Game Preview

CIW CH 8

  •  English    29     Public
    CH 8
  •   Study   Slideshow
  • Which of the following is the most effective way to spread viruses?
    Sending email attachments
  •  5
  • What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
    Key
  •  15
  • Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
    Hash encryption
  •  25
  • Why are firewalls considered the first line of defense against LAN security breaches?
    Because they provide data confidentiality
  •  20
  • Malware is a generic term for software:
    Whose specific intent is to harm computer systems
  •  10
  • Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
    Digital certificate
  •  15
  • The most common business firewall technique is to use a firewall server in conjunction with:
    A proxy server
  •  15
  • What is ciphertext? Encrypted data
    Encrypted data
  •  10
  • Why should you use automatic cookie handling in most browsers?
    To broadly control when and from whom cookies are accepted
  •  20
  • What is encryption?
    The process of converting data into an unreadable form of text
  •  10
  • What is a disadvantage of using spyware-detection software?
    Legitimate applications can be incorrectly identified as spyware
  •  20
  • The “Right to be Forgotten” debate revolves around what?
    Protecting your image and personal information in the world of social networking
  •  10
  • What is a firewall?
    A security barrier that prevents unauthorized access to or from private networks
  •  20
  • Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
    The user only receives the virus that causes damage
  •  25
  • What is the term for an electronic stamp that identifies a message’s source and contents?
    Digital Signature
  •  15
  • The connectivity that makes the Internet possible also makes systems vulnerable to:
    unwanted activity
  •  10