Edit Game
CIW CH 8
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   29  Close
What is an update?
A file or collection of software tools that resolves system liabilities and improves software performance.
What does https:// at the start of a URL mean?
You are visiting a secure Website in which data transmissions are encrypted
In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
Asymmetric encryption
Which term collectively refers to industrial property and copyrighted works?
Intellectual property
What is an illicit server?
An application that installs hidden services on systems
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate
What is symmetric encryption?
An encryption method in which the same key is used to encrypt and decrypt a message
Because spam is sent to you uninvited, it can be considered:
An invasion of privacy
What is authentication?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
A major update with significant software improvements is often marketed as a new:
Release
To comply with many Website requirements for added security, nearly all browsers support a minimum of:
256-bit encryption
What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
Trademark
You can use screen savers to:
Hide your work while you are away from your desk, providing a measure of security
The connectivity that makes the Internet possible also makes systems vulnerable to:
unwanted activity
What is the term for an electronic stamp that identifies a message’s source and contents?
Digital Signature
Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
The user only receives the virus that causes damage
What is a firewall?
A security barrier that prevents unauthorized access to or from private networks
The “Right to be Forgotten” debate revolves around what?
Protecting your image and personal information in the world of social networking
What is a disadvantage of using spyware-detection software?
Legitimate applications can be incorrectly identified as spyware
What is encryption?
The process of converting data into an unreadable form of text
Why should you use automatic cookie handling in most browsers?
To broadly control when and from whom cookies are accepted
What is ciphertext? Encrypted data
Encrypted data
The most common business firewall technique is to use a firewall server in conjunction with:
A proxy server
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate
Malware is a generic term for software:
Whose specific intent is to harm computer systems
Why are firewalls considered the first line of defense against LAN security breaches?
Because they provide data confidentiality
Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
Hash encryption
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Key
Which of the following is the most effective way to spread viruses?
Sending email attachments