48) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.
A) Usurpation
B) Authentication
C) Malware protection
D) Encryption
49) Which of the following statements is true of symmetric encryption?
A) It uses the same key for both encoding and decoding.
B) It is more difficult and slower than asymmetric encryption.
C) It does not require a key to encrypt or decrypt data.
D) It uses a special version called public/private key on the Internet for a secure communication.
50) Most secure communications over the Internet use a protocol called ________.
A) smtp
B) ftp
C) https
D) nntp
51) With https, data are encrypted using a protocol called the ________.
A) Secure Shell (SSH)
B) Secure Sockets Layer (SSL)
C) File Transfer Protocol (FTP)
D) Post Office Protocol (POP)
52) Which of the following types of encryption is used by the secure sockets layer protocol?
A) optical encryption
B) physical layer encryption
C) disk encryption
D) public key encryption
53) A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters.
A) internal firewall
B) perimeter firewall
C) adware
D) malware
54) A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.
A) encrypted firewall
B) internal malware
C) packet-filtering firewall
D) perimeter shareware
55) ________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.
A) Malware
B) Payload
C) Shareware
D) Firewall
56) ________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.
A) Key loggers
B) Trojan horses
C) Worms
D) Payloads
57) Adware and spyware are similar to each other in that they both ________.
A) masquerade as useful programs
B) are specifically programmed to spread
C) are installed with a user's permission
D) reside in the background and observe a user's behavior