• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/71

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

71 Cards in this Set

  • Front
  • Back
What is used to enforce non-repudiation?
Digital signature
What is hash encryption?
An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of transmitted messages
For what purpose should you use automatic cookie handling in most browsers?
To control when and from whom cookies are accepted
Which Windows Internet Explorer privacy level settings blocks cookies from third-party Web sites that do not have a compact policy, and deletes cookies from third-party Web sites that use your personal information without your consent?
Low
What is true of cookies?
You can view the file content of cookies sent to browsers, but they are partially encrypted.
What provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate
What is the term for an electronic stamp that identifies a message's source and contents?
Digital signature
What is the relationship between encryption and authentication?
Authentication occurs before an encryption session can begin, but authentication does not ensure that the ensuing session will be encrypted.
What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?
The protocols are made more secure because data transmissions are encrypted.
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Key
In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
Asymmetric encryption
What has become the most common asymmetric encryption algorithm, and is included in Web browsers and many other products?
RSA algorithm
What does a URL that starts with https:// signify?
That you are visiting a secure Web site in which data transmissions are encrypted
Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
Because some countries do not allow large encryption keys to be exported
What can be considered a drawback of networked computing and Internet use?
Your computer activities and personal information are no longer private.
To what does "The Right to Be Forgotten" argument relate?
Protecting your image and personal information in the world of social networking
Because spam is sent to you uninvited, it can be considered:
an invasion of privacy.
What is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages and restricting their access to certain Web sites?
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
What is a cookie?
A small text file that contains information sent between a server and a client to help track user activities
What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?
Persistent cookie
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.
What is authentication?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
Which two authentication types require a user name and password?
Basic authentication and secure authentication
Which entity possesses the digital certificate during an Internet transaction?
The server
What is currently the most common way to authenticate users on private and public computer networks?
Requiring user names and passwords
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate
What is encryption?
The process of converting data into an unreadable form of text
What is decryption?
The process of converting data that has been converted into an unreadable form of text back to its original form
Which protocol provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?
Secure Sockets Layer (SSL) protocol
Which protocol was developed by the Internet Engineering Task Force (IETF) and is considered the successor to the Secure Sockets Layer (SSL) protocol?
Transport Layer Security (TLS) protocol
Encryption is the primary means of:
ensuring data security and privacy on the Internet.
What is cipher text?
Encrypted data
What is symmetric encryption?
An encryption method in which the same key is used to encrypt and decrypt a message
For which encryption method is it critical that the secrecy of the key be maintained by the sending and receiving parties in order for the encryption to be effective?
Symmetric encryption
What is a hash?
A number generated by an algorithm from a string of text
What should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
Hash encryption
What is an update?
A file or collection of software tools that resolves system liabilities and improves software performance
What can be considered a disadvantage to installing program patches and updates?
They may introduce incompatibility issues or new security issues.
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
the user need only receive the virus for it to cause damage.
Why are firewalls considered the first line of defense against LAN security breaches?
Because they provide data confidentiality
Desktop firewalls offer protection for:
an individual computer.
You are making efforts to prevent attackers from gaining access to network connections. Which strategy may cause problems when troubleshooting your computer's connectivity to the network?
Using your desktop firewall to block Internet Control Messaging Protocol (ICMP)
Which organization is responsible for codifying copyright law as it applies to digital information?
Information Infrastructure Task Force (IITF)
Malware is a generic term for software:
whose specific intent is to harm computer systems.
What is a virus?
A malicious program that assumes control of system operations, and damages or destroys data
What is a worm?
A self-replicating program or algorithm that consumes system resources
What is a trojan?
A program that appears to be harmless but actually produces harmful results
What is an illicit server?
An application that installs hidden services on systems
Which is the most effective way to spread viruses?
Sending e-mail attachments
What is the term for software that scans disks and programs for the purpose of eliminating software designed to harm computer systems?
Anti-virus software
If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
Use anti-virus software to disinfect your hard drive and remove the virus from your system.
What is spyware?
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
Legitimate applications can be incorrectly identified as spyware.
What is a patch?
A file of programming code that is inserted into an existing executable program to fix a known problem, or bug
What is designed to provide an immediate, temporary solution to fix a known problem in programming code?
Patch
A major update with significant software improvements is often marketed as a new:
release.
To comply with many Web site requirements for added security, nearly all browsers support a minimum of:
128-bit encryption.
It is important to install updates to e-mail clients to minimize security breaches. You can install updates to support a higher level of encryption because some e-mail clients default to:
40-bit encryption levels.
A screen saver is a graphic or moving image that appears on your screen:
when your computer is idle.
You can use screen savers to:
hide your work while you are away from your desk, providing a measure of security.
Typosquatting is the unethical practice of:
registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.
Which hypothetical Web site URLs is most likely an example of typosquatting?
www.goggle.com
The connectivity that makes the Internet possible also makes systems vulnerable to:
unwanted activity.
What is a firewall?
A security barrier that prevents unauthorized access to or from private networks
The most common business firewall technique is to use a firewall server in conjunction with:
a proxy server.
What can be considered an advantage of connecting LAN computers to the Internet through a firewall?
Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.
Copying an image from a Web site for your own purposes without getting permission from the image creator can be considered:
copyright infringement.
Which organization was formed by the United Nations to protect intellectual property worldwide?
World Intellectual Property Organization (WIPO)
Which term collectively refers to industrial property and copyrighted works?
Intellectual property
Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
a licensing agreement.
What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
Trademark