Study

CIW CH 8

  •   0%
  •  0     0     0

  • What is an illicit server?
    An application that installs hidden services on systems
  • What is an update?
    A file or collection of software tools that resolves system liabilities and improves software performance.
  • In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
    Asymmetric encryption
  • The connectivity that makes the Internet possible also makes systems vulnerable to:
    unwanted activity
  • What is symmetric encryption?
    An encryption method in which the same key is used to encrypt and decrypt a message
  • Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
    Digital certificate
  • A major update with significant software improvements is often marketed as a new:
    Release
  • What is a disadvantage of using spyware-detection software?
    Legitimate applications can be incorrectly identified as spyware
  • What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
    Trademark
  • The “Right to be Forgotten” debate revolves around what?
    Protecting your image and personal information in the world of social networking
  • What is ciphertext? Encrypted data
    Encrypted data
  • Because spam is sent to you uninvited, it can be considered:
    An invasion of privacy
  • What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
    Key
  • What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
    Digital certificate
  • What is a firewall?
    A security barrier that prevents unauthorized access to or from private networks
  • Why are firewalls considered the first line of defense against LAN security breaches?
    Because they provide data confidentiality
  • Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
    Hash encryption
  • What is encryption?
    The process of converting data into an unreadable form of text
  • Which term collectively refers to industrial property and copyrighted works?
    Intellectual property
  • What does https:// at the start of a URL mean?
    You are visiting a secure Website in which data transmissions are encrypted
  • You can use screen savers to:
    Hide your work while you are away from your desk, providing a measure of security
  • Viruses that reside within the text of an HTML-formatted email message are particularly virulent because:
    The user only receives the virus that causes damage
  • Why should you use automatic cookie handling in most browsers?
    To broadly control when and from whom cookies are accepted
  • Which of the following is the most effective way to spread viruses?
    Sending email attachments
  • What is the term for an electronic stamp that identifies a message’s source and contents?
    Digital Signature
  • To comply with many Website requirements for added security, nearly all browsers support a minimum of:
    256-bit encryption
  • Malware is a generic term for software:
    Whose specific intent is to harm computer systems
  • The most common business firewall technique is to use a firewall server in conjunction with:
    A proxy server
  • What is authentication?
    The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data