Filters
Question type

Study Flashcards

Worms can spread quickly through the Internet.

A) True
B) False

Correct Answer

verifed

verified

When Java applets are run within the constraints of the sandbox, they have full access to the client computer.

A) True
B) False

Correct Answer

verifed

verified

False

Digital certificates never expire.

A) True
B) False

Correct Answer

verifed

verified

____ refers to protecting against unauthorized data disclosure and ensuring the authenticity of the data source.


A) Necessity
B) Secrecy
C) Integrity
D) Encryption

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

The process of proposing and accepting (or rejecting)various transmission conditions is called session ____________________.

Correct Answer

verifed

verified

____ is the protection of computer assets from unauthorized access, use, alteration, or destruction.


A) Computer security
B) Computer risk
C) Access security
D) Logical security

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

____ is pretending to be someone you are not or representing a Web site as an original when it is really a fake.


A) Hash coding
B) Spoofing
C) Cybersquatting
D) Warchalking

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

____________________ exists when an unauthorized party can alter a message stream of information.

Correct Answer

verifed

verified

In some cities that have large concentrations of wireless networks, attackers, called ____________________, drive around in cars using their wireless-equipped laptop computers to search for accessible networks.

Correct Answer

verifed

verified

____ is the electronic defacing of an existing Web site's page.


A) Masquerading
B) Steganography
C) Cybersquatting
D) Cybervandalism

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Absolute security is relatively easy to achieve.

A) True
B) False

Correct Answer

verifed

verified

JavaScript programs, like Java applets, operate under the restrictions of the Java sandbox security model.

A) True
B) False

Correct Answer

verifed

verified

The shorter the session key, the more resistant the encryption is to attack.

A) True
B) False

Correct Answer

verifed

verified

A Web browser that has entered into an SSL session indicates that it is in an encrypted session.

A) True
B) False

Correct Answer

verifed

verified

True

Active content is launched in a Web browser automatically when that browser loads a Web page containing active content.

A) True
B) False

Correct Answer

verifed

verified

A(n) ____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.


A) objective
B) Java++
C) ActiveX control
D) plug-in

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Any message traveling on the Internet is subject to secrecy, integrity, and necessity threats.

A) True
B) False

Correct Answer

verifed

verified

A(n)____________________ is a Trojan horse that secretly takes over another computer for the purpose of launching attacks on other computers.

Correct Answer

verifed

verified

____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.


A) Hash coding
B) Symmetric
C) Asymmetric
D) Transformative

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

B

Message packets on the Internet travel a planned path from a source node to a destination node.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 80

Related Exams

Show Answer