New Perspectives on Computer Concepts 2018 Introductory 20th Edition By June Jamrich Parsons – Test Bank
1. This type of security transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
a. Authentication
b. Encryption
c. Ciphertext
d. Decryption
ANSWER: b
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:28 AM
DATE MODIFIED: 8/4/2017 1:29 AM
2. An original message or file that has not yet been encrypted is referred to as ciphertext.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:30 AM
DATE MODIFIED: 8/4/2017 1:31 AM
3. A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.
ANSWER: key
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:32 AM
DATE MODIFIED: 8/4/2017 1:32 AM
4. There are various encryption methods, but __________ is the encryption standard currently used worldwide.
a. AES (Advanced Encryption Standard)
b. DDoS (distributed denial of service attacks)
c. IMSI (International Mobile Subscriber Identity)
d. TLS (Transport Layer Security)
ANSWER: a
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:33 AM
DATE MODIFIED: 8/4/2017 1:34 AM
5. A cryptographic __________ is a procedure for encryption or decryption.
a. firewall
b. ciphertext
c. key
d. algorithm
ANSWER: d
POINTS: 1
REFERENCES: ENCRYPTION
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:36 AM
DATE MODIFIED: 8/4/2017 1:36 AM
6. Which of the following is not an example of user authentication?
a. Password
b. PINs
c. Fingerprint scanner
d. URLs (Uniform Resource Locators)
ANSWER: d
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: Multiple Choice
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:37 AM
DATE MODIFIED: 8/4/2017 1:39 AM
7. The single most effective security measure for digital devices is to require a login password.
a. True
b. False
ANSWER: True
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:39 AM
DATE MODIFIED: 8/4/2017 1:40 AM
8. Passwords used as encryption ________ help to make hijacked data unusable.
ANSWER: keys
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: Completion
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:40 AM
DATE MODIFIED: 8/4/2017 1:41 AM
9. All Android devices automatically encrypt data stored on the device when a user activates the login password.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:41 AM
DATE MODIFIED: 8/7/2017 3:27 AM
10. It is not possible to encrypt a Windows hard drive volume.
a. True
b. False
ANSWER: False
POINTS: 1
REFERENCES: AUTHENTICATION
QUESTION TYPE: True / False
HAS VARIABLES: False
DATE CREATED: 8/4/2017 1:43 AM
DATE MODIFIED: 8/4/2017 1:43 AM
Reviews
There are no reviews yet.