Ch 5 - Online Privacy Flashcards
Which of the following was a network developed in the 1960s and the precursor of the internet:
a. ARPAnet
b. VirtualNet
c. National Science Network
d. None of the above
a. ARPAnet
Which of the following best describes how information sent through the internet is transferred?
a. Disassembled into packets, which cohesively travel in larger packets during transit, and reassembled upon receipt by the recipient’s service provider
b. Assembled into encrypted packets, which travel together during transmission, and are unencrypted by the recipient’s computer
c. Disassembled into packets, scattered through the network during transit, and reassembled upon receipt by the destination computer
d. None of the above
c. Disassembled into packets, scattered through the network during transit, and reassembled upon receipt by the destination computer
Which of the following describes the internet?
a. Global system of interconnected networks
b. Links billions of computers and devices around the world
c. Accessed by computers and other electronic devices
d. All of the above
d. All of the above
Which of the following best describes the World Wide Web?
a. The basic architecture for transferring and accessing data
b. An information-sharing model that uses hypertext to access various forms of information available on the world’s different networks
c. Global system of interconnected networks
d. None of the above
b. An information-sharing model that uses hypertext to access various forms of information available on the world’s different networks
Which of the following best describes the function of hypertext transfer protocol (HTTP)?
a. Manages data communications over the Internet
b. Determines message formatting and transmission over a TCP/IP network
c. Defines how web servers and browsers will respond to various commands
d. All of the above
d. All of the above
Which of the following best describes hypertext markup language (HTML)?
a. Manages data communications over the Internet
b. Determines message formatting and transmission over a TCP/IP network
c. Content-authoring language used to create web pages
d. All of the above
c. Content-authoring language used to create web pages
Which of the following best describes a function of hypertext transfer protocol (HTTP)?
a. Determines the format, layout, how the web page will dynamically connect to other content
b. The basic architecture for transferring and accessing data
c. An information-sharing model that uses hypertext to access various forms of information available on the world’s different networks
d. All of the above
a. Determines the format, layout, how the web page will dynamically connect to other content
The World Wide Web was developed by Sir Tim Berners-Lee to:
a. Help the military transmit and share information
b. Help research scientists dynamically tie documents and files together
c. Aid consumers in the understanding of computer technology
d. All of the above
b. Help research scientists dynamically tie documents and files together
Which browser was developed by the National Center for Supercomputer Applications, and was the first to allow consumers to view websites from a personal computer?
a. Mozilla
b. Internet Explorer
c. Google Chrome
d. None of the above
a. Mozilla
An advantage of HTML5 over other versions is it:
a. Performs a security scan from each website visited
b. Includes a key that allows the webpage visitor to make changes
c. Allows video, audio and animation to be run directly from websites without a plug-in
d. All of the above
c. Allows video, audio and animation to be run directly from websites without a plug-in
A feature of HTML5 is that it can:
a. Perform a security scan from each website visited
b. Store information offline in web applications not connected to the Internet
c. Allow a webpage visitor to make changes to the site
d. All of the above
b. Store information offline in web applications not connected to the Internet
Extensible markup language (XML):
a. Facilitates the transport, creation, retrieval and storage of documents
b. Uses tags to describe the contents of a web page or file
c. Describes the content of a web page in terms of data being produced
d. All of the above
d. All of the above
Which of the following features of extensible markup language (XML) results in potential privacy issues?
a. Facilitates the transport, creation, retrieval and storage of documents
b. Uses tags to describe the contents of a web page or file
c. Enables automatic processing of data in large volumes
d. All of the above
c. Enables automatic processing of data in large volumes
An application used by a computer to perform activities on the World Wide Web is generally known as a:
a. Web client
b. Web browser
c. Web firewall
d. None of the above
a. Web client
Which of the following describes the top-level domain in the URL www.iapp.org/news?
a. Iapp
b. Org
c. News
d. Only a and b
b. Org
Which of the following is an example of a software technology included in web infrastructure?
a. Web server
b. Proxy server
c. Virtual private network
d. Only b and c
d. Only b and c
Which of the following describes a “deep link” in the URL www.iapp.org/news?
a. News
b. Iapp
c. Org
d. Only b and c
a. News
An important attribute of a proxy server is:
a. Masks activities of organization’s firewall
b. Allows outside websites to only see IP address and characteristics of proxy server
c. Does not allow outside websites to obtain detailed information about the organization’s communications
d. All of the above
d. All of the above
Which of the following is not an attribute of a virtual private network (VPN)?
a. Encrypts information from user to organization’s proxy server
b. Masks the content and web destinations of the user
c. Allows outside websites to obtain detailed information about the organization’s communications
d. All of the above are attributes of a VPN
c. Allows outside websites to obtain detailed information about the organization’s communications
Saving a local copy of downloaded content by a web browser or proxy server is known as:
a. Collecting
b. Caching
c. Cascading content
d. None of the above
b. Caching
A web server log generally includes:
a. Visitor’s IP address
b. Date and time of web page visit
c. URL of web page visit
d. All of the above
d. All of the above
Internet protocol (IP) is:
a. List of recently visited web pages
b. Encryption used to view web pages
c. A set of rules that determine the format of data packets traveling over the Internet
d. All of the above
c. A set of rules that determine the format of data packets traveling over the Internet
Which of the following best describes an IP address?
a. Unique number assigned to a connected device that determines where data should be sent
b. The addresses of recently visited web pages
c. The address of the encryption key used to view web pages
d. All of the above
a. Unique number assigned to a connected device that determines where data should be sent
A dynamic IP address:
a. Remains the same for an individual device
b. Changes based on the device
c. Changes with each session
d. None of the above
c. Changes with each session
Why are there privacy concerns over the IPv6 protocol?
a. It can embed a device’s unique MAC address in the IP address
b. It could allow individual devices to be easily identified
c. It contains weaknesses that may result in enabling the camera on a device
d. Only a and b
d. Only a and b
Which of the following best describes the function of transmission control protocol (TCP)?
a. Facilitates a stream-oriented reliable data connection between two devices
b. Creates rules for web page content
c. Ensures that details about the server are hidden
d. All of the above
a. Facilitates a stream-oriented reliable data connection between two devices
Which of the following best describes the function of transport layer security (TLS)?
a. Ensures that details about the server are available to the end-user
b. Ensures that third parties cannot eavesdrop on conversation
c. Ensures that data can be downloaded by the organization in the event of a data breach
d. None of the above
b. Ensures that third parties cannot eavesdrop on conversation
Which of the following is a risk associated with JavaScript?
a. The malicious practice of cross-site scripting (XSS)
b. An infinite loop that can result in a denial of service attack
c. Vulnerabilities and problems interacting with some programs and systems
d. All of the above
d. All of the above