Exam
Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. | ||
1) | Which of the following is NOT true about digital signatures? | 1) ______ |
A) Digital signatures are derived from scanned handwritten signatures. | |
B) Digital signatures indicate the message has not been tampered with. | |
C) Digital signatures use an algorithm to generate a one-way hash. | |
D) Public and private key methods are both used to create a digital signature. |
2) | The ________ group is the most powerful group on a corporate network. | 2) ______ |
A) executive | |
B) network | |
C) user | |
D) administrator |
3) | Spyware is different from adware because: | 3) ______ |
A) it can be downloaded along with other programs. | |
B) it uses web bugs. | |
C) it can monitor other computer activities besides Web browsing. | |
D) it deletes cookies from your hard drive. |
4) | The ________ is the individual responsible for creating groups and assigning rights on a company's computer system. | 4) ______ |
A) network coordinator | |
B) system advocate | |
C) helpdesk technician | |
D) network administrator |
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. | ||
5) | Processing a message with an algorithm to produce a one-way hash creates a(n) ________. | 5) ______ |
6) | Enhanced 911 emergency response technology is a benefit of ________ technology. | 6) ______ |
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. | ||
7) | Which of the following statements about firewalls and proxy servers is NOT true? | 7) ______ |
A) Firewall filter settings may need periodic adjustment. | |
B) They keep all malicious communications from accessing your computer. | |
C) It is possible to allow traffic that can be harmful. | |
D) They may block incoming communications that you wish to receive. |
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. | ||
8) | A padlock or key symbol in the status bar of a browser indicates that a(n) ________ is being used by the Web site. | 8) ______ |
9) | It is possible to disable applets or prevent cookies from being stored by adjusting the browser ________. | 9) ______ |
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. | ||
10) | Which of the following statements is NOT true about adware? | 10) ______ |
A) Adware tracks all of your Web browsing activity. | |
B) It is possible to scan your computer and remove adware. | |
C) Adware can accompany commercially purchased software. | |
D) Adware transmits your Internet visits to their servers via your Internet connection. |
11) | A gateway or ________ can provide additional security for a home network. | 11) ______ |
A) Ethernet card | |
B) cable modem | |
C) router | |
D) shield |
12) | The ________ Amendment of the U.S. Constitution protects citizens against unreasonable search and seizure. | 12) ______ |
A) Thirteenth | |
B) Fourth | |
C) Ninth | |
D) First |
13) | Affixing a special tag or number to your computer may: | 13) ______ |
A) protect your computer from damage. | |
B) help to identify your computer if it is stolen. | |
C) help deter use by unauthorized individuals. | |
D) invalidate the warranty. |
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. | ||
14) |
Match the following terms to their meanings: I. Decryption A. Prevented by use of digital signature II. Public-key B. Colossus speeds up this process III. Symmetric-key C. Prevented by encryption IV. Tampering D. Slower, more secure encryption method V. Misrepresentation E. Kept secret, possessed by sender and recipient | 14) ______ |
15) | A Web site's ________ explains how they will use any personal data that is collected. | 15) ______ |
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. | ||
16) | In the health care industry, for every practicing doctor there are ________ people handling paperwork. | 16) ______ |
A) two | |
B) four | |
C) nine | |
D) seven |
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. | ||
17) | Protecting computer hardware, creating ________, and controlling access are all methods of ensuring the physical security of your computer. | 17) ______ |
18) | The ________ is the area between the firewall and the Internet. | 18) ______ |
19) |
Match the following terms to their meanings: I. Spyware A. Calculates locations II. Pop-up B. Tracks computer activity III. GPS C. Government program developed to defeat encryption methods IV. Magic lantern D. Might be activated by mouse movements V. Carnivore E. Used for e-mail monitoring | 19) ______ |
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. | ||
20) | Which of the following is NOT a major initiative of the National Strategy for Homeland Security? | 20) ______ |
A) Improve public safety emergency communications. | |
B) Develop separate data standards for individual divisions within the federal government. | |
C) Integrate information sharing across state and local governments, private industry, and citizens. | |
D) Integrate information sharing across the federal government. |