How malicious code can get on computer


Complete the mcq:

1. Which best describes how malicious code can get on your computer?

a. Email attachments

b. Downloaded software from non-authoritative sources and websites

c. Sharing diskettes from computers without up to date antivirus software

d. All of the above

e. A and C only

My guess is "all of the above".


2. A way of verifying a message's integrity after transport across a network is through the use of:

a. A Message Authentication Code

b. Steganography

c. An encryption key

d. A cipher

3. Which of the following best describes examples of mobile code?

a. Java, Javascript, and ActiveX

b. HTML, the language of web pages

c. Postscript, the language of some LaserJet printers

d. All of the above

e. None of the above

4. Which statement best describes the advantages of public key encryption?

a. Keys are exchanged publicly without an eavesdropper being able to decrypt messages

b. Knowledge of one's public key does not yield knowledge of their private key

c. Encryption performance is faster than secret-key encryption

d. A and B only

e. None of the above

5. Which statement best captures the advantage of secret key encryption?

a. It allows for faster encryption speeds than public key encryption

b. It only requires one key to be distributed for encryption and decryption

c. The keys are stronger than public keys and are more difficult to break

d. All of the above

e. A and B only.

6. Which of the following best describes what is removed from a hard drive when a file is deleted from the hard drive?

a. The MBR record, the FAT record, and the Directory Table entry.

b. The FAT record, the Directory Table entry, and the data clusters that the file occupied.

c. The FAT record and the Directory Table entry.

d. The FAT record, the Directory Table Entry, and the Partition Table.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: How malicious code can get on computer
Reference No:- TGS01932528

Now Priced at $20 (50% Discount)

Recommended (96%)

Rated (4.8/5)