100% Solved
Which of the following should you use to encrypt and decrypt digital signatures, and to protect
passwords from disclosure? Hash encryption
Which of the following is the most effective way to spread viruses? Sending e-mail
attachments
What can be considered a disadvantage to installing program patches and updates? They
may introduce incompatibility issues or new security issues
What is an illicit server? An application that installs hidden services on systems
Which organization is responsible for codifying copyright law as it applies to digital
information? Information Infrastructure Task Force (IITF)
What is authentication? The process of verifying the identity of a user who logs on to a
system, or the integrity of transmitted data
, CIW IBA Lesson 8 Questions With Solutions
100% Solved
The most common business firewall technique is to use a firewall server in conjunction with
a proxy server.
Which of the following provides positive identification of the sending and receiving parties to
ensure that programs downloaded from the Internet are original and safe? Digital
certificate
The most common business firewall technique is to use a firewall server in conjunction with:
a proxy server
What is encryption? The process of converting data into an unreadable form of text
What is spyware? A software application that is secretly placed on a user's system to
gather information and relay it to outside parties
What is symmetric encryption? An encryption method in which the same key is used to
encrypt and decrypt a message