An application that installs hidden services on systems
What is an update?
A file or collection of software tools that resolves system liabilities and improves software performance.
In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
Asymmetric encryption
The connectivity that makes the Internet possible also makes systems vulnerable to:
unwanted activity
What is symmetric encryption?
An encryption method in which the same key is used to encrypt and decrypt a message
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate
A major update with significant software improvements is often marketed as a new:
Release
What is a disadvantage of using spyware-detection software?
Legitimate applications can be incorrectly identified as spyware
What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
Trademark
The “Right to be Forgotten” debate revolves around what?
Protecting your image and personal information in the world of social networking
What is ciphertext? Encrypted data
Encrypted data
Because spam is sent to you uninvited, it can be considered:
An invasion of privacy
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Key
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate
What is a firewall?
A security barrier that prevents unauthorized access to or from private networks
Why are firewalls considered the first line of defense against LAN security breaches?
Because they provide data confidentiality
Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
Hash encryption
What is encryption?
The process of converting data into an unreadable form of text
Which term collectively refers to industrial property and copyrighted works?
Intellectual property
What does https:// at the start of a URL mean?
You are visiting a secure Website in which data transmissions are encrypted
You can use screen savers to:
Hide your work while you are away from your desk, providing a measure of security
Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
The user only receives the virus that causes damage
Why should you use automatic cookie handling in most browsers?
To broadly control when and from whom cookies are accepted
Which of the following is the most effective way to spread viruses?
Sending email attachments
What is the term for an electronic stamp that identifies a message’s source and contents?
Digital Signature
To comply with many Website requirements for added security, nearly all browsers support a minimum of:
256-bit encryption
Malware is a generic term for software:
Whose specific intent is to harm computer systems
The most common business firewall technique is to use a firewall server in conjunction with:
A proxy server
What is authentication?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
Your experience on this site will be improved by allowing cookies.