SlideShare a Scribd company logo
Security Awareness Applying Practical Security
in Your World 4th Edition Mark Ciampa Test Bank
pdf download
https://testbankdeal.com/product/security-awareness-applying-
practical-security-in-your-world-4th-edition-mark-ciampa-test-
bank/
Download more testbank from https://testbankdeal.com
Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...
Guide to Network Security Fundamentals 6th Edition Ciampa
Test Bank
https://testbankdeal.com/product/guide-to-network-security-
fundamentals-6th-edition-ciampa-test-bank/
testbankdeal.com
Corporate Computer Security 4th Edition Boyle Test Bank
https://testbankdeal.com/product/corporate-computer-security-4th-
edition-boyle-test-bank/
testbankdeal.com
Principles of Information Security 4th Edition Whitman
Test Bank
https://testbankdeal.com/product/principles-of-information-
security-4th-edition-whitman-test-bank/
testbankdeal.com
Using MIS 6th Edition Kroenke Test Bank
https://testbankdeal.com/product/using-mis-6th-edition-kroenke-test-
bank/
testbankdeal.com
Psychology of Language An Integrated Approach 1st Edition
Luuden Test Bank
https://testbankdeal.com/product/psychology-of-language-an-integrated-
approach-1st-edition-luuden-test-bank/
testbankdeal.com
Principles of Economics 1st Edition Asarta Test Bank
https://testbankdeal.com/product/principles-of-economics-1st-edition-
asarta-test-bank/
testbankdeal.com
Business Law 9th Edition Gibson Solutions Manual
https://testbankdeal.com/product/business-law-9th-edition-gibson-
solutions-manual/
testbankdeal.com
Health Psychology Canadian 4th Edition Taylor Test Bank
https://testbankdeal.com/product/health-psychology-canadian-4th-
edition-taylor-test-bank/
testbankdeal.com
Introduct Programmi C++ International 3rd Edition Liang
Test Bank
https://testbankdeal.com/product/introduct-programmi-c-
international-3rd-edition-liang-test-bank/
testbankdeal.com
Analysis with an Introduction to Proof 5th Edition Lay
Solutions Manual
https://testbankdeal.com/product/analysis-with-an-introduction-to-
proof-5th-edition-lay-solutions-manual/
testbankdeal.com
Chapter 4: Internet Security
TRUE/FALSE
1. Web servers distribute HTML documents based on a set of standards, or protocols, known as the
Hypertext Transport Protocol (HTTP).
ANS: T PTS: 1 REF: 114
2. Web sites use the standard HTTP protocol for sending data through the Internet because this protocol
is secure and ensures that an attacker cannot view the contents of the transmission.
ANS: F PTS: 1 REF: 130
3. Restricting how cookies are created and used can also be done through configuring the Web browser.
ANS: T PTS: 1 REF: 131
4. Most users actually receive only a small amount of spam in their local e-mail inbox. The majority is
blocked before it even reaches the user.
ANS: T PTS: 1 REF: 133
5. With blocked low-level domain lists, e-mail from entire countries or regions can be blocked and
treated as spam.
ANS: F PTS: 1 REF: 133
MULTIPLE CHOICE
1. The ____ is a worldwide set of interconnected computers, servers, and networks.
a. Interweb c. NSFNet
b. Globalnet d. Internet
ANS: D PTS: 1 REF: 113
2. The ____ is composed of Internet server computers on networks that provide online information in a
specific format.
a. World Wide Web c. Internet Web
b. World Web d. Global Web
ANS: A PTS: 1 REF: 113
3. ____ allows Web authors to combine text, graphic images, audio, video, and hyperlinks into a single
document.
a. SGML c. HTML
b. IPL d. XSLT
ANS: C PTS: 1 REF: 113
4. Instructions written in HTML code specify how a local computer’s Web ____ should display the
words, pictures, and other elements on a user’s screen.
a. browser c. interface
b. server d. renderer
ANS: A PTS: 1 REF: 113
5. Most Internet transmissions are based on ____.
a. section numbers c. destination numbers
b. block numbers d. port numbers
ANS: D PTS: 1 REF: 114
6. It is estimated that over 100 trillion e-mails are sent annually, increasing at a rate of ____ percent each
year.
a. 10 c. 17
b. 15 d. 20
ANS: A PTS: 1 REF: 114
7. The SMTP server listens on port number ____.
a. 21 c. 110
b. 25 d. 125
ANS: B PTS: 1 REF: 115
8. The current version of IMAP is ____.
a. IMAP3 c. IMAP5
b. IMAP4 d. IMAP6
ANS: B PTS: 1 REF: 116
9. E-mail ____ are documents that are connected to an e-mail message, such as word processing
documents, spreadsheets, or pictures.
a. blocks c. add-ons
b. attachments d. partitions
ANS: B PTS: 1 REF: 116
10. ____ is a scripting language that does not create standalone applications.
a. C# c. WebScript
b. Java d. JavaScript
ANS: D PTS: 1 REF: 116
11. ____ is a complete programming language that can be used to create stand-alone applications.
a. Java c. WScript
b. JavaScript d. Shell script
ANS: A PTS: 1 REF: 117
12. A(n) ____ is a program that does not come from a trusted source.
a. authorized Java applet c. signed Java applet
b. unauthorized Java applet d. unsigned Java applet
ANS: D PTS: 1 REF: 118
13. Unsigned Java applets run in a security ____, which is like a fence that surrounds the program and
keeps it away from private data and other resources on a local computer.
a. firewall c. retaining wall
b. sandbox d. DMZ
ANS: B PTS: 1 REF: 118
14. ____ represent a specific way of implementing ActiveX and are sometimes called ActiveX
applications.
a. ActiveX programs c. ActiveX applets
b. ActiveX controls d. ActiveX plug-ins
ANS: B PTS: 1 REF: 118
15. ActiveX controls can be invoked from Web pages through the use of a ____ or directly by an HTML
command.
a. compiled language c. scripting language
b. modern language d. fourth-generation language
ANS: C PTS: 1 REF: 118
16. Known as ____, the deleted cookie’s unique ID can still be assigned to a new cookie using the data
stored in a Flash cookie as a backup.
a. respawning c. recreating
b. reinstating d. recooking
ANS: A PTS: 1 REF: 119
17. ____ is a technology that can associate a user’s identity to a public key, in which the user’s public key
has been “digitally signed” by a trusted third party.
a. Private key cryptography c. Public key cryptography
b. Asymmetric cryptography d. A digital certificate
ANS: D PTS: 1 REF: 121
18. ____ look for specific words and block e-mail messages containing those words.
a. Virus filters c. Network filters
b. Ad filters d. Spam filters
ANS: D PTS: 1 REF: 126
19. ____ uses graphical images of text in order to circumvent text-based filters.
a. PDF spam c. Flash spam
b. Image spam d. Java spam
ANS: B PTS: 1 REF: 126
20. A(n) ____ is a business from which users purchase Internet access.
a. Application Service Provider c. Internet Provider
b. Service Provider d. Internet Service Provider
ANS: D PTS: 1 REF: 133
21. Most e-mail clients contain a ____ that allows the user to read an e-mail message without actually
opening it.
a. preview pane c. reading pane
b. safety pane d. sandbox pane
ANS: C PTS: 1 REF: 133
COMPLETION
1. ____________________ allow users to jump from one area on the Web to another with a click of the
mouse button.
ANS: Hyperlinks
PTS: 1 REF: 113
2. HTTP is a subset of a larger set of standards for Internet transmission known as the
____________________.
ANS:
Transmission Control Protocol/Internet Protocol (TCP/IP)
Transmission Control Protocol/Internet Protocol
TCP/IP
PTS: 1 REF: 114
3. A(n) ____________________-party cookie is a cookie that was not created by the Web site that
attempts to access the cookie.
ANS: third
PTS: 1 REF: 119
4. ___________________ cookies can be used to reinstate regular cookies that a user has deleted or
blocked.
ANS: Flash
PTS: 1 REF: 119
5. Web browsers provide the ability to use ____________________ that allows the user to set
customized security for zones and then assign specific Web sites to a zone.
ANS: Web zones
PTS: 1 REF: 130
MATCHING
Match each term with the correct statement below.
a. Preview attachments f. Port 80
b. IFrame g. Ray Tomlinson
c. Blacklist h. Cookie
d. Microsoft Outlook i. Whitelist
e. Port number
1. Identifies the program or service that is being requested
2. A file used to store user-specific information on the user’s local computer and then retrieve it later
3. An HTML element that allows for one HTML document to be embedded inside the main document
4. Sent the first e-mail message in 1971
5. Automatically blocks over 80 different types of file attachments that may contain malware
6. The standard port for HTTP transmissions
7. A list of senders for which the user does not want to receive any e-mail
8. A list of senders for which the user will accept e-mail
9. Helps to protect the user from malicious code that may be embedded in the attachment because scripts
and ActiveX controls are disabled during this process
1. ANS: E PTS: 1 REF: 114
2. ANS: H PTS: 1 REF: 119
3. ANS: B PTS: 1 REF: 125
4. ANS: G PTS: 1 REF: 114
5. ANS: D PTS: 1 REF: 133
6. ANS: F PTS: 1 REF: 114
7. ANS: C PTS: 1 REF: 133
8. ANS: I PTS: 1 REF: 133
9. ANS: A PTS: 1 REF: 134
SHORT ANSWER
1. List the two TCP/IP protocols used by e-mail systems to send and receive messages.
ANS:
E-mail systems use two TCP/IP protocols to send and receive messages: the Simple Mail Transfer
Protocol (SMTP) handles outgoing mail, while the Post Office Protocol (POP, more commonly known
as POP3 for the current version) is responsible for incoming mail.
PTS: 1 REF: 114-115
2. Briefly explain who IMAP works.
ANS:
IMAP (Internet Mail Access Protocol) is an advanced mail protocol. With IMAP, the e-mail remains
on the e-mail server and is not downloaded to the user’s computer. Mail can be organized into folders
on the mail server and read from any computer. IMAP users can work with e-mail while offline. This
is accomplished by downloading e-mail onto the local computer without erasing the e-mail on the
IMAP server. A user can read and reply to e-mail offline. The next time a connection is established,
the new messages are sent and any new e-mail is downloaded. The current version of IMAP is IMAP4.
PTS: 1 REF: 116
3. What is mobile code?
ANS:
In the early days of the Web, users viewed static content (information that does not change) such as
text and pictures through a Web browser. As the Internet increased in popularity, the demand rose for
content that can change—such as animated images or customized information—based on who is
viewing it or the time of day. Because basic HTML code could not provide these functions, this
dynamic content required special computer code to be downloaded and executed in the user’s Web
browser. This code, which is obtained from an external source outside of the user’s security perimeter
and is executed on the local computer without the user’s express approval, is often called mobile code.
PTS: 1 REF: 116
4. Explain malicious e-mail attachments.
ANS:
Another common means of distributing attacks is through e-mail attachments, or files that are sent
with an e-mail message. E-mail-distributed malware will often take advantage of information
contained on the user’s computer. For example, malware can replicate by sending itself as an e-mail
attachment to all of the contacts in a user’s e-mail address book. The unsuspecting recipients, seeing
that an e-mail and attachment arrived from a “friend,” typically with a provocative subject line, open
the attachment and infect their computers.
PTS: 1 REF: 127
5. Discuss why using an e-mail postmark can be useful.
ANS:
Occasionally it may be necessary to send a legitimate e-mail message that could look like spam and
the recipient’s spam filter could reject it. Some e-mail clients, like Microsoft Outlook, have an e-mail
postmark feature. When the user sends a message with “spamlike” characteristics, the e-mail client
solves a computationally costly puzzle and then puts that information about the puzzle and solution
into two fields in the e-mail message’s header. The recipient of the message does not see this
information, but if she is using a compatible e-mail client it can use the contents of the message to
determine that the message is valid and not spam.
PTS: 1 REF: 134
6. Discuss why it is important not to save encrypted pages to disk.
ANS:
When a Web site is viewed, the actual HTML documents are sent from the Web server to the local
computer and saved on the hard drive in an area known as Temporary Internet Files for the browser to
display. A secure Web site may transmit sensitive information in a special encrypted form that
prevents attackers from seeing the information while in transit. However, after the HTML document is
saved on the hard drive, an attacker who could gain access to the computer may be able to view it.
This option prevents sensitive encrypted Web pages from being permanently saved on the hard drive.
PTS: 1 REF: 129-130
7. Why should you empty temporary Internet files when the browser is closed?
ANS:
To speed up processing, a Web browser first checks the hard drive on which the HTML documents are
stored when they are received from the Web server. If the requested document is already stored, a Web
browser only has to redisplay it and not request it again from the Web server. However, the stored
information could be used by an attacker. This browser security option empties this folder whenever
the browser is closed.
PTS: 1 REF: 130
8. What are the differences between signed and unsigned Java applets?
ANS:
There are two types of Java applets. A signed Java applet has information that indicates the program is
from a known source and has not been altered. An unsigned Java applet is a program that does not
come from a trusted source. Unsigned Java applets run in a security sandbox, which is like a fence that
surrounds the program and keeps it away from private data and other resources on a local computer.
Unsigned Java applets cannot access specific resources on the computer (for example, run executable
files, retrieve information stored on the system clipboard, or access printers), connect to or retrieve
resources from another server, or change security settings. Signed Java applets can operate outside of
the security sandbox if the user grants permission.
PTS: 1 REF: 118
9. What is a first-party cookie?
ANS:
A first-party cookie is created from the Web site that a user is currently viewing. For example, when
viewing the Web site www.cengage.com, the cookie CENGAGE could be created and saved on the
user’s hard drive. Whenever the user returns to this site, that cookie would be used by the site to view
the user’s preferences and better customize the browsing experience.
PTS: 1 REF: 119
10. Describe the following terms: encryption, decryption, algorithm, key, and ciphertext.
ANS:
Changing the original text into a secret message using cryptography is known as encryption, while the
reverse process—changing the scrambled encrypted message back into a readable form—is called
decryption. An encryption algorithm, which consists of procedures based on a mathematical formula,
is used to encrypt and decrypt the data. A key is a mathematical value entered into the algorithm to
produce ciphertext, or text that is “scrambled.” Just as a key is inserted into a lock to open or secure a
door, in cryptography a unique mathematical key is input into the encryption algorithm to create the
ciphertext. Once the ciphertext is transmitted and needs to be returned to its original state, the reverse
process occurs with a decryption algorithm.
PTS: 1 REF: 120
Another Random Scribd Document
with Unrelated Content
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back
back
back
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back
back
back
back
back
back
back
back
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back
back
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back
back
back
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back
Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank
back

More Related Content

PDF
Security Awareness Applying Practical Security in Your World 4th Edition Mark...
PDF
Security Awareness Applying Practical Security in Your World 4th Edition Mark...
PDF
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
PDF
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
PDF
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
PDF
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
PDF
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons...
Security Awareness Applying Practical Security in Your World 4th Edition Mark...
Security Awareness Applying Practical Security in Your World 4th Edition Mark...
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
New Perspectives on the Internet Comprehensive 9th Edition Schneider Test Bank
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons...

Similar to Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank (20)

PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
PDF
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition Parsons...
PDF
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition Parsons...
PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
PDF
SK0-005 Success 2025: Certifiedumps Study Routine That Works
PDF
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons...
PDF
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons...
PDF
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition Parsons...
PDF
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
PDF
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons...
PDF
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition Parsons...
PDF
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
PDF
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
PDF
Computer Concepts Illustrated Introductory 9th Edition Parsons Test Bank
PDF
Computer Concepts Illustrated Introductory 9th Edition Parsons Test Bank
PDF
Computer Concepts Illustrated Introductory 9th Edition Parsons Test Bank
PDF
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
PDF
Computer Concepts Illustrated Introductory 9th Edition Parsons Test Bank
PDF
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
PDF
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition Parsons...
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition Parsons...
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
SK0-005 Success 2025: Certifiedumps Study Routine That Works
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons...
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons...
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition Parsons...
Guide to Firewalls and VPNs 3rd Edition Whitman Test Bank
New Perspectives on Computer Concepts 2013 Comprehensive 15th Edition Parsons...
New Perspectives on Computer Concepts 2014 Comprehensive 17th Edition Parsons...
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
Computer Concepts Illustrated Introductory 9th Edition Parsons Test Bank
Computer Concepts Illustrated Introductory 9th Edition Parsons Test Bank
Computer Concepts Illustrated Introductory 9th Edition Parsons Test Bank
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
Computer Concepts Illustrated Introductory 9th Edition Parsons Test Bank
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
Solution Manual for C How to Program, 7/E 7th Edition Paul Deitel, Harvey Deitel
Ad

Recently uploaded (20)

PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PDF
1_English_Language_Set_2.pdf probationary
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
Computer Architecture Input Output Memory.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
HVAC Specification 2024 according to central public works department
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
Weekly quiz Compilation Jan -July 25.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
Hazard Identification & Risk Assessment .pdf
1_English_Language_Set_2.pdf probationary
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Computer Architecture Input Output Memory.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
What if we spent less time fighting change, and more time building what’s rig...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
Empowerment Technology for Senior High School Guide
HVAC Specification 2024 according to central public works department
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
FORM 1 BIOLOGY MIND MAPS and their schemes
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Virtual and Augmented Reality in Current Scenario
AI-driven educational solutions for real-life interventions in the Philippine...
Ad

Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank

  • 1. Security Awareness Applying Practical Security in Your World 4th Edition Mark Ciampa Test Bank pdf download https://testbankdeal.com/product/security-awareness-applying- practical-security-in-your-world-4th-edition-mark-ciampa-test- bank/ Download more testbank from https://testbankdeal.com
  • 2. Instant digital products (PDF, ePub, MOBI) available Download now and explore formats that suit you... Guide to Network Security Fundamentals 6th Edition Ciampa Test Bank https://testbankdeal.com/product/guide-to-network-security- fundamentals-6th-edition-ciampa-test-bank/ testbankdeal.com Corporate Computer Security 4th Edition Boyle Test Bank https://testbankdeal.com/product/corporate-computer-security-4th- edition-boyle-test-bank/ testbankdeal.com Principles of Information Security 4th Edition Whitman Test Bank https://testbankdeal.com/product/principles-of-information- security-4th-edition-whitman-test-bank/ testbankdeal.com Using MIS 6th Edition Kroenke Test Bank https://testbankdeal.com/product/using-mis-6th-edition-kroenke-test- bank/ testbankdeal.com
  • 3. Psychology of Language An Integrated Approach 1st Edition Luuden Test Bank https://testbankdeal.com/product/psychology-of-language-an-integrated- approach-1st-edition-luuden-test-bank/ testbankdeal.com Principles of Economics 1st Edition Asarta Test Bank https://testbankdeal.com/product/principles-of-economics-1st-edition- asarta-test-bank/ testbankdeal.com Business Law 9th Edition Gibson Solutions Manual https://testbankdeal.com/product/business-law-9th-edition-gibson- solutions-manual/ testbankdeal.com Health Psychology Canadian 4th Edition Taylor Test Bank https://testbankdeal.com/product/health-psychology-canadian-4th- edition-taylor-test-bank/ testbankdeal.com Introduct Programmi C++ International 3rd Edition Liang Test Bank https://testbankdeal.com/product/introduct-programmi-c- international-3rd-edition-liang-test-bank/ testbankdeal.com
  • 4. Analysis with an Introduction to Proof 5th Edition Lay Solutions Manual https://testbankdeal.com/product/analysis-with-an-introduction-to- proof-5th-edition-lay-solutions-manual/ testbankdeal.com
  • 5. Chapter 4: Internet Security TRUE/FALSE 1. Web servers distribute HTML documents based on a set of standards, or protocols, known as the Hypertext Transport Protocol (HTTP). ANS: T PTS: 1 REF: 114 2. Web sites use the standard HTTP protocol for sending data through the Internet because this protocol is secure and ensures that an attacker cannot view the contents of the transmission. ANS: F PTS: 1 REF: 130 3. Restricting how cookies are created and used can also be done through configuring the Web browser. ANS: T PTS: 1 REF: 131 4. Most users actually receive only a small amount of spam in their local e-mail inbox. The majority is blocked before it even reaches the user. ANS: T PTS: 1 REF: 133 5. With blocked low-level domain lists, e-mail from entire countries or regions can be blocked and treated as spam. ANS: F PTS: 1 REF: 133 MULTIPLE CHOICE 1. The ____ is a worldwide set of interconnected computers, servers, and networks. a. Interweb c. NSFNet b. Globalnet d. Internet ANS: D PTS: 1 REF: 113 2. The ____ is composed of Internet server computers on networks that provide online information in a specific format. a. World Wide Web c. Internet Web b. World Web d. Global Web ANS: A PTS: 1 REF: 113 3. ____ allows Web authors to combine text, graphic images, audio, video, and hyperlinks into a single document. a. SGML c. HTML b. IPL d. XSLT ANS: C PTS: 1 REF: 113 4. Instructions written in HTML code specify how a local computer’s Web ____ should display the words, pictures, and other elements on a user’s screen. a. browser c. interface
  • 6. b. server d. renderer ANS: A PTS: 1 REF: 113 5. Most Internet transmissions are based on ____. a. section numbers c. destination numbers b. block numbers d. port numbers ANS: D PTS: 1 REF: 114 6. It is estimated that over 100 trillion e-mails are sent annually, increasing at a rate of ____ percent each year. a. 10 c. 17 b. 15 d. 20 ANS: A PTS: 1 REF: 114 7. The SMTP server listens on port number ____. a. 21 c. 110 b. 25 d. 125 ANS: B PTS: 1 REF: 115 8. The current version of IMAP is ____. a. IMAP3 c. IMAP5 b. IMAP4 d. IMAP6 ANS: B PTS: 1 REF: 116 9. E-mail ____ are documents that are connected to an e-mail message, such as word processing documents, spreadsheets, or pictures. a. blocks c. add-ons b. attachments d. partitions ANS: B PTS: 1 REF: 116 10. ____ is a scripting language that does not create standalone applications. a. C# c. WebScript b. Java d. JavaScript ANS: D PTS: 1 REF: 116 11. ____ is a complete programming language that can be used to create stand-alone applications. a. Java c. WScript b. JavaScript d. Shell script ANS: A PTS: 1 REF: 117 12. A(n) ____ is a program that does not come from a trusted source. a. authorized Java applet c. signed Java applet b. unauthorized Java applet d. unsigned Java applet ANS: D PTS: 1 REF: 118 13. Unsigned Java applets run in a security ____, which is like a fence that surrounds the program and keeps it away from private data and other resources on a local computer. a. firewall c. retaining wall
  • 7. b. sandbox d. DMZ ANS: B PTS: 1 REF: 118 14. ____ represent a specific way of implementing ActiveX and are sometimes called ActiveX applications. a. ActiveX programs c. ActiveX applets b. ActiveX controls d. ActiveX plug-ins ANS: B PTS: 1 REF: 118 15. ActiveX controls can be invoked from Web pages through the use of a ____ or directly by an HTML command. a. compiled language c. scripting language b. modern language d. fourth-generation language ANS: C PTS: 1 REF: 118 16. Known as ____, the deleted cookie’s unique ID can still be assigned to a new cookie using the data stored in a Flash cookie as a backup. a. respawning c. recreating b. reinstating d. recooking ANS: A PTS: 1 REF: 119 17. ____ is a technology that can associate a user’s identity to a public key, in which the user’s public key has been “digitally signed” by a trusted third party. a. Private key cryptography c. Public key cryptography b. Asymmetric cryptography d. A digital certificate ANS: D PTS: 1 REF: 121 18. ____ look for specific words and block e-mail messages containing those words. a. Virus filters c. Network filters b. Ad filters d. Spam filters ANS: D PTS: 1 REF: 126 19. ____ uses graphical images of text in order to circumvent text-based filters. a. PDF spam c. Flash spam b. Image spam d. Java spam ANS: B PTS: 1 REF: 126 20. A(n) ____ is a business from which users purchase Internet access. a. Application Service Provider c. Internet Provider b. Service Provider d. Internet Service Provider ANS: D PTS: 1 REF: 133 21. Most e-mail clients contain a ____ that allows the user to read an e-mail message without actually opening it. a. preview pane c. reading pane b. safety pane d. sandbox pane ANS: C PTS: 1 REF: 133
  • 8. COMPLETION 1. ____________________ allow users to jump from one area on the Web to another with a click of the mouse button. ANS: Hyperlinks PTS: 1 REF: 113 2. HTTP is a subset of a larger set of standards for Internet transmission known as the ____________________. ANS: Transmission Control Protocol/Internet Protocol (TCP/IP) Transmission Control Protocol/Internet Protocol TCP/IP PTS: 1 REF: 114 3. A(n) ____________________-party cookie is a cookie that was not created by the Web site that attempts to access the cookie. ANS: third PTS: 1 REF: 119 4. ___________________ cookies can be used to reinstate regular cookies that a user has deleted or blocked. ANS: Flash PTS: 1 REF: 119 5. Web browsers provide the ability to use ____________________ that allows the user to set customized security for zones and then assign specific Web sites to a zone. ANS: Web zones PTS: 1 REF: 130 MATCHING Match each term with the correct statement below. a. Preview attachments f. Port 80 b. IFrame g. Ray Tomlinson c. Blacklist h. Cookie d. Microsoft Outlook i. Whitelist e. Port number 1. Identifies the program or service that is being requested 2. A file used to store user-specific information on the user’s local computer and then retrieve it later
  • 9. 3. An HTML element that allows for one HTML document to be embedded inside the main document 4. Sent the first e-mail message in 1971 5. Automatically blocks over 80 different types of file attachments that may contain malware 6. The standard port for HTTP transmissions 7. A list of senders for which the user does not want to receive any e-mail 8. A list of senders for which the user will accept e-mail 9. Helps to protect the user from malicious code that may be embedded in the attachment because scripts and ActiveX controls are disabled during this process 1. ANS: E PTS: 1 REF: 114 2. ANS: H PTS: 1 REF: 119 3. ANS: B PTS: 1 REF: 125 4. ANS: G PTS: 1 REF: 114 5. ANS: D PTS: 1 REF: 133 6. ANS: F PTS: 1 REF: 114 7. ANS: C PTS: 1 REF: 133 8. ANS: I PTS: 1 REF: 133 9. ANS: A PTS: 1 REF: 134 SHORT ANSWER 1. List the two TCP/IP protocols used by e-mail systems to send and receive messages. ANS: E-mail systems use two TCP/IP protocols to send and receive messages: the Simple Mail Transfer Protocol (SMTP) handles outgoing mail, while the Post Office Protocol (POP, more commonly known as POP3 for the current version) is responsible for incoming mail. PTS: 1 REF: 114-115 2. Briefly explain who IMAP works. ANS: IMAP (Internet Mail Access Protocol) is an advanced mail protocol. With IMAP, the e-mail remains on the e-mail server and is not downloaded to the user’s computer. Mail can be organized into folders on the mail server and read from any computer. IMAP users can work with e-mail while offline. This is accomplished by downloading e-mail onto the local computer without erasing the e-mail on the IMAP server. A user can read and reply to e-mail offline. The next time a connection is established, the new messages are sent and any new e-mail is downloaded. The current version of IMAP is IMAP4. PTS: 1 REF: 116 3. What is mobile code? ANS: In the early days of the Web, users viewed static content (information that does not change) such as text and pictures through a Web browser. As the Internet increased in popularity, the demand rose for content that can change—such as animated images or customized information—based on who is viewing it or the time of day. Because basic HTML code could not provide these functions, this dynamic content required special computer code to be downloaded and executed in the user’s Web browser. This code, which is obtained from an external source outside of the user’s security perimeter and is executed on the local computer without the user’s express approval, is often called mobile code.
  • 10. PTS: 1 REF: 116 4. Explain malicious e-mail attachments. ANS: Another common means of distributing attacks is through e-mail attachments, or files that are sent with an e-mail message. E-mail-distributed malware will often take advantage of information contained on the user’s computer. For example, malware can replicate by sending itself as an e-mail attachment to all of the contacts in a user’s e-mail address book. The unsuspecting recipients, seeing that an e-mail and attachment arrived from a “friend,” typically with a provocative subject line, open the attachment and infect their computers. PTS: 1 REF: 127 5. Discuss why using an e-mail postmark can be useful. ANS: Occasionally it may be necessary to send a legitimate e-mail message that could look like spam and the recipient’s spam filter could reject it. Some e-mail clients, like Microsoft Outlook, have an e-mail postmark feature. When the user sends a message with “spamlike” characteristics, the e-mail client solves a computationally costly puzzle and then puts that information about the puzzle and solution into two fields in the e-mail message’s header. The recipient of the message does not see this information, but if she is using a compatible e-mail client it can use the contents of the message to determine that the message is valid and not spam. PTS: 1 REF: 134 6. Discuss why it is important not to save encrypted pages to disk. ANS: When a Web site is viewed, the actual HTML documents are sent from the Web server to the local computer and saved on the hard drive in an area known as Temporary Internet Files for the browser to display. A secure Web site may transmit sensitive information in a special encrypted form that prevents attackers from seeing the information while in transit. However, after the HTML document is saved on the hard drive, an attacker who could gain access to the computer may be able to view it. This option prevents sensitive encrypted Web pages from being permanently saved on the hard drive. PTS: 1 REF: 129-130 7. Why should you empty temporary Internet files when the browser is closed? ANS: To speed up processing, a Web browser first checks the hard drive on which the HTML documents are stored when they are received from the Web server. If the requested document is already stored, a Web browser only has to redisplay it and not request it again from the Web server. However, the stored information could be used by an attacker. This browser security option empties this folder whenever the browser is closed. PTS: 1 REF: 130 8. What are the differences between signed and unsigned Java applets? ANS:
  • 11. There are two types of Java applets. A signed Java applet has information that indicates the program is from a known source and has not been altered. An unsigned Java applet is a program that does not come from a trusted source. Unsigned Java applets run in a security sandbox, which is like a fence that surrounds the program and keeps it away from private data and other resources on a local computer. Unsigned Java applets cannot access specific resources on the computer (for example, run executable files, retrieve information stored on the system clipboard, or access printers), connect to or retrieve resources from another server, or change security settings. Signed Java applets can operate outside of the security sandbox if the user grants permission. PTS: 1 REF: 118 9. What is a first-party cookie? ANS: A first-party cookie is created from the Web site that a user is currently viewing. For example, when viewing the Web site www.cengage.com, the cookie CENGAGE could be created and saved on the user’s hard drive. Whenever the user returns to this site, that cookie would be used by the site to view the user’s preferences and better customize the browsing experience. PTS: 1 REF: 119 10. Describe the following terms: encryption, decryption, algorithm, key, and ciphertext. ANS: Changing the original text into a secret message using cryptography is known as encryption, while the reverse process—changing the scrambled encrypted message back into a readable form—is called decryption. An encryption algorithm, which consists of procedures based on a mathematical formula, is used to encrypt and decrypt the data. A key is a mathematical value entered into the algorithm to produce ciphertext, or text that is “scrambled.” Just as a key is inserted into a lock to open or secure a door, in cryptography a unique mathematical key is input into the encryption algorithm to create the ciphertext. Once the ciphertext is transmitted and needs to be returned to its original state, the reverse process occurs with a decryption algorithm. PTS: 1 REF: 120
  • 12. Another Random Scribd Document with Unrelated Content
  • 14. back
  • 16. back
  • 17. back
  • 18. back
  • 20. back
  • 22. back
  • 23. back
  • 24. back
  • 25. back
  • 26. back
  • 27. back
  • 28. back
  • 29. back
  • 31. back
  • 33. back
  • 34. back
  • 36. back
  • 37. back
  • 38. back
  • 40. back
  • 42. back