48) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. A) Usurpation B) Authentication C) Malware protection D) Encryption ...





48) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication.



A) Usurpation



B) Authentication



C) Malware protection



D) Encryption



49) Which of the following statements is true of symmetric encryption?



A) It uses the same key for both encoding and decoding.



B) It is more difficult and slower than asymmetric encryption.



C) It does not require a key to encrypt or decrypt data.



D) It uses a special version called public/private key on the Internet for a secure communication.



50) Most secure communications over the Internet use a protocol called ________.



A) smtp



B) ftp



C) https



D) nntp



51) With https, data are encrypted using a protocol called the ________.



A) Secure Shell (SSH)



B) Secure Sockets Layer (SSL)



C) File Transfer Protocol (FTP)



D) Post Office Protocol (POP)



52) Which of the following types of encryption is used by the secure sockets layer protocol?



A) optical encryption



B) physical layer encryption



C) disk encryption



D) public key encryption



53) A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters.



A) internal firewall



B) perimeter firewall



C) adware



D) malware



54) A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass.



A) encrypted firewall



B) internal malware



C) packet-filtering firewall



D) perimeter shareware



55) ________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware.



A) Malware



B) Payload



C) Shareware



D) Firewall



56) ________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program.



A) Key loggers



B) Trojan horses



C) Worms



D) Payloads



57) Adware and spyware are similar to each other in that they both ________.



A) masquerade as useful programs



B) are specifically programmed to spread



C) are installed with a user's permission



D) reside in the background and observe a user's behavior





May 15, 2022
SOLUTION.PDF

Get Answer To This Question

Submit New Assignment

Copy and Paste Your Assignment Here