Exam

Name___________________________________

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
 
1)  Which of the following is NOT true about digital signatures? 1) ______
  A)  Digital signatures are derived from scanned handwritten signatures.
  B)  Digital signatures indicate the message has not been tampered with.
  C)  Digital signatures use an algorithm to generate a one-way hash.
  D)  Public and private key methods are both used to create a digital signature.

2)  The ________ group is the most powerful group on a corporate network. 2) ______
  A)  executive
  B)  network
  C)  user
  D)  administrator

3)  Spyware is different from adware because: 3) ______
  A)  it can be downloaded along with other programs.
  B)  it uses web bugs.
  C)  it can monitor other computer activities besides Web browsing.
  D)  it deletes cookies from your hard drive.

4)  The ________ is the individual responsible for creating groups and assigning rights on a company's computer system. 4) ______
  A)  network coordinator
  B)  system advocate
  C)  helpdesk technician
  D)  network administrator

SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
 
5)  Processing a message with an algorithm to produce a one-way hash creates a(n) ________. 5) ______

6)  Enhanced 911 emergency response technology is a benefit of ________ technology. 6) ______

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
 
7)  Which of the following statements about firewalls and proxy servers is NOT true? 7) ______
  A)  Firewall filter settings may need periodic adjustment.
  B)  They keep all malicious communications from accessing your computer.
  C)  It is possible to allow traffic that can be harmful.
  D)  They may block incoming communications that you wish to receive.

SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
 
8)  A padlock or key symbol in the status bar of a browser indicates that a(n) ________ is being used by the Web site. 8) ______

9)  It is possible to disable applets or prevent cookies from being stored by adjusting the browser ________. 9) ______

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
 
10)  Which of the following statements is NOT true about adware? 10) ______
  A)  Adware tracks all of your Web browsing activity.
  B)  It is possible to scan your computer and remove adware.
  C)  Adware can accompany commercially purchased software.
  D)  Adware transmits your Internet visits to their servers via your Internet connection.

11)  A gateway or ________ can provide additional security for a home network. 11) ______
  A)  Ethernet card
  B)  cable modem
  C)  router
  D)  shield

12)  The ________ Amendment of the U.S. Constitution protects citizens against unreasonable search and seizure. 12) ______
  A)  Thirteenth
  B)  Fourth
  C)  Ninth
  D)  First

13)  Affixing a special tag or number to your computer may: 13) ______
  A)  protect your computer from damage.
  B)  help to identify your computer if it is stolen.
  C)  help deter use by unauthorized individuals.
  D)  invalidate the warranty.

SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
 
14)  Match the following terms to their meanings:

I. Decryption A. Prevented by use of digital signature

II. Public
-key B. Colossus speeds up this process

III. Symmetric
-key C. Prevented by encryption

IV. Tampering D. Slower, more secure encryption method

V. Misrepresentation E. Kept secret, possessed by sender and recipient
14) ______

15)  A Web site's ________ explains how they will use any personal data that is collected. 15) ______

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
 
16)  In the health care industry, for every practicing doctor there are ________ people handling paperwork. 16) ______
  A)  two
  B)  four
  C)  nine
  D)  seven

SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
 
17)  Protecting computer hardware, creating ________, and controlling access are all methods of ensuring the physical security of your computer. 17) ______

18)  The ________ is the area between the firewall and the Internet. 18) ______

19)  Match the following terms to their meanings:

I. Spyware A. Calculates locations

II. Pop
-up B. Tracks computer activity

III. GPS C. Government program developed to defeat encryption methods

IV. Magic lantern D. Might be activated by mouse movements

V. Carnivore E. Used for e
-mail monitoring
19) ______

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
 
20)  Which of the following is NOT a major initiative of the National Strategy for Homeland Security? 20) ______
  A)  Improve public safety emergency communications.
  B)  Develop separate data standards for individual divisions within the federal government.
  C)  Integrate information sharing across state and local governments, private industry, and citizens.
  D)  Integrate information sharing across the federal government.