Lesson 8 Test Review
72 Questions
100 Views

Lesson 8 Test Review

Created by
@RazorSharpDaisy

Questions and Answers

Which of the following statements is true of cookies?

  • Cookies can only be viewed by the server.
  • Cookies are completely unencrypted.
  • Cookies do not store any information.
  • You can view the file content of cookies sent to browsers, but they are partially encrypted. (correct)
  • Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages?

  • Employee productivity increases.
  • It helps maintain workplace security.
  • Employees may gain access to unauthorized information.
  • Employees may be denied access to legitimate Internet resources that may help them do their jobs. (correct)
  • Because spam is sent to you uninvited, it can be considered

    an invasion of privacy.

    What is a cookie?

    <p>A small text file that contains information sent between a server and a client to help track user activities.</p> Signup and view all the answers

    To what does 'The Right to Be Forgotten' argument relate?

    <p>Protecting your image and personal information in the world of social networking.</p> Signup and view all the answers

    Which Windows Internet Explorer privacy level setting blocks cookies from third-party Web sites that do not have a compact policy?

    <p>Low</p> Signup and view all the answers

    What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?

    <p>Persistent cookie</p> Signup and view all the answers

    Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?

    <p>Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.</p> Signup and view all the answers

    What can be considered a drawback of networked computing and Internet use?

    <p>Your computer activities and personal information are no longer private.</p> Signup and view all the answers

    For what purpose should you use automatic cookie handling in most browsers?

    <p>To control when and from whom cookies are accepted.</p> Signup and view all the answers

    Which two authentication types require a user name and password?

    <p>Basic authentication and secure authentication</p> Signup and view all the answers

    Which of the following is used to enforce non-repudiation?

    <p>Digital signature</p> Signup and view all the answers

    What is encryption?

    <p>The process of converting data into an unreadable form of text.</p> Signup and view all the answers

    What is the term for a password-protected, encrypted data file that can be used to authenticate a program?

    <p>Digital certificate</p> Signup and view all the answers

    What is currently the most common way to authenticate users on private and public computer networks?

    <p>Requiring user names and passwords.</p> Signup and view all the answers

    What is the term for an electronic stamp that identifies a message's source and contents?

    <p>Digital signature</p> Signup and view all the answers

    Which of the following provides positive identification of the sending and receiving parties?

    <p>Digital certificate</p> Signup and view all the answers

    What is authentication?

    <p>The process of verifying the identity of a user who logs on to a system.</p> Signup and view all the answers

    Which of the following entities possesses the digital certificate during an Internet transaction?

    <p>The server</p> Signup and view all the answers

    Encryption is the primary means of:

    <p>ensuring data security and privacy on the Internet.</p> Signup and view all the answers

    Which of the following protocols was developed by the Internet Engineering Task Force (IETF)?

    <p>Transport Layer Security (TLS) protocol</p> Signup and view all the answers

    Which of the following protocols provides authentication and encryption?

    <p>Secure Sockets Layer (SSL) protocol</p> Signup and view all the answers

    What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?

    <p>Key</p> Signup and view all the answers

    What is the relationship between encryption and authentication?

    <p>Authentication occurs before an encryption session can begin.</p> Signup and view all the answers

    What is decryption?

    <p>The process of converting data that has been converted into an unreadable form back to its original form.</p> Signup and view all the answers

    What does a URL that starts with https:// signify?

    <p>That you are visiting a secure Web site in which data transmissions are encrypted.</p> Signup and view all the answers

    What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?

    <p>The protocols are made more secure because data transmissions are encrypted.</p> Signup and view all the answers

    What is ciphertext?

    <p>Encrypted data.</p> Signup and view all the answers

    Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?

    <p>Because some countries do not allow large encryption keys to be exported.</p> Signup and view all the answers

    What is a hash?

    <p>A number generated by an algorithm from a string of text.</p> Signup and view all the answers

    What is hash encryption?

    <p>An encryption method in which numbers generated by an algorithm are used to verify the integrity of transmitted messages.</p> Signup and view all the answers

    Which of the following should you use to encrypt and decrypt digital signatures?

    <p>Hash encryption</p> Signup and view all the answers

    Which of the following has become the most common asymmetric encryption algorithm?

    <p>RSA algorithm</p> Signup and view all the answers

    What is symmetric encryption?

    <p>An encryption method in which the same key is used to encrypt and decrypt a message.</p> Signup and view all the answers

    In which encryption method are the public and private keys mathematically related?

    <p>Asymmetric encryption</p> Signup and view all the answers

    What is asymmetric encryption?

    <p>An encryption method in which two keys (one private, one public) are used to encrypt and decrypt a message.</p> Signup and view all the answers

    For which encryption method is it critical that the secrecy of the key be maintained?

    <p>Symmetric encryption</p> Signup and view all the answers

    What is an illicit server?

    <p>An application that installs hidden services on systems.</p> Signup and view all the answers

    What is the term for software that scans disks and programs to eliminate harmful software?

    <p>Anti-virus software</p> Signup and view all the answers

    Malware is a generic term for software:

    <p>whose specific intent is to harm computer systems.</p> Signup and view all the answers

    What is a virus?

    <p>A malicious program that assumes control of system operations, and damages or destroys data.</p> Signup and view all the answers

    What is a trojan?

    <p>A program that appears to be harmless but actually produces harmful results.</p> Signup and view all the answers

    If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?

    <p>Use anti-virus software to disinfect your hard drive and remove the virus from your system.</p> Signup and view all the answers

    Which of the following is the most effective way to spread viruses?

    <p>Sending e-mail attachments.</p> Signup and view all the answers

    What is a worm?

    <p>A self-replicating program or algorithm that consumes system resources.</p> Signup and view all the answers

    Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:

    <p>the user need only receive the virus for it to cause damage.</p> Signup and view all the answers

    To comply with many Web site requirements for added security, nearly all browsers support a minimum of:

    <p>128-bit encryption.</p> Signup and view all the answers

    It is important to install updates to e-mail clients to minimize security breaches. What do many e-mail clients default to?

    <p>40-bit encryption levels.</p> Signup and view all the answers

    Which of the following is designed to provide an immediate solution to fix a known problem in programming code?

    <p>Patch</p> Signup and view all the answers

    What can be considered a disadvantage to installing program patches and updates?

    <p>They may introduce incompatibility issues or new security issues.</p> Signup and view all the answers

    What is an update?

    <p>A file or collection of software tools that resolves system liabilities and improves software performance.</p> Signup and view all the answers

    What is spyware?

    <p>A software application that is secretly placed on a user's system to gather information and relay it to outside parties.</p> Signup and view all the answers

    A major update with significant software improvements is often marketed as a new:

    <p>release.</p> Signup and view all the answers

    What is a patch?

    <p>A file of programming code that is inserted into an existing executable program to fix a known problem.</p> Signup and view all the answers

    What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?

    <p>Legitimate applications can be incorrectly identified as spyware.</p> Signup and view all the answers

    Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?

    <p>Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.</p> Signup and view all the answers

    Which of the following hypothetical Web site URLs is most likely an example of typosquatting?

    <p><a href="http://www.goggle.com">www.goggle.com</a></p> Signup and view all the answers

    You can use screen savers to:

    <p>hide your work while you are away from your desk, providing a measure of security.</p> Signup and view all the answers

    Why are firewalls considered the first line of defense against LAN security breaches?

    <p>Because they provide data confidentiality.</p> Signup and view all the answers

    A screen saver is a graphic or moving image that appears on your screen:

    <p>when your computer is idle.</p> Signup and view all the answers

    The most common business firewall technique is to use a firewall server in conjunction with:

    <p>a proxy server.</p> Signup and view all the answers

    Typosquatting is the unethical practice of:

    <p>registering domain names very similar to those of high-volume sites.</p> Signup and view all the answers

    The connectivity that makes the Internet possible also makes systems vulnerable to:

    <p>unwanted activity.</p> Signup and view all the answers

    What is a firewall?

    <p>A security barrier that prevents unauthorized access to or from private networks.</p> Signup and view all the answers

    You are making efforts to prevent attackers from gaining access to network connections. What strategy may cause problems?

    <p>Using your desktop firewall to block Internet Control Messaging Protocol (ICMP).</p> Signup and view all the answers

    Which term collectively refers to industrial property and copyrighted works?

    <p>Intellectual property.</p> Signup and view all the answers

    Which organization is responsible for codifying copyright law as it applies to digital information?

    <p>Information Infrastructure Task Force (IITF).</p> Signup and view all the answers

    Copying an image from a Web site for your own purposes without getting permission can be considered:

    <p>copyright infringement.</p> Signup and view all the answers

    What is the term for a word, slogan, symbol, name, package design, or device that distinguishes a product?

    <p>Trademark.</p> Signup and view all the answers

    Receiving written permission from a copyright owner to use copyright-protected material can be considered:

    <p>a licensing agreement.</p> Signup and view all the answers

    Which organization was formed by the United Nations to protect intellectual property worldwide?

    <p>World Intellectual Property Organization (WIPO).</p> Signup and view all the answers

    Desktop firewalls offer protection for:

    <p>an individual computer.</p> Signup and view all the answers

    Study Notes

    Cookies and Privacy

    • Cookies are small text files that track user activities, partially encrypted.
    • Monitoring employee emails can restrict access to essential online resources, affecting productivity.
    • Spam is considered an invasion of privacy as it is unsolicited.

    Internet Security Concepts

    • "The Right to Be Forgotten" allows individuals to protect their image and personal information online.
    • A persistent cookie remains on a device after browser sessions end.
    • Digital signatures and digital certificates ensure non-repudiation and identify message sources.

    Authentication and Encryption

    • Basic and secure authentication require a username and password.
    • Encryption converts data into an unreadable format, while decryption reverses this process.
    • Symmetric encryption uses a single key for both encryption and decryption, while asymmetric encryption uses a pair of keys.
    • HTTPS indicates a secure website with encrypted data transmissions.

    Malware and Protection

    • Malware encompasses various harmful software, including viruses, worms, and Trojan horses.
    • Anti-virus software scans for and removes harmful programs to protect computer systems.
    • Viruses can be spread through email attachments; running a reputable anti-virus tool is crucial for protection.
    • Patches fix programming issues but may introduce new problems or incompatibilities.

    Firewalls and LAN Security

    • Firewalls block unauthorized access to private networks and are essential for LAN security.
    • Using a proxy server alongside a firewall is a common practice for business security.
    • The practice of typosquatting involves creating similar URLs to mislead users, often used to capture traffic meant for legitimate sites.

    Intellectual Property

    • Intellectual property includes industrial property and copyrighted works, protected under various laws.
    • Copyright infringement can occur by using images or content without permission.
    • A trademark distinguishes one company's products from others and requires legal protection.
    • The World Intellectual Property Organization (WIPO) works to protect intellectual property globally.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Prepare for your Lesson 8 test with these flashcards focused on cookies and employee monitoring practices. Each card presents key concepts you need to understand for the exam, facilitating a comprehensive review process.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser