McGraw-Hill OnlineMcGraw-Hill Higher EducationLearning Center
Student Center | Instructor Center | Information Center | Home
Non-Chapter Glossary Terms
Non-Chapter Flashcards
Frequently Asked Questions
Student Message Board
Learning Objectives
Chapter Outline
Key Terms
Flashcards
Interactive Activities
Exercises
Multiple Choice Quiz
Feedback
Help Center


Inline Online
Inline/Online: Fundamentals of the Internet and the World Wide Web, 2/e
Raymond Greenlaw, Armstrong Atlantic State University
Ellen Hepp, The University of New Hampshire

Privacy and Security Topics

Privacy - Self-Assessment Quiz

The purpose of this quiz is to provide the student with a large number of supplemental exercises for Chapter 14. This quiz can be used to perform a self-evaluation. This quiz consists of twenty five multiple choice questions. Each multiple choice question has four possible answers.



1

Which of the following is the least likely way someone would find information about a person online?
A)Through a public event.
B)Through volunteered information.
C)Through the person's email address book.
D)Through a company profile.
2

Which number is closest to the number of lines of source code in a Web browser?
A)10,000
B)25,000
C)50,000
D)75,000
3

Which of the following does not contribute to the company of large software systems?
A)Team development.
B)Program size.
C)Software interfaces.
D)Web design.
4

Which of the following gives the best sense of an encryption scheme?
A)A method of encoding information.
B)A plaintext message.
C)A private key.
D)A ciphertext message.
5

Which of the following statements about ROT13 is not true?
A)ROT13 stands for "rotation 13."
B)ROT13 is a Caesar cipher.
C)ROT13 is a secure encryption scheme.
D)ROT13 is a handy way to encode offensive jokes.
6

The expression "help me Rhonda" is expressed as which of the following using ROT13?
A)utyc zt Eubaqn
B)yilp te Rsupta
C)uryc zr Eubaqn
D)iaol jl Tmcipa
7

Select the best answer. Cryptography is the field of study.
A)dealing with encryption schemes and secure systems.
B)dealing with firewalls, operating systems, and routers.
C)dealing with keys.
D)dealing with complex systems.
8

Which of the following numbers is prime?
A)81
B)101
C)121
D)323
9

Which of the following numbers is prime?
A)51
B)93
C)97
D)333
10

Which of the following numbers is composite?
A)223
B)227
C)229
D)231
11

Which of the following numbers is composite?
A)599
B)641
C)643
D)703
12

Which of the following statements is true?
A)In private key cryptography both the sender and receiver share the same public key.
B)In private key crptography neither the sender nor receiver share the same public key.
C)In private key cryptography both the sender and receiver share the same private key.
D)In private key cryptography neither the sender nor receiver share the same private key.
13

Which of the following statements is true?
A)Public key cryptography is useful for providing privacy.
B)Public key cryptography is useful for authentication.
C)Public key cryptography involves a single key.
D)Public key cryptography is provided by gzip.
14

Define a hashing function that takes the number of a's in a message and doubles it. What would be the hash of the phrase "i could have been a contender?"
A)2
B)4
C)6
D)8
15

Define a hashing function that takes the number of each of the various letters occurring in the message, multiples those values together, and then adds 1. What would be the hash of the phrase "I could have been a contender"?
A)0
B)23
C)52
D)241
16

Which of the following is true?
A)Hashing is useful for authentication.
B)Hashing is useful for verifying message integrity.
C)Hashing is useful as a private key technique.
D)Hashing is useful as a public key technique.
17

What type of protocol would you expect to see in a URL for a secure document?
A)https
B)ftps
C)hits
D)hashs
18

Which of the following techniques would you not expect to see used in a digital signature?
A)hashing
B)public key cryptography
C)sniffing
D)private key cryptography
19

Which of the following does PGP stand for?
A)Protocol for Good Privacy
B)Pretty Good Privacy
C)Primes for Good Privacy
D)Protocol for GNU Privacy
20

What does RSA stand for?
A)Rivest, Shamir and Adleman
B)Real !Security Alert
C)Recent Security Alarm
D)Ron's Security Algorithm
21

What does MD5 stand for?
A)Message Digital 5
B)Messaging Digested 5
C)Message Digest 5
D)Method for Deciphering 5
22

What does IDEA stand for?
A)International Data Encryption Algorithm
B)Integrity of Dozens of Emergency Algorithms
C)Individualized Date Encryption Algorithm
D)Italy's Data Encryption Algorithms
23

What does CERT stand for?
A)Computer Emergency Response Team
B)Computer Encryption Rotation Team
C)Computer Encryption Real Time
D)Computer Emergency Real Time
24

Which of the following is the best definition of firewall?
A)A security mechanism used for exchanging secure passwords over an intranet.
B)A security mechanism used for exchanging secure passwords over the Internet.
C)A security mechanism used by organizations to protect their LANs from the Internet.
D)A security mechanism used by organizations to protect password files from Internet hackers.
25

Which of the following statements is true?
A)Firewalls are always implemented in software.
B)Firewalls are always implemented in hardware.
C)Firewalls may be implemented in both software and hardware.
D)It is impossible for network traffic to pass through a firewall.