CIW
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
SPAM: | show 🗑
|
||||
Cookie types: | show 🗑
|
||||
You can configure your browser’s security settings to accept, reject or prompt before accepting: | show 🗑
|
||||
Authentication | show 🗑
|
||||
show | no user name or password are required, and authentication is handled transparently by the browser and server
🗑
|
||||
Basic authentication: | show 🗑
|
||||
show | The same key is used to encrypt and decrypt messages
🗑
|
||||
Asymmetric (public-key) encryption: | show 🗑
|
||||
show | Uses hashes to verify the integrity of transmitted messages
🗑
|
||||
show | you must have the proper digital certificate to gain access
🗑
|
||||
User names and passwords: | show 🗑
|
||||
Digital signatures: | show 🗑
|
||||
Non-repudiation: | show 🗑
|
||||
show | the process of converting data into an unreadable form of text
🗑
|
||||
show | the process of converting the encrypted data back to its original form
🗑
|
||||
Key: | show 🗑
|
||||
Secure Sockets Layer (SSL): | show 🗑
|
||||
show | damages computers and networks, often alters files to damage or destroy data
🗑
|
||||
show | resides in active memory and replicates itself until an entire disk is full
🗑
|
||||
show | appears to be harmless (such as a computer game) but produces harmful results
🗑
|
||||
Illicit server: | show 🗑
|
||||
show | allows remote access to a computer by an attacker
🗑
|
||||
show | infects destination computer and enables the attacker to control it
🗑
|
||||
Common ways to contract viruses: | show 🗑
|
||||
show | o Do not open the attachment
o Contact the sender to determine whether the attachment is legitimate
o If you cannot contact the sender, delete the attachment from the message
o Delete the attachment from the Deleted Items folder
🗑
|
||||
show | o Use anti-virus software to remove the virus
o If you cant launch anti-virus software, reboot from a known clean system disk, launch anti-virus software
o Remove virus from all disks/file/programs
o If damage is too extensive, reformat hard disk,
🗑
|
||||
Spyware | show 🗑
|
||||
Cookies are not spyware because: | show 🗑
|
||||
Update: | show 🗑
|
||||
Patch: | show 🗑
|
||||
show | files of virus signature profiles you use to keep your anti-virus software current
🗑
|
||||
show | registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser
🗑
|
||||
show | a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
hannahluvsu