also makes systems vulnerable to:
answer
unwanted activity.
question
What is a firewall?
answer
A security barrier that prevents unauthorized access to or from private networks
question
You are making efforts to prevent attackers from gaining access to network connections. Which strategy may cause problems when troubleshooting your computer's connectivity to the network?
answer
Using your desktop firewall to block Internet Control Messaging Protocol (ICMP)
question
Which term collectively refers to industrial property and copyrighted works?
answer
Intellectual property
question
Which organization is responsible for codifying copyright law as it applies to digital information?
answer
Information Infrastructure Task Force (IITF)
question
Copying an image from a Web site for your own purposes without getting permission from the image creator can be considered:
answer
copyright infringement.
question
What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
answer
Trademark
question
Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
answer
a licensing agreement.
question
Which organization was formed by the United Nations to protect intellectual property worldwide?
answer
World Intellectual Property Organization (WIPO)
question
Desktop firewalls offer protection for:
answer
an individual computer.