Term
What communications protocol is used by streaming video files? |
|
Definition
User Datagram Protocol (UDP) |
|
|
Term
Per class discussion, data transmission delivery over the Internet may best be described as____ |
|
Definition
|
|
Term
In a public key technology system, Susan responds to John's message. If Susan signs the messae with John's public key, John may decrypt the message from Susan with....... |
|
Definition
|
|
Term
What communication protocol is used by Instant Messaging (IM)? |
|
Definition
|
|
Term
How do you subscribe to a mailing list?
|
|
Definition
Send a 'subscribe' email to the appropriate organization |
|
|
Term
Which of the following is true regarding identifying color in web pages?
|
|
Definition
You can identify the color by its hexadecimal number value and You can identify the color by entering the name of the color |
|
|
Term
This term refers to protection from unauthorized modification
|
|
Definition
|
|
Term
This Internet Protocol address type assigns a new IP address each time you connect.
|
|
Definition
(Dynamic Protocol Address) |
|
|
Term
According to class discussion, this element of security addresses the information secrecy or privacy
|
|
Definition
|
|
Term
Authentication requires ...
|
|
Definition
Verifying the identity of a communicating party and May be implemented through biometrics |
|
|
Term
What tags are required to make a link from one page to another are:
|
|
Definition
|
|
Term
This term refers to 'proof of participation' |
|
Definition
|
|
Term
This type of malicious logic that has the ability to propage itself
|
|
Definition
|
|
Term
In a public key technology system, John wants to send send a message to Susan. If John signs his message with his public key, who may decrypt this message?
|
|
Definition
None of the above. Neither Only Susan or Everyone that has access to John’s public key. |
|
|
Term
In a public key technology system, John wants to send a message to Susan. John signs his message with his private key. Susan may decrypt this message from John with _______
|
|
Definition
|
|
Term
What communications protocol is used by Real Player?
|
|
Definition
|
|
Term
Which of the following is NOT true regarding cookie files?
|
|
Definition
Setting cookies is NOT optional; it is required by the browser. However, using the cookie file, a web server may keep track of the web pages you visit and Cookies are stored on your disk; not the server.
|
|
|
Term
Where is a bookmark (or a 'favorite' if you are using an Internet Explorer browser) information recorded?
|
|
Definition
In a file on the hard drive on the user's computer |
|
|
Term
An individual may minimize spam by............
|
|
Definition
Use a client-based spam blocker, Request to remove your name off mailing lists, and Edit headers from information you post in public forums
|
|
|
Term
A 'cookie' is a ________ file.
|
|
Definition
|
|
Term
Which of the following is true regarding Digital Certificates
|
|
Definition
(The U.S. standard format for digital certificates is X.509) |
|
|
Term
This is a piece of html code that is placed on a web page or in an email mesage that gathers information about the user
|
|
Definition
|
|
Term
This is a type of malicious logic that embeds itself into another program. It requires a host to survive.
|
|
Definition
|
|
Term
If a browser fetches a page that contains three images, the browser will pass ___ separate request(s) to the server.
|
|
Definition
|
|