
Lesson 8 CIW ICT Voc
Other
8th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
anti-virus software
Software that scans disks and programs for known viruses and eliminates them.
An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
asymmetric encryption
An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption
Abbreviation for malicious software. Malware is software designed to harm computer systems.
A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise's internal network, which accesses the Internet indirectly through a proxy server
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
authentication
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
A number generated by an algorithm from a text string. Also known as a message diges
A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
decryption
The process of converting encrypted data back to its original form.
A variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. Some applications encrypt and decrypt with the same key, whereas other applications use a pair of keys
A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise's internal network, which accesses the Internet indirectly through a proxy server
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
digital certificate
A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.
An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.
The unethical practice of registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
digital signature
An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
An encryption method in which the same key is used to encrypt and decrypt a message. Also known as private-key encryption
A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
encryption
A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
The process of converting encrypted data back to its original form
The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?