Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
The user only receives the virus that causes damage
Oops!
Check
Okay!
Check
20
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate
Oops!
Check
Okay!
Check
10
The โRight to be Forgottenโ debate revolves around what?
Protecting your image and personal information in the world of social networking
Oops!
Check
Okay!
Check
10
The connectivity that makes the Internet possible also makes systems vulnerable to:
unwanted activity
Oops!
Check
Okay!
Check
15
The most common business firewall technique is to use a firewall server in conjunction with:
A proxy server
Oops!
Check
Okay!
Check
monster
Reset all scores!
Oops!
seesaw
Swap points!
Okay!
gift
Win 25 points!
Okay!
baam
Lose 20 points!
Oops!
boom
Lose 50 points!
Oops!
fairy
Take points!
5
10
15
20
25
gift
Win 25 points!
Okay!
baam
Lose 25 points!
Oops!
20
Why should you use automatic cookie handling in most browsers?
To broadly control when and from whom cookies are accepted
Oops!
Check
Okay!
Check
10
Because spam is sent to you uninvited, it can be considered:
An invasion of privacy
Oops!
Check
Okay!
Check
15
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Key
Oops!
Check
Okay!
Check
15
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate
Oops!
Check
Okay!
Check
20
Which term collectively refers to industrial property and copyrighted works?
Intellectual property
Oops!
Check
Okay!
Check
20
What is a disadvantage of using spyware-detection software?
Legitimate applications can be incorrectly identified as spyware
Oops!
Check
Okay!
Check
baam
Lose 5 points!
Oops!
gift
Win 20 points!
Okay!
shark
Other team loses 25 points!
Okay!
banana
Go to last place!
Oops!
10
What is ciphertext? Encrypted data
Encrypted data
Oops!
Check
Okay!
Check
25
What is authentication?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data