IS4550 CHAPTER 11 Flashcards

1
Q

A process that performs a sequence of operations is called ___.

A

ALGORITHM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Provides services for an application program to ensure effective communication is called ___.

A

APPLICATION LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Documenting rules, procedures, and guidelines to be tested against a system is called ___.

A

ASSESSMENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A normal level of measurement is called ___.

A

BASELINE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Activities that occur between two or more businesses is called ___.

A

BUSINESS TO BUSINESS (B2B)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Activities that occur between a business and a customer is called ___.

A

BUSINESS TO CUSTOMERS (B2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network components that interconnect network nodes or hosts is called ___.

A

DATA-LINK LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A data structure used to bind an authenticated individual to a public key is called ___.

A

DIGITAL CERTIFICATE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides services for connecting network resources across network domains is called ___.

A

INTERNET LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The encryption key that is held privately by the user is called ___.

A

PRIVATE KEY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This used to communicate with the private and is publicly available and is called ___.

A

PUBLIC KEY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Methods and protocols for encapsulating application data is called ___.

A

TRANSPORT LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. E-commerce and banking sites should have no encryption enabled because that communist ion between the two points is already protected via the user ID.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. ___ is the largest developer and publisher of international standards.
A

ISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Intranets are extensions of the corporate network for business partners and customers.
    TRUE OR FALSE
A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following indicates you are using a secure Web site? (Select two)
  2. Web address starts with “shttp”
  3. Web address starts with “https”
  4. Padlock icon
  5. Key icon
A

Web address starts with “https”

Padlock icon

17
Q
  1. Which of the following are characteristics of Web 2.0? (Select three)
  2. Encryption
  3. Wikis
  4. Blogs
  5. Secure Web sites
  6. Social media Web sites
A

Wikis
Blogs
Social media Web sites

18
Q
  1. Which organization develops RFCs?
  2. NIST
  3. FISMA
  4. ISO
  5. IETF
A

IETF

19
Q
  1. ____ is a body of the US government that provides standards for financial institutions.
A

FFEIC/Federal Financial Institutions Examinations Council

20
Q
  1. E-commerce implementation using SSL should use a minimum of ___-bit encryption.
A

128

21
Q
  1. What is a trusted source for an SSL certificate called?
  2. Trusted certificate
  3. Trusted authority
  4. Certificate authority
  5. Certificate trusted
A

Certificate authority

22
Q
  1. ___ sets the FISMA standards for the federal IT systems.
A

NIST