Which of the following is the most effective way to spread viruses?
Sending email attachments
5
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Key
15
Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
Hash encryption
25
Why are firewalls considered the first line of defense against LAN security breaches?
Because they provide data confidentiality
20
Malware is a generic term for software:
Whose specific intent is to harm computer systems
10
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate
15
The most common business firewall technique is to use a firewall server in conjunction with:
A proxy server
15
What is ciphertext? Encrypted data
Encrypted data
10
Why should you use automatic cookie handling in most browsers?
To broadly control when and from whom cookies are accepted
20
What is encryption?
The process of converting data into an unreadable form of text
10
What is a disadvantage of using spyware-detection software?
Legitimate applications can be incorrectly identified as spyware
20
The “Right to be Forgotten” debate revolves around what?
Protecting your image and personal information in the world of social networking
10
What is a firewall?
A security barrier that prevents unauthorized access to or from private networks
20
Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
The user only receives the virus that causes damage
25
What is the term for an electronic stamp that identifies a message’s source and contents?
Digital Signature
15
The connectivity that makes the Internet possible also makes systems vulnerable to: