Question 5
A ____ is a technologically skilled person who uses his or her skills to obtain unauthorized entry into computers.
a. |
cracker |
|
b. |
script kiddie |
|
c. |
whacker |
|
d. |
zombie |
1 points
Question 6
A ____ stores items on a server as articles or postings that are sorted by topic.
a. |
newsgroup |
|
b. |
chat |
|
c. |
podcast |
|
d. |
mailing list |
1 points
Question 7
A ____-bit key is considered a(n) ____ key.
a. |
64, strong |
|
b. |
128, strong |
|
c. |
128, weak |
|
d. |
256, impervious |
1 points
Question 8
A blog often contains ____.
a. |
text and comments |
|
b. |
photographs |
|
c. |
videos |
|
d. |
all of the above |
1 points
Question 9
A computer ____ permits traffic to leave and enter a computer.
a. |
terminus |
|
b. |
gatehouse |
|
c. |
packet sniffer |
|
d. |
port |
1 points
Question 10
A digital ID is purchased from ____.
a. |
a certificate authority |
|
b. |
your employer |
|
c. |
eBay |
|
d. |
the government |
1 points
Question 11
A digital certificate usually contains all of the following EXCEPT ____.
a. |
verification from a trusted third party |
|
b. |
the certificate’s expiration date or validity period |
|
c. |
a keycode that destroys all evidence of the certificate upon use |
|
d. |
the certificate holder’s name, address, and email address |
1 points
Question 12
A feed might include ____.
a. |
news topics |
|
b. |
blog updates |
|
c. |
podcasts |
|
d. |
all of the above |
1 points
Question 13
A podcast with educational content is sometimes referred to as a ____.
a. |
learncast |
|
b. |
teachcast |
|
c. |
lecturecast |
|
d. |
smartcast |
1 points
Question 14
A port may be ____.
a. |
open |
|
b. |
closed |
|
c. |
stealth |
|
d. |
any of the above |
1 points
Question 15
A server certificate authenticates ____.
a. |
a web browser |
|
b. |
a website |
|
c. |
individual users |
|
d. |
governmental authorities |
1 points
Question 16
A social network is a general term that refers to any community of people who use the Internet to share ____.
a. |
updates |
|
b. |
business information |
|
c. |
contacts |
|
d. |
any of the above |
1 points
Question 17
A web bug can do all of the following EXCEPT:
a. |
identify the last website you visited |
|
b. |
identify your use of the web site containing the web bug |
|
c. |
identify other bugs on the website |
|
d. |
identify your IP address |
1 points
Question 18
A web bug is an example of spyware because ____.
a. |
the user is made explicitly aware of its presence and function |
|
b. |
it involves the use and manipulation of cookies |
|
c. |
it is small and unobtrusive |
|
d. |
the clear GIF and its actions are hidden from the user |
1 points
Question 19
A web bug works in conjunction with a(n) ____ to obtain information and send it to a third-party.
a. |
active content |
|
b. |
phishing |
|
c. |
adware |
|
d. |
cookie |
1 points
Question 20
A(n) ____ attack involves phony email messages that include links to spoofed websites.
a. |
DDoS |
|
b. |
phishing |
|
c. |
DoS |
|
d. |
man-in-the-middle |
5) cracker 6) newsgroup 7) 128, strong 8) all of the above 9) port 10) a certificate authority 11) a keycode that destroys all evidence of the certificate upon use 12) all of the above 13) learncast 14) any of the above 15) a Web site 16) any of the above 17) identify other bugs on the website 18) the clear GIF and its actions are hidden from the user 19) cookie 20) phishing
Get Answers For Free
Most questions answered within 1 hours.