Lesson 8 test review

¡Supera tus tareas y exámenes ahora con Quizwiz!

To comply with many Web site requirements for added security, nearly all browsers support a minimum of:

128-bit encryption.

It is important to install updates to e-mail clients to minimize security breaches. You can install updates to support a higher level of encryption because some e-mail clients default to:

40-bit encryption levels.

What is a patch?

A file of programming code that is inserted into an existing executable program to fix a known problem, or bug

What is an update?

A file or collection of software tools that resolves system liabilities and improves software performance

What is a virus?

A malicious program that assumes control of system operations, and damages or destroys data

What is a hash?

A number generated by an algorithm from a string of text

What is a trojan?

A program that appears to be harmless but actually produces harmful results

What is a firewall?

A security barrier that prevents unauthorized access to or from private networks

What is a worm?

A self-replicating program or algorithm that consumes system resources

What is a cookie?

A small text file that contains information sent between a server and a client to help track user activities

What is spyware?

A software application that is secretly placed on a user's system to gather information and relay it to outside parties

What is an illicit server?

An application that installs hidden services on systems

What is hash encryption?

An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of transmitted messages

What is symmetric encryption?

An encryption method in which the same key is used to encrypt and decrypt a message

What is asymmetric encryption?

An encryption method in which two keys (one private, one public) are used to encrypt and decrypt a message

What is the term for software that scans disks and programs for the purpose of eliminating software designed to harm computer systems?

Anti-virus software

In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?

Asymmetric encryption

What is the relationship between encryption and authentication?

Authentication occurs before an encryption session can begin, but authentication does not ensure that the ensuing session will be encrypted.

Which two authentication types require a user name and password?

Basic authentication and secure authentication

Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?

Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.

Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?

Because some countries do not allow large encryption keys to be exported

Why are firewalls considered the first line of defense against LAN security breaches?

Because they provide data confidentiality

What is the term for a password-protected, encrypted data file that can be used to authenticate a program?

Digital certificate

Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?

Digital certificate

What is the term for an electronic stamp that identifies a message's source and contents?

Digital signature

Which of the following is used to enforce non-repudiation?

Digital signature

Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages and restricting their access to certain Web sites?

Employees may be denied access to legitimate Internet resources that may help them do their jobs.

What is ciphertext?

Encrypted data

Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?

Hash encryption

Which organization is responsible for codifying copyright law as it applies to digital information?

Information Infrastructure Task Force (IITF)

Which term collectively refers to industrial property and copyrighted works?

Intellectual property

What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?

Key

What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?

Legitimate applications can be incorrectly identified as spyware.

Which of the following Windows Internet Explorer privacy level settings blocks cookies from third-party Web sites that do not have a compact policy, and deletes cookies from third-party Web sites that use your personal information without your consent?

Low

Which of the following is designed to provide an immediate, temporary solution to fix a known problem in programming code?

Patch

What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?

Persistent cookie

To what does "The Right to Be Forgotten" argument relate?

Protecting your image and personal information in the world of social networking

Which of the following has become the most common asymmetric encryption algorithm, and is included in Web browsers and many other products?

RSA algorithm

What is currently the most common way to authenticate users on private and public computer networks?

Requiring user names and passwords

Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?

Secure Sockets Layer (SSL) protocol

Which of the following is the most effective way to spread viruses?

Sending e-mail attachments

For which encryption method is it critical that the secrecy of the key be maintained by the sending and receiving parties in order for the encryption to be effective?

Symmetric encryption

What does a URL that starts with https:// signify?

That you are visiting a secure Web site in which data transmissions are encrypted

What is encryption?

The process of converting data into an unreadable form of text

What is decryption?

The process of converting data that has been converted into an unreadable form of text back to its original form

What is authentication?

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data

What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?

The protocols are made more secure because data transmissions are encrypted.

Which of the following entities possesses the digital certificate during an Internet transaction?

The server

What can be considered a disadvantage to installing program patches and updates?

They may introduce incompatibility issues or new security issues.

For what purpose should you use automatic cookie handling in most browsers?

To control when and from whom cookies are accepted

What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?

Trademark

Which of the following protocols was developed by the Internet Engineering Task Force (IETF) and is considered the successor to the Secure Sockets Layer (SSL) protocol?

Transport Layer Security (TLS) protocol

If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?

Use anti-virus software to disinfect your hard drive and remove the virus from your system.

Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?

Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.

You are making efforts to prevent attackers from gaining access to network connections. Which strategy may cause problems when troubleshooting your computer's connectivity to the network?

Using your desktop firewall to block Internet Control Messaging Protocol (ICMP)

Which organization was formed by the United Nations to protect intellectual property worldwide?

World Intellectual Property Organization (WIPO)

Which of the following statements is true of cookies?

You can view the file content of cookies sent to browsers, but they are partially encrypted.

What can be considered a drawback of networked computing and Internet use?

Your computer activities and personal information are no longer private.

Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:

a licensing agreement.

The most common business firewall technique is to use a firewall server in conjunction with:

a proxy server.

Desktop firewalls offer protection for:

an individual computer.

Because spam is sent to you uninvited, it can be considered

an invasion of privacy.

Copying an image from a Web site for your own purposes without getting permission from the image creator can be considered:

copyright infringement.

Encryption is the primary means of:

ensuring data security and privacy on the Internet.

You can use screen savers to:

hide your work while you are away from your desk, providing a measure of security.

Typosquatting is the unethical practice of:

registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.

A major update with significant software improvements is often marketed as a new:

release.

Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:

the user need only receive the virus for it to cause damage.

The connectivity that makes the Internet possible also makes systems vulnerable to:

unwanted activity.

A screen saver is a graphic or moving image that appears on your screen:

when your computer is idle.

Malware is a generic term for software:

whose specific intent is to harm computer systems.

Which of the following hypothetical Web site URLs is most likely an example of typosquatting?

www.goggle.com


Conjuntos de estudio relacionados

Lewis Ch 25: Burns, CH 57 BURNS, Ch46: Burns: Nursing Management, Medical Surgical Nursing Ch 12 Inflammation and Wound Healing, Lewis Ch. 22 - Assessment of Integumentary System, Lewis 10th Chapter 22 Assessment of Integumentary System

View Set

Pearson Vue Life Insurance Practice Exam

View Set

Bio Final Exam #1, Biology II Exam 2, chapters 27, 28, 29, 30, Bio II exam III, Bio II exam IV, Bio II Final Exam, Bio II Exam 1, Basically test 1 and two bio

View Set