CIW-Lesson 8 Review (1.10)

CIW-Lesson 8 Review (1.10)

Assessment

Flashcard

Computers

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

38 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which of the following is the most common method for spreading viruses? Downloading files, Installing programs, Swapping disks or drives, Opening attachments

Back

Opening attachments

2.

FLASHCARD QUESTION

Front

Which statement best describes hash encryption? Options: An encryption method in which a key is required to encrypt data for storage and verify its integrity, An encryption method in which the same key is used to encrypt and decrypt a message, An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message, An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

Back

An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

3.

FLASHCARD QUESTION

Front

Secure authentication requires:

Back

a user name, a password, and encryption of this information

4.

FLASHCARD QUESTION

Front

When your company's private LAN is protected by a firewall, which of the following is true? Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.

Back

Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.

5.

FLASHCARD QUESTION

Front

What can you use to electronically verify your identity without the need to provide data confidentiality?

Back

Digital signature

6.

FLASHCARD QUESTION

Front

Which of the following is an effective way for Web site owners to prevent typosquatting? Options: Purchase domain names that are similar to their actual domain names, Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys, Automatically apply operating system updates and patches as they become available, Host their Web sites on illicit servers

Back

Purchase domain names that are similar to their actual domain names

7.

FLASHCARD QUESTION

Front

You suspect that an attacker has gained control of your computer system. What action should you take next?

Back

Unplug the computer network cable and/or disable the computer's wireless NIC.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?