Exam 6: Internet Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____ is a self-replicating program usually hidden within another file and sent as an email attachment.

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

D

____ means employing more than one authentication method.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

If you believe you are a victim of identity theft, you must act quickly to contact the ____ credit reporting agencies, every financial institution at which you have an account, and the issuer of every credit card you hold.

Free
(Multiple Choice)
5.0/5
(32)
Correct Answer:
Verified

B

A(n) ____________________ vendor does not inform the customer that the software he is providing will track your use of the programs and of the Internet.

(Short Answer)
4.9/5
(36)

Encrypted information is called cipher text. _________________________

(True/False)
4.8/5
(39)

Java, JavaScript, and ActiveX programs are all considered proactive content. _________________________

(Short Answer)
4.8/5
(28)

SSL stands for ____.

(Multiple Choice)
4.9/5
(40)

A digital logo is a digital pattern containing copyright information that is inserted into a digital image, animation, or audio or video file. _________________________

(True/False)
4.8/5
(30)

A(n) identity manager stores user name and password information in encrypted form on a computer. _________________________

(True/False)
4.9/5
(32)

All of the following are categories of computer security threat EXCEPT ____.

(Multiple Choice)
4.8/5
(41)

A computer ____ permits traffic to leave and enter a computer.

(Multiple Choice)
4.8/5
(39)

The location of the clear GIF shown in the figure above is a URL for DoubleClick, a division of ____ that develops tools for Internet marketing and advertising.

(Multiple Choice)
4.9/5
(31)

A server certificate ensures that transfer of data between a user's computer and the server is ____________________ so that it is tamperproof and free from being intercepted.

(Short Answer)
4.8/5
(38)

A client certificate authenticates a Web site so site visitors can be confident in the identity of the Web server.

(True/False)
4.9/5
(40)

MATCHING -it permits traffic to leave and enter a computer

(Multiple Choice)
4.8/5
(39)

____ is a process that hides encrypted messages within different types of files.

(Multiple Choice)
4.9/5
(44)

Heather's friend recently had her identity stolen after accidentally responding to a phishing email. Worried that it might happen to her, Heather has read up on how phishing attacks work. You come over to help make sure she understands it. -Offhand, Heather asks you why this kind of attack was named "phishing" in the first place. You reply that ____.

(Multiple Choice)
4.7/5
(30)

DoubleClick is a division of ____.

(Multiple Choice)
4.8/5
(39)

A digital ____ is a pattern containing copyright information that is inserted into a digital image, animation, or audio or video file.

(Multiple Choice)
4.8/5
(39)

A(n) ____ attack occurs when an attacker disrupts normal computer processing or denies processing entirely.

(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)