100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIW IBA Lesson 8 UPDATED Questions and CORRECT Answers

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
24-12-2024
Written in
2024/2025

CIW IBA Lesson 8 UPDATED Questions and CORRECT Answers What is currently the most common way to authenticate users on private and public computer networks? - CORRECT ANSWER - Requiring user names and passwords What is the term for a password-protected, encrypted data file that can be used to authenticate a program? - CORRECT ANSWER - Digital certificate

Show more Read less
Institution
CIW
Course
CIW









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIW
Course
CIW

Document information

Uploaded on
December 24, 2024
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CIW IBA Lesson 8 UPDATED Questions
and CORRECT Answers
What is currently the most common way to authenticate users on private and public computer
networks? - CORRECT ANSWER - Requiring user names and passwords


What is the term for a password-protected, encrypted data file that can be used to authenticate a
program? - CORRECT ANSWER - Digital certificate



What is ciphertext? - CORRECT ANSWER - Encrypted data



Because spam is sent to you uninvited, it can be considered: - CORRECT ANSWER - an
invasion of privacy


Viruses that reside within the text of an HTML-formatted e-mail message are particularly
virulent because: - CORRECT ANSWER - the user need only receive the virus for it to
cause damage


In which encryption method are the public and private keys mathematically related so that only
the public key can be used to encrypt messages, and only the corresponding private key can be
used to decrypt them? - CORRECT ANSWER - Asymmetric encryption


Which of the following should you use to encrypt and decrypt digital signatures, and to protect
passwords from disclosure? - CORRECT ANSWER - Hash encryption


Which of the following is the most effective way to spread viruses? - CORRECT
ANSWER - Sending e-mail attachments


What can be considered a disadvantage to installing program patches and updates? - CORRECT
ANSWER - They may introduce incompatibility issues or new security issues

, What is an illicit server? - CORRECT ANSWER - An application that installs hidden
services on systems


Which organization is responsible for codifying copyright law as it applies to digital
information? - CORRECT ANSWER - Information Infrastructure Task Force (IITF)



What is authentication? - CORRECT ANSWER - The process of verifying the identity of a
user who logs on to a system, or the integrity of transmitted data


The most common business firewall technique is to use a firewall server in conjunction with -
CORRECT ANSWER - a proxy server.


Which of the following provides positive identification of the sending and receiving parties to
ensure that programs downloaded from the Internet are original and safe? - CORRECT
ANSWER - Digital certificate


The most common business firewall technique is to use a firewall server in conjunction with: -
CORRECT ANSWER - a proxy server



What is encryption? - CORRECT ANSWER - The process of converting data into an
unreadable form of text


What is spyware? - CORRECT ANSWER - A software application that is secretly placed
on a user's system to gather information and relay it to outside parties


What is symmetric encryption? - CORRECT ANSWER - An encryption method in which
the same key is used to encrypt and decrypt a message


What is a cookie? - CORRECT ANSWER - A small text file that contains information sent
between a server and a client to help track user activities

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1072
Member since
1 year
Number of followers
102
Documents
68976
Last sold
8 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

170 reviews

5
73
4
30
3
45
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions