100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CIW IBA Lesson 8

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
27-03-2024
Written in
2023/2024

What is currently the most common way to authenticate users on private and public computer networks? - answer-Requiring user names and passwords What is the term for a password-protected, encrypted data file that can be used to authenticate a program? - answer-Digital certificate What is ciphertext? - answer-Encrypted data Because spam is sent to you uninvited, it can be considered: - answer-an invasion of privacy Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because: - answer-the user need only receive the virus for it to cause damage In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them? - answer-Asymmetric encryption Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure? - answer-Hash encryption Which of the following is the most effective way to spread viruses? - answer-Sending e-mail attachments What can be considered a disadvantage to installing program patches and updates? - answer-They may introduce incompatibility issues or new security issues What is an illicit server? - answer-An application that installs hidden services on systems Which organization is responsible for codifying copyright law as it applies to digital information? - answer-Information Infrastructure Task Force (IITF) What is authentication? - answer-The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data The most common business firewall technique is to use a firewall server in conjunction with - answer-a proxy server. Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe? - answer-Digital certificate The most common business firewall technique is to use a firewall server in conjunction with: - answer-a proxy server What is encryption? - answer-The process of converting data into an unreadable form of text What is spyware? - answer-A software application that is secretly placed on a user's system to gather information and relay it to outside parties What is symmetric encryption? - answer-An encryption method in which the same key is used to encrypt and decrypt a message What is a cookie? - answer-A small text file that contains information sent between a server and a client to help track user activities Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered: - answer-a licensing agreement Malware is a generic term for software: - answer-whose specific intent is to harm computer systems Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company? - answer-Because JavaScript and ActiveX controls allow information to be downloaded and run on your system Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall? - answer-Users on the LAN can request information from the Internet, but outside users are denied access to the LAN What is the term for a numeric code that uses an algorithm to encrypt and decrypt data? - answer-Key Which term collectively refers to industrial property and copyrighted works? - answer-Intellectual property What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products? - answer-Trademark For what purpose should you use automatic cookie handling in most browsers? - answer

Show more Read less
Institution
CIW IBA Lesson 8
Module
CIW IBA Lesson 8








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIW IBA Lesson 8
Module
CIW IBA Lesson 8

Document information

Uploaded on
March 27, 2024
Number of pages
4
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

£8.48
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TOPDOCTOR Abacus College, Oxford
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
2 year
Number of followers
5
Documents
3395
Last sold
4 months ago
TOPGRADER!!

Looking for relevant and updated study material to help you ace your exams? TOPTIERGRADES has your back!!! I have essential exams, test-banks, study bites, assignments all graded A+, Have Complete solutions, and are updated regularly. Please feel free to message me if you are looking for a specific test bank that is not listed on my profile or want a test bank or exam sent to you directly as google doc link. In the event that any of the materials have an issue, please let me know and I\'ll do my best to resolve it or provide an alternative. Thank You & All The Very BEST!!!!!

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions