Podcast
Questions and Answers
Which of the following statements is true of cookies?
Which of the following statements is true of cookies?
- Cookies can only be viewed by the server.
- Cookies are completely unencrypted.
- Cookies do not store any information.
- You can view the file content of cookies sent to browsers, but they are partially encrypted. (correct)
Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages?
Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages?
- Employee productivity increases.
- It helps maintain workplace security.
- Employees may gain access to unauthorized information.
- Employees may be denied access to legitimate Internet resources that may help them do their jobs. (correct)
Because spam is sent to you uninvited, it can be considered
Because spam is sent to you uninvited, it can be considered
an invasion of privacy.
What is a cookie?
What is a cookie?
To what does 'The Right to Be Forgotten' argument relate?
To what does 'The Right to Be Forgotten' argument relate?
Which Windows Internet Explorer privacy level setting blocks cookies from third-party Web sites that do not have a compact policy?
Which Windows Internet Explorer privacy level setting blocks cookies from third-party Web sites that do not have a compact policy?
What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?
What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
What can be considered a drawback of networked computing and Internet use?
What can be considered a drawback of networked computing and Internet use?
For what purpose should you use automatic cookie handling in most browsers?
For what purpose should you use automatic cookie handling in most browsers?
Which two authentication types require a user name and password?
Which two authentication types require a user name and password?
Which of the following is used to enforce non-repudiation?
Which of the following is used to enforce non-repudiation?
What is encryption?
What is encryption?
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
What is currently the most common way to authenticate users on private and public computer networks?
What is currently the most common way to authenticate users on private and public computer networks?
What is the term for an electronic stamp that identifies a message's source and contents?
What is the term for an electronic stamp that identifies a message's source and contents?
Which of the following provides positive identification of the sending and receiving parties?
Which of the following provides positive identification of the sending and receiving parties?
What is authentication?
What is authentication?
Which of the following entities possesses the digital certificate during an Internet transaction?
Which of the following entities possesses the digital certificate during an Internet transaction?
Encryption is the primary means of:
Encryption is the primary means of:
Which of the following protocols was developed by the Internet Engineering Task Force (IETF)?
Which of the following protocols was developed by the Internet Engineering Task Force (IETF)?
Which of the following protocols provides authentication and encryption?
Which of the following protocols provides authentication and encryption?
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
What is the relationship between encryption and authentication?
What is the relationship between encryption and authentication?
What is decryption?
What is decryption?
What does a URL that starts with https:// signify?
What does a URL that starts with https:// signify?
What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?
What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?
What is ciphertext?
What is ciphertext?
Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
What is a hash?
What is a hash?
What is hash encryption?
What is hash encryption?
Which of the following should you use to encrypt and decrypt digital signatures?
Which of the following should you use to encrypt and decrypt digital signatures?
Which of the following has become the most common asymmetric encryption algorithm?
Which of the following has become the most common asymmetric encryption algorithm?
What is symmetric encryption?
What is symmetric encryption?
In which encryption method are the public and private keys mathematically related?
In which encryption method are the public and private keys mathematically related?
What is asymmetric encryption?
What is asymmetric encryption?
For which encryption method is it critical that the secrecy of the key be maintained?
For which encryption method is it critical that the secrecy of the key be maintained?
What is an illicit server?
What is an illicit server?
What is the term for software that scans disks and programs to eliminate harmful software?
What is the term for software that scans disks and programs to eliminate harmful software?
Malware is a generic term for software:
Malware is a generic term for software:
What is a virus?
What is a virus?
What is a trojan?
What is a trojan?
If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
Which of the following is the most effective way to spread viruses?
Which of the following is the most effective way to spread viruses?
What is a worm?
What is a worm?
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
To comply with many Web site requirements for added security, nearly all browsers support a minimum of:
To comply with many Web site requirements for added security, nearly all browsers support a minimum of:
It is important to install updates to e-mail clients to minimize security breaches. What do many e-mail clients default to?
It is important to install updates to e-mail clients to minimize security breaches. What do many e-mail clients default to?
Which of the following is designed to provide an immediate solution to fix a known problem in programming code?
Which of the following is designed to provide an immediate solution to fix a known problem in programming code?
What can be considered a disadvantage to installing program patches and updates?
What can be considered a disadvantage to installing program patches and updates?
What is an update?
What is an update?
What is spyware?
What is spyware?
A major update with significant software improvements is often marketed as a new:
A major update with significant software improvements is often marketed as a new:
What is a patch?
What is a patch?
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
Which of the following hypothetical Web site URLs is most likely an example of typosquatting?
Which of the following hypothetical Web site URLs is most likely an example of typosquatting?
You can use screen savers to:
You can use screen savers to:
Why are firewalls considered the first line of defense against LAN security breaches?
Why are firewalls considered the first line of defense against LAN security breaches?
A screen saver is a graphic or moving image that appears on your screen:
A screen saver is a graphic or moving image that appears on your screen:
The most common business firewall technique is to use a firewall server in conjunction with:
The most common business firewall technique is to use a firewall server in conjunction with:
Typosquatting is the unethical practice of:
Typosquatting is the unethical practice of:
The connectivity that makes the Internet possible also makes systems vulnerable to:
The connectivity that makes the Internet possible also makes systems vulnerable to:
What is a firewall?
What is a firewall?
You are making efforts to prevent attackers from gaining access to network connections. What strategy may cause problems?
You are making efforts to prevent attackers from gaining access to network connections. What strategy may cause problems?
Which term collectively refers to industrial property and copyrighted works?
Which term collectively refers to industrial property and copyrighted works?
Which organization is responsible for codifying copyright law as it applies to digital information?
Which organization is responsible for codifying copyright law as it applies to digital information?
Copying an image from a Web site for your own purposes without getting permission can be considered:
Copying an image from a Web site for your own purposes without getting permission can be considered:
What is the term for a word, slogan, symbol, name, package design, or device that distinguishes a product?
What is the term for a word, slogan, symbol, name, package design, or device that distinguishes a product?
Receiving written permission from a copyright owner to use copyright-protected material can be considered:
Receiving written permission from a copyright owner to use copyright-protected material can be considered:
Which organization was formed by the United Nations to protect intellectual property worldwide?
Which organization was formed by the United Nations to protect intellectual property worldwide?
Desktop firewalls offer protection for:
Desktop firewalls offer protection for:
Flashcards are hidden until you start studying
Study Notes
Cookies and Privacy
- Cookies are small text files that track user activities, partially encrypted.
- Monitoring employee emails can restrict access to essential online resources, affecting productivity.
- Spam is considered an invasion of privacy as it is unsolicited.
Internet Security Concepts
- "The Right to Be Forgotten" allows individuals to protect their image and personal information online.
- A persistent cookie remains on a device after browser sessions end.
- Digital signatures and digital certificates ensure non-repudiation and identify message sources.
Authentication and Encryption
- Basic and secure authentication require a username and password.
- Encryption converts data into an unreadable format, while decryption reverses this process.
- Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses a pair of keys.
- HTTPS indicates a secure website with encrypted data transmissions.
Malware and Protection
- Malware encompasses various harmful software, including viruses, worms, and Trojan horses.
- Anti-virus software scans for and removes harmful programs to protect computer systems.
- Viruses can be spread through email attachments; running a reputable anti-virus tool is crucial for protection.
- Patches fix programming issues but may introduce new problems or incompatibilities.
Firewalls and LAN Security
- Firewalls block unauthorized access to private networks and are essential for LAN security.
- Using a proxy server alongside a firewall is a common practice for business security.
- The practice of typosquatting involves creating similar URLs to mislead users, often used to capture traffic meant for legitimate sites.
Intellectual Property
- Intellectual property includes industrial property and copyrighted works, protected under various laws.
- Copyright infringement can occur by using images or content without permission.
- A trademark distinguishes one company's products from others and requires legal protection.
- The World Intellectual Property Organization (WIPO) works to protect intellectual property globally.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.