and CORRECT Answers
What is currently the most common way to authenticate users on private and public computer
networks? - CORRECT ANSWER - Requiring user names and passwords
What is the term for a password-protected, encrypted data file that can be used to authenticate a
program? - CORRECT ANSWER - Digital certificate
What is ciphertext? - CORRECT ANSWER - Encrypted data
Because spam is sent to you uninvited, it can be considered: - CORRECT ANSWER - an
invasion of privacy
Viruses that reside within the text of an HTML-formatted e-mail message are particularly
virulent because: - CORRECT ANSWER - the user need only receive the virus for it to
cause damage
In which encryption method are the public and private keys mathematically related so that only
the public key can be used to encrypt messages, and only the corresponding private key can be
used to decrypt them? - CORRECT ANSWER - Asymmetric encryption
Which of the following should you use to encrypt and decrypt digital signatures, and to protect
passwords from disclosure? - CORRECT ANSWER - Hash encryption
Which of the following is the most effective way to spread viruses? - CORRECT
ANSWER - Sending e-mail attachments
What can be considered a disadvantage to installing program patches and updates? - CORRECT
ANSWER - They may introduce incompatibility issues or new security issues
, What is an illicit server? - CORRECT ANSWER - An application that installs hidden
services on systems
Which organization is responsible for codifying copyright law as it applies to digital
information? - CORRECT ANSWER - Information Infrastructure Task Force (IITF)
What is authentication? - CORRECT ANSWER - The process of verifying the identity of a
user who logs on to a system, or the integrity of transmitted data
The most common business firewall technique is to use a firewall server in conjunction with -
CORRECT ANSWER - a proxy server.
Which of the following provides positive identification of the sending and receiving parties to
ensure that programs downloaded from the Internet are original and safe? - CORRECT
ANSWER - Digital certificate
The most common business firewall technique is to use a firewall server in conjunction with: -
CORRECT ANSWER - a proxy server
What is encryption? - CORRECT ANSWER - The process of converting data into an
unreadable form of text
What is spyware? - CORRECT ANSWER - A software application that is secretly placed
on a user's system to gather information and relay it to outside parties
What is symmetric encryption? - CORRECT ANSWER - An encryption method in which
the same key is used to encrypt and decrypt a message
What is a cookie? - CORRECT ANSWER - A small text file that contains information sent
between a server and a client to help track user activities