CIW IBA Lesson 8
What is currently the most common way to authenticate users on private and public computer networks? - answer-Requiring user names and passwords What is the term for a password-protected, encrypted data file that can be used to authenticate a program? - answer-Digital certificate What is ciphertext? - answer-Encrypted data Because spam is sent to you uninvited, it can be considered: - answer-an invasion of privacy Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because: - answer-the user need only receive the virus for it to cause damage In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them? - answer-Asymmetric encryption Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure? - answer-Hash encryption Which of the following is the most effective way to spread viruses? - answer-Sending e-mail attachments What can be considered a disadvantage to installing program patches and updates? - answer-They may introduce incompatibility issues or new security issues What is an illicit server? - answer-An application that installs hidden services on systems Which organization is responsible for codifying copyright law as it applies to digital information? - answer-Information Infrastructure Task Force (IITF) What is authentication? - answer-The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data The most common business firewall technique is to use a firewall server in conjunction with - answer-a proxy server. Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe? - answer-Digital certificate The most common business firewall technique is to use a firewall server in conjunction with: - answer-a proxy server What is encryption? - answer-The process of converting data into an unreadable form of text What is spyware? - answer-A software application that is secretly placed on a user's system to gather information and relay it to outside parties What is symmetric encryption? - answer-An encryption method in which the same key is used to encrypt and decrypt a message What is a cookie? - answer-A small text file that contains information sent between a server and a client to help track user activities Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered: - answer-a licensing agreement Malware is a generic term for software: - answer-whose specific intent is to harm computer systems Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company? - answer-Because JavaScript and ActiveX controls allow information to be downloaded and run on your system Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall? - answer-Users on the LAN can request information from the Internet, but outside users are denied access to the LAN What is the term for a numeric code that uses an algorithm to encrypt and decrypt data? - answer-Key Which term collectively refers to industrial property and copyrighted works? - answer-Intellectual property What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products? - answer-Trademark For what purpose should you use automatic cookie handling in most browsers? - answer
Written for
- Institution
- CIW IBA Lesson 8
- Module
- CIW IBA Lesson 8
Document information
- Uploaded on
- March 27, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
ciw iba lesson 8
Also available in package deal