Filters
Question type

Study Flashcards

_____ refers to preventing unauthorized data modification.


A) Integrity
B) Secrecy
C) Necessity
D) Completeness

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Describe the security dangers inherent in ActiveX controls.

Correct Answer

verifed

verified

The security danger with ActiveX control...

View Answer

A _____ is an area of memory set aside to hold data read from a file or database.


A) firewall
B) cookie
C) buffer
D) worm

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Worms can spread quickly through the Internet.

A) True
B) False

Correct Answer

verifed

verified

The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.

A) True
B) False

Correct Answer

verifed

verified

In the context of categorizing cookies in terms of their time duration, _____ are cookies which exist until the Web client ends the connection.


A) first-party cookies
B) persistent cookies
C) third-party cookies
D) session cookies

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

How is a buffer vulnerable to security threats?

Correct Answer

verifed

verified

A buffer is an area of memory set aside ...

View Answer

_____ is the coding of information by using a mathematically based program and a secret key to produce a string of characters that is unintelligible.

Correct Answer

verifed

verified

What are the six main elements included on a digital certificate?

Correct Answer

verifed

verified

A digital certificate includes six main ...

View Answer

Briefly describe the requirements for secure electronic commerce.

Correct Answer

verifed

verified

Secure electronic commerce should satisf...

View Answer

In the context of the elements of computer security, necessity refers to preventing data delays or denials.

A) True
B) False

Correct Answer

verifed

verified

The science that studies encryption is called _____.

Correct Answer

verifed

verified

Any act or object that poses a danger to computer assets is known as a _____.


A) countermeasure
B) bug
C) threat
D) code

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

JavaScript and VBScript are _____, which provide commands that are executed on the client.


A) plug-ins
B) scripting languages
C) Web bugs
D) session cookies

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

A(n) _____ occurs when an Internet e-mail message is intercepted and its contents are changed before it is forwarded to its original destination.

Correct Answer

verifed

verified

Browser _____ are programs that enhance the capabilities of browsers, handle Web content that a browser cannot handle.

Correct Answer

verifed

verified

In some cities that have large concentrations of wireless networks, attackers, called _____, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.

Correct Answer

verifed

verified

Most browsers allow users to limit the actions taken by Java applets and scripting languages by running them in a(n) _____, which is a functional subset of the full browser.

Correct Answer

verifed

verified

Active content can pose a threat to the security of client devices.

A) True
B) False

Correct Answer

verifed

verified

Cookies placed on a client computer by a Web server site are called _____.

Correct Answer

verifed

verified

Showing 41 - 60 of 80

Related Exams

Show Answer