
CIW-Lesson 8 Review (1.10)
Flashcard
•
Computers
•
9th - 12th Grade
•
Hard
Wayground Content
FREE Resource
Student preview

38 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following is the most common method for spreading viruses? Downloading files, Installing programs, Swapping disks or drives, Opening attachments
Back
Opening attachments
2.
FLASHCARD QUESTION
Front
Which statement best describes hash encryption? Options: An encryption method in which a key is required to encrypt data for storage and verify its integrity, An encryption method in which the same key is used to encrypt and decrypt a message, An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message, An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
Back
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
3.
FLASHCARD QUESTION
Front
Secure authentication requires:
Back
a user name, a password, and encryption of this information
4.
FLASHCARD QUESTION
Front
When your company's private LAN is protected by a firewall, which of the following is true? Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.
Back
Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.
5.
FLASHCARD QUESTION
Front
What can you use to electronically verify your identity without the need to provide data confidentiality?
Back
Digital signature
6.
FLASHCARD QUESTION
Front
Which of the following is an effective way for Web site owners to prevent typosquatting? Options: Purchase domain names that are similar to their actual domain names, Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys, Automatically apply operating system updates and patches as they become available, Host their Web sites on illicit servers
Back
Purchase domain names that are similar to their actual domain names
7.
FLASHCARD QUESTION
Front
You suspect that an attacker has gained control of your computer system. What action should you take next?
Back
Unplug the computer network cable and/or disable the computer's wireless NIC.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
26 questions
Social Class & Consumer Behavior
Flashcard
•
KG
25 questions
Spanish Vocabulary Flashcards
Flashcard
•
KG
35 questions
End of year 11 Formative Quzz
Flashcard
•
11th Grade
37 questions
hobbies and interests
Flashcard
•
7th - 12th Grade
37 questions
English-Vietnamese Vocabulary Flashcards
Flashcard
•
9th - 12th Grade
23 questions
Consejo Europeo y Consejo de la Unión Europea T11 B1
Flashcard
•
KG - University
30 questions
Consumer Law Edexcel GCSE Business
Flashcard
•
9th Grade
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
30 questions
Computer Terminology Exercise #1 ( Fill Ins)
Quiz
•
9th Grade
15 questions
MLA Formatting
Quiz
•
9th Grade
20 questions
Typing Practice
Quiz
•
7th - 12th Grade
14 questions
Inputs and Outputs: Computer Science Intro
Lesson
•
5th - 9th Grade
20 questions
Google Sheets Quiz
Quiz
•
9th Grade