Search Header Logo

Lesson 8 CIW ICT Voc

Other

8th Grade

Lesson 8 CIW ICT Voc
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

anti-virus software

Software that scans disks and programs for known viruses and eliminates them.

An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

asymmetric encryption

An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption

Abbreviation for malicious software. Malware is software designed to harm computer systems.

A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise's internal network, which accesses the Internet indirectly through a proxy server

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

authentication

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data

A number generated by an algorithm from a text string. Also known as a message diges

A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

decryption

The process of converting encrypted data back to its original form.

A variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. Some applications encrypt and decrypt with the same key, whereas other applications use a pair of keys

A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise's internal network, which accesses the Internet indirectly through a proxy server

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

digital certificate

A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.

An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.

The unethical practice of registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

digital signature

An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.

An encryption method in which the same key is used to encrypt and decrypt a message. Also known as private-key encryption

A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

encryption

A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.

The process of converting encrypted data back to its original form

The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?