Exam 6: Internet Security
Exam 1: Browser Basics149 Questions
Exam 2: Basic Communication on the Internet: Email150 Questions
Exam 3: Searching the Web150 Questions
Exam 4: Information Resources on the Web149 Questions
Exam 5: User-Generated Content on the Internet150 Questions
Exam 6: Internet Security150 Questions
Exam 7: Wireless Networking147 Questions
Exam 8: Creating Effective Web Pages149 Questions
Exam 9: Electronic Commerce150 Questions
Select questions type
A(n) ____ is a self-replicating program usually hidden within another file and sent as an email attachment.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
D
____ means employing more than one authentication method.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
C
If you believe you are a victim of identity theft, you must act quickly to contact the ____ credit reporting agencies, every financial institution at which you have an account, and the issuer of every credit card you hold.
Free
(Multiple Choice)
5.0/5
(32)
Correct Answer:
B
A(n) ____________________ vendor does not inform the customer that the software he is providing will track your use of the programs and of the Internet.
(Short Answer)
4.9/5
(36)
Encrypted information is called cipher text. _________________________
(True/False)
4.8/5
(39)
Java, JavaScript, and ActiveX programs are all considered proactive content. _________________________
(Short Answer)
4.8/5
(28)
A digital logo is a digital pattern containing copyright information that is inserted into a digital image, animation, or audio or video file. _________________________
(True/False)
4.8/5
(30)
A(n) identity manager stores user name and password information in encrypted form on a computer. _________________________
(True/False)
4.9/5
(32)
All of the following are categories of computer security threat EXCEPT ____.
(Multiple Choice)
4.8/5
(41)
A computer ____ permits traffic to leave and enter a computer.
(Multiple Choice)
4.8/5
(39)
The location of the clear GIF shown in the figure above is a URL for DoubleClick, a division of ____ that develops tools for Internet marketing and advertising.
(Multiple Choice)
4.9/5
(31)
A server certificate ensures that transfer of data between a user's computer and the server is ____________________ so that it is tamperproof and free from being intercepted.
(Short Answer)
4.8/5
(38)
A client certificate authenticates a Web site so site visitors can be confident in the identity of the Web server.
(True/False)
4.9/5
(40)
____ is a process that hides encrypted messages within different types of files.
(Multiple Choice)
4.9/5
(44)
Heather's friend recently had her identity stolen after accidentally responding to a phishing email. Worried that it might happen to her, Heather has read up on how phishing attacks work. You come over to help make sure she understands it.
-Offhand, Heather asks you why this kind of attack was named "phishing" in the first place. You reply that ____.
(Multiple Choice)
4.7/5
(30)
A digital ____ is a pattern containing copyright information that is inserted into a digital image, animation, or audio or video file.
(Multiple Choice)
4.8/5
(39)
A(n) ____ attack occurs when an attacker disrupts normal computer processing or denies processing entirely.
(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 150
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)