Internet Foundations 3

25 Questions | Attempts: 111
Share

SettingsSettingsSettings
Internet Quizzes & Trivia

Questions and Answers
  • 1. 

    Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption.

    • A.

      RSA encryption

    • B.

      Asymmetric-key encryption

    • C.

      Hash encryption

    • D.

      Symmetric-key encryption

    Correct Answer
    C. Hash encryption
    Explanation
    Hash encryption provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption. Hash encryption is useful for protecting passwords from disclosure.

    Rate this question:

  • 2. 

    Which statement best describe asymmetric-key encryption?

    • A.

      An encryption method in which a key is required to encrypt data for storage and verify its integrity

    • B.

      An encryption method in which the same key is used to encrypt and decrypt a message

    • C.

      An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message

    • D.

      An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages.

    Correct Answer
    C. An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
    Explanation
    Asymmetric encryption (also called asymmetric-key encryption or public-key encryption) refers to an encryption method in which two keys are used to encrypt and decrypt a message: a private and a public key. The public key is known to all sending and receiving parties involved in the communication.

    Rate this question:

  • 3. 

    Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?  

    • A.

      Digital signature

    • B.

      Encrypted key

    • C.

      Digital certificate

    • D.

      Firewall

    Correct Answer
    A. Digital signature
    Explanation
    Digital signatures can be used to enforce non-repudiation, which is the ability to prove that a transaction occurred. Sending data with a digital signature proves that the message was both sent and received.

    Rate this question:

  • 4. 

    What do encryption applications do to render text unreadable?

    • A.

      Scramble text using mathematical algorithm

    • B.

      Scramble text using benign viruses

    • C.

      Remove all formatting and punctuation from the text

    • D.

      Compress the text so that only abbreviated portions of words remain

    Correct Answer
    A. Scramble text using mathematical algorithm
    Explanation
    Encryption applications dramatically reduce the risk of information theft by scrambling the information using mathematical algorithm. Encrypted data is referred to as ciphertext; unencrypted data is referred to as a plaintext.

    Rate this question:

  • 5. 

    Which statement best describes symmetric-key encryption?

    • A.

      An encryption method in which two seperate keys -- a private key and a public key -- are used to encrypt and decrypt a message

    • B.

      An encryption method in which the same key is used to encrypt and decrypt a message

    • C.

      An encryption method in which a key is required to encrypt data from storage and to verify its integrity

    • D.

      An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

    Correct Answer
    B. An encryption method in which the same key is used to encrypt and decrypt a message
    Explanation
    Symmetric encryption (also called symmetric-key encryption or private-key encryption) is an encryption method in which same key is used to encrypt and decrypt a message.

    Rate this question:

  • 6. 

    Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?

    • A.

      Spyware

    • B.

      Trojan

    • C.

      Illicit server

    • D.

      Malware

    Correct Answer
    A. Spyware
    Explanation
    Spyware (or adware) is a software application that a secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes.

    Rate this question:

  • 7. 

    Which of the following is an effective way for Web site owners to prevent typosquatting?

    • A.

      Purchase domain names that are similar to their actual domain names

    • B.

      Host their Web sites on ilicit servers

    • C.

      Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys

    • D.

      Automatically apply operating system updates and patches as they become available

    Correct Answer
    A. Purchase domain names that are similar to their actual domain names
    Explanation
    Typosquatting refers to an unethical practice in which the perpetrator (i.e. typosquatter) capitalises on typing mistakes that users make when entering the URL of a Web site into a browser. When a Web user accidentally enters an incorrect Web site address, he or she may end up viewing an alternative Web site owned by a typosquatter. Web site owners can try to avoid falling victim to a typosquatter by purchasing domain names that are similar to their actual domain name.

    Rate this question:

  • 8. 

    What distinguishes a worm from a virus?

    • A.

      A worm is capable of replicating itself automatically while affecting data.

    • B.

      A worm and a virus synonymous terms for a malicious program designed to damage computer systems.

    • C.

      A worm does not replicate itself, it assumes control of system operations

    • D.

      A worm does not replicate itself; it damages or destroys data.

    Correct Answer
    A. A worm is capable of replicating itself automatically while affecting data.
    Explanation
    The different between a worm and a virus is that a worm has the ability to replicate itself automatically, whereas a virus requires user action.

    Rate this question:

  • 9. 

    During a Web search, entering erroneous search criteria, clicking dead links or accessing a busy server is likely to;

    • A.

      Use all the space in your browser cache

    • B.

      Cause an error page to display

    • C.

      Activate the robot or spider program

    • D.

      Return less relevant results for your keywords

    Correct Answer
    B. Cause an error page to display
    Explanation
    Search engines sometimes yield unexpected results such as an error page, an alternative search engine or an advertisement instead of the topic for which you were searching. Error pages most commonly occur when you enter erroneous search criteria, click a dead link or try to access a busy server.

    Rate this question:

  • 10. 

    What is the purpose of the Boolean operator OR?

    • A.

      It requires the search results to include multiple keywords

    • B.

      It requires the search results to include one keyword or the other or both

    • C.

      It requires the search results to include one keyword and exclude another

    • D.

      It requires the search results to include one keyword or one URL.

    Correct Answer
    B. It requires the search results to include one keyword or the other or both
    Explanation
    The results will contain one keyword or the other or both.

    Rate this question:

  • 11. 

    It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following types of resources only accept input from scholars and recognised authorities?

    • A.

      Authoritative peer-reviewd

    • B.

      Open peer-reviewed

    • C.

      Primary

    • D.

      Individual

    Correct Answer
    A. Authoritative peer-reviewd
  • 12. 

    The <meta> tag can be used in Web pages for which purpose?

    • A.

      Containing the content that appear on each Web page

    • B.

      Linking the Web site to other related Web pages

    • C.

      Providing search engines with a descriptive of the Web site

    • D.

      Preventing early-version browsers from viewing the Web site

    Correct Answer
    C. Providing search engines with a descriptive of the Web site
  • 13. 

    You want to find information about Great Danes. You visit a popular search engines and manually search through a directory tree of topics until you find a directory titled "Dogs" and a subdirectory titled "Breeds". You select the topic "Great Dane" and look through a list of indexed pages on that topic, then choose one page with which to begin your research.  Which type of search index did you use?

    • A.

      Static index/site map

    • B.

      Boolean index

    • C.

      Full-text index

    • D.

      Keyword index

    Correct Answer
    A. Static index/site map
    Explanation
    A static index/site map enables users to manually search information portals to locate indexed information.

    Rate this question:

  • 14. 

    You access a search engine and enter the words "African" and "Safari" in the search box. The search engine returns links to Web sites in its index that include these words. Which types of search index did you use?

    • A.

      Structured directory index

    • B.

      Keyword index

    • C.

      Full-text index

    • D.

      Static index/site map

    Correct Answer
    B. Keyword index
  • 15. 

    Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter?  

    • A.

      Google

    • B.

      Yahoo

    • C.

      Excite

    • D.

      WebCrawler

    Correct Answer
    A. Google
    Explanation
    Explanation/Reference: Google determines a site's popularity according to the number of other sites that link to it. Like other sites, Google's Web search engine is designed to rank the relevance of a particular site according to the keywords entered by the user.

    Rate this question:

  • 16. 

    What distinguishes an information portal from a search engine?

    • A.

      An information portal allows only keyword index searches.

    • B.

      An information portal will only index Web sites based on manual submissions.

    • C.

      An information portal allows only static index/site map searches.

    • D.

      An information portal uses a robot or spider program to browse the Web and index the content that it finds.

    Correct Answer
    B. An information portal will only index Web sites based on manual submissions.
    Explanation
    An information portal differs from a search engine in that an information portal will only index Web sites that are submitted manually. Information portals do not use spider programs to seek out Web sites. Thus, if you do not manually submit your site's address to the information portal, it will never know about or index your site, and never list your site in search results.

    Rate this question:

  • 17. 

    After you have found the information you need on the Web, you must still evaluate its accuracy and value. To determine whether information is reliable or factual, you should:

    • A.

      Consult secondary resources.

    • B.

      Consult open peer-reviewed resources

    • C.

      Consult authoritative peer-reviewed resources

    • D.

      Consult popular resources

    Correct Answer
    C. Consult authoritative peer-reviewed resources
  • 18. 

    Search engines use a ranking system to help you determine how closely a site matches the topic for which you are searching. Generally, how does this ranking system work?

    • A.

      The more frequently you specified keywords are found in a particular document, the higher the relevancy score that document receives.

    • B.

      The more reference sources included in a Web document, the higher the relevancy score that document receives.

    • C.

      The more hyperlinks included in a Web document, the higher the relevancy score that document receives

    • D.

      The more keywords you specify in your search criteria, the higher the relevancy scores assigned to the retrieved documents.

    Correct Answer
    A. The more frequently you specified keywords are found in a particular document, the higher the relevancy score that document receives.
  • 19. 

    Which of the following is true regarding smartphones and PIM applications?

    • A.

      Smartphones use infrared-based keyboards for inputting information into PIM applications.

    • B.

      Smartphones rarely have enough memory to support full-featured PIM applications.

    • C.

      Smartphones PIM applications are designed to work in tandem with traditional desktop or laptop computers.

    • D.

      Smartphones save changes you make in PIM applications in random-access memory (RAM), the content of which are erased when you turn the smartphone off.

    Correct Answer
    C. Smartphones PIM applications are designed to work in tandem with traditional desktop or laptop computers.
  • 20. 

    Any tool used to schedule appointments and meeting, store contact information, and manage tasks is known as:

    • A.

      Personal Digital Assistant (PDA).

    • B.

      Message Transfer Agent (MTA).

    • C.

      Personal Information Management (PIM) program.

    • D.

      Mail User Agent (MUA).

    Correct Answer
    C. Personal Information Management (PIM) program.
  • 21. 

    In order to help you with your job tasks, your supervisor has given you a PIM application to install and user. PIM is an acronym for a type of program with which you can:

    • A.

      Filter span at the server.

    • B.

      Translate dotted-quad IP addresses into easily recognise text-based names, and vice versa.

    • C.

      Filter spam at the client.

    • D.

      Schedule appointments and meetings, store contact information and manage tasks.

    Correct Answer
    D. Schedule appointments and meetings, store contact information and manage tasks.
  • 22. 

    Which choice lists some file types that are often already compressed and thus may not be significantly reduced in file size by compression utilities?

    • A.

      DOC, EXE and HTM

    • B.

      DOC, TXT, and PDF

    • C.

      PNG, GIF and JPG

    • D.

      BMP, JPG and TIFF

    Correct Answer
    C. PNG, GIF and JPG
  • 23. 

    What can you do to eliminate the need to define a MIME type for files that you download from Web sites?

    • A.

      Install the latest version of a browser, or install any available upgrades.

    • B.

      Compress the files, then decompress them before you attempt to open them.

    • C.

      Open the files in the Windows operating system only.

    • D.

      Open the files in an operating system other than Windows.

    Correct Answer
    A. Install the latest version of a browser, or install any available upgrades.
  • 24. 

    How can you reduce file size so that files can be sent more efficiently across the Internet?

    • A.

      By using a file compression utility to compress large files

    • B.

      By dividing the file in half and sending two halves seperately

    • C.

      By increasing the mail server's attachment size limit

    • D.

      By using smaller fonts in the files

    Correct Answer
    A. By using a file compression utility to compress large files
  • 25. 

    You download a file with the unusual file name extension of ".wow". When you attempt to open this file, Windows displays a message indicating that it does not know how to open this particular file type. Which of the following determines a document type and the application required to open it?

    • A.

      MIME

    • B.

      HTTP

    • C.

      TCP/IP

    • D.

      FTP

    Correct Answer
    A. MIME
    Explanation
    MIME types used to identify a document type and the application required to open it.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • May 12, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • May 11, 2013
    Quiz Created by
    Philanderson888
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.