Podcast
Questions and Answers
Which of the following statements is true of cookies?
Which of the following statements is true of cookies?
Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages?
Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages?
Because spam is sent to you uninvited, it can be considered
Because spam is sent to you uninvited, it can be considered
an invasion of privacy.
What is a cookie?
What is a cookie?
Signup and view all the answers
To what does 'The Right to Be Forgotten' argument relate?
To what does 'The Right to Be Forgotten' argument relate?
Signup and view all the answers
Which Windows Internet Explorer privacy level setting blocks cookies from third-party Web sites that do not have a compact policy?
Which Windows Internet Explorer privacy level setting blocks cookies from third-party Web sites that do not have a compact policy?
Signup and view all the answers
What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?
What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?
Signup and view all the answers
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
Signup and view all the answers
What can be considered a drawback of networked computing and Internet use?
What can be considered a drawback of networked computing and Internet use?
Signup and view all the answers
For what purpose should you use automatic cookie handling in most browsers?
For what purpose should you use automatic cookie handling in most browsers?
Signup and view all the answers
Which two authentication types require a user name and password?
Which two authentication types require a user name and password?
Signup and view all the answers
Which of the following is used to enforce non-repudiation?
Which of the following is used to enforce non-repudiation?
Signup and view all the answers
What is encryption?
What is encryption?
Signup and view all the answers
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Signup and view all the answers
What is currently the most common way to authenticate users on private and public computer networks?
What is currently the most common way to authenticate users on private and public computer networks?
Signup and view all the answers
What is the term for an electronic stamp that identifies a message's source and contents?
What is the term for an electronic stamp that identifies a message's source and contents?
Signup and view all the answers
Which of the following provides positive identification of the sending and receiving parties?
Which of the following provides positive identification of the sending and receiving parties?
Signup and view all the answers
What is authentication?
What is authentication?
Signup and view all the answers
Which of the following entities possesses the digital certificate during an Internet transaction?
Which of the following entities possesses the digital certificate during an Internet transaction?
Signup and view all the answers
Encryption is the primary means of:
Encryption is the primary means of:
Signup and view all the answers
Which of the following protocols was developed by the Internet Engineering Task Force (IETF)?
Which of the following protocols was developed by the Internet Engineering Task Force (IETF)?
Signup and view all the answers
Which of the following protocols provides authentication and encryption?
Which of the following protocols provides authentication and encryption?
Signup and view all the answers
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Signup and view all the answers
What is the relationship between encryption and authentication?
What is the relationship between encryption and authentication?
Signup and view all the answers
What is decryption?
What is decryption?
Signup and view all the answers
What does a URL that starts with https:// signify?
What does a URL that starts with https:// signify?
Signup and view all the answers
What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?
What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?
Signup and view all the answers
What is ciphertext?
What is ciphertext?
Signup and view all the answers
Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
Signup and view all the answers
What is a hash?
What is a hash?
Signup and view all the answers
What is hash encryption?
What is hash encryption?
Signup and view all the answers
Which of the following should you use to encrypt and decrypt digital signatures?
Which of the following should you use to encrypt and decrypt digital signatures?
Signup and view all the answers
Which of the following has become the most common asymmetric encryption algorithm?
Which of the following has become the most common asymmetric encryption algorithm?
Signup and view all the answers
What is symmetric encryption?
What is symmetric encryption?
Signup and view all the answers
In which encryption method are the public and private keys mathematically related?
In which encryption method are the public and private keys mathematically related?
Signup and view all the answers
What is asymmetric encryption?
What is asymmetric encryption?
Signup and view all the answers
For which encryption method is it critical that the secrecy of the key be maintained?
For which encryption method is it critical that the secrecy of the key be maintained?
Signup and view all the answers
What is an illicit server?
What is an illicit server?
Signup and view all the answers
What is the term for software that scans disks and programs to eliminate harmful software?
What is the term for software that scans disks and programs to eliminate harmful software?
Signup and view all the answers
Malware is a generic term for software:
Malware is a generic term for software:
Signup and view all the answers
What is a virus?
What is a virus?
Signup and view all the answers
What is a trojan?
What is a trojan?
Signup and view all the answers
If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
Signup and view all the answers
Which of the following is the most effective way to spread viruses?
Which of the following is the most effective way to spread viruses?
Signup and view all the answers
What is a worm?
What is a worm?
Signup and view all the answers
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
Signup and view all the answers
To comply with many Web site requirements for added security, nearly all browsers support a minimum of:
To comply with many Web site requirements for added security, nearly all browsers support a minimum of:
Signup and view all the answers
It is important to install updates to e-mail clients to minimize security breaches. What do many e-mail clients default to?
It is important to install updates to e-mail clients to minimize security breaches. What do many e-mail clients default to?
Signup and view all the answers
Which of the following is designed to provide an immediate solution to fix a known problem in programming code?
Which of the following is designed to provide an immediate solution to fix a known problem in programming code?
Signup and view all the answers
What can be considered a disadvantage to installing program patches and updates?
What can be considered a disadvantage to installing program patches and updates?
Signup and view all the answers
What is an update?
What is an update?
Signup and view all the answers
What is spyware?
What is spyware?
Signup and view all the answers
A major update with significant software improvements is often marketed as a new:
A major update with significant software improvements is often marketed as a new:
Signup and view all the answers
What is a patch?
What is a patch?
Signup and view all the answers
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
Signup and view all the answers
Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
Signup and view all the answers
Which of the following hypothetical Web site URLs is most likely an example of typosquatting?
Which of the following hypothetical Web site URLs is most likely an example of typosquatting?
Signup and view all the answers
You can use screen savers to:
You can use screen savers to:
Signup and view all the answers
Why are firewalls considered the first line of defense against LAN security breaches?
Why are firewalls considered the first line of defense against LAN security breaches?
Signup and view all the answers
A screen saver is a graphic or moving image that appears on your screen:
A screen saver is a graphic or moving image that appears on your screen:
Signup and view all the answers
The most common business firewall technique is to use a firewall server in conjunction with:
The most common business firewall technique is to use a firewall server in conjunction with:
Signup and view all the answers
Typosquatting is the unethical practice of:
Typosquatting is the unethical practice of:
Signup and view all the answers
The connectivity that makes the Internet possible also makes systems vulnerable to:
The connectivity that makes the Internet possible also makes systems vulnerable to:
Signup and view all the answers
What is a firewall?
What is a firewall?
Signup and view all the answers
You are making efforts to prevent attackers from gaining access to network connections. What strategy may cause problems?
You are making efforts to prevent attackers from gaining access to network connections. What strategy may cause problems?
Signup and view all the answers
Which term collectively refers to industrial property and copyrighted works?
Which term collectively refers to industrial property and copyrighted works?
Signup and view all the answers
Which organization is responsible for codifying copyright law as it applies to digital information?
Which organization is responsible for codifying copyright law as it applies to digital information?
Signup and view all the answers
Copying an image from a Web site for your own purposes without getting permission can be considered:
Copying an image from a Web site for your own purposes without getting permission can be considered:
Signup and view all the answers
What is the term for a word, slogan, symbol, name, package design, or device that distinguishes a product?
What is the term for a word, slogan, symbol, name, package design, or device that distinguishes a product?
Signup and view all the answers
Receiving written permission from a copyright owner to use copyright-protected material can be considered:
Receiving written permission from a copyright owner to use copyright-protected material can be considered:
Signup and view all the answers
Which organization was formed by the United Nations to protect intellectual property worldwide?
Which organization was formed by the United Nations to protect intellectual property worldwide?
Signup and view all the answers
Desktop firewalls offer protection for:
Desktop firewalls offer protection for:
Signup and view all the answers
Study Notes
Cookies and Privacy
- Cookies are small text files that track user activities, partially encrypted.
- Monitoring employee emails can restrict access to essential online resources, affecting productivity.
- Spam is considered an invasion of privacy as it is unsolicited.
Internet Security Concepts
- "The Right to Be Forgotten" allows individuals to protect their image and personal information online.
- A persistent cookie remains on a device after browser sessions end.
- Digital signatures and digital certificates ensure non-repudiation and identify message sources.
Authentication and Encryption
- Basic and secure authentication require a username and password.
- Encryption converts data into an unreadable format, while decryption reverses this process.
- Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses a pair of keys.
- HTTPS indicates a secure website with encrypted data transmissions.
Malware and Protection
- Malware encompasses various harmful software, including viruses, worms, and Trojan horses.
- Anti-virus software scans for and removes harmful programs to protect computer systems.
- Viruses can be spread through email attachments; running a reputable anti-virus tool is crucial for protection.
- Patches fix programming issues but may introduce new problems or incompatibilities.
Firewalls and LAN Security
- Firewalls block unauthorized access to private networks and are essential for LAN security.
- Using a proxy server alongside a firewall is a common practice for business security.
- The practice of typosquatting involves creating similar URLs to mislead users, often used to capture traffic meant for legitimate sites.
Intellectual Property
- Intellectual property includes industrial property and copyrighted works, protected under various laws.
- Copyright infringement can occur by using images or content without permission.
- A trademark distinguishes one company's products from others and requires legal protection.
- The World Intellectual Property Organization (WIPO) works to protect intellectual property globally.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Prepare for your Lesson 8 test with these flashcards focused on cookies and employee monitoring practices. Each card presents key concepts you need to understand for the exam, facilitating a comprehensive review process.