a) Plug-ins b) Helper applications c) Helper apps d) All of the above
a) Content-development b) Browser extension c) VRML d) SSL
a) RealPlayer b) QuickTime c) Live Audio d) All of the above
a) the computer locks up b) nothing happens c) it loads a similar web page d) none of the above
a) ClearFusion b) QuickTime c) VDOLive d) None of the above
a) Visual Reality Modeling Language b) Vocal Reality Modeling Language c) Virtual Reality Modeling Laguage d) None of the above
a) VRML b) Cosmo Player c) Beatnik d) None of the above
a) .ar b) .acr c) .pdf d) .abr
a) animated interfaces. b) interactive advertisements. c) streaming CD-quality audio. d) All of the above
a) Windows b) Macintosh c) UNIX d) all of the above
a) games using three dimensional worlds b) universities offering a virtual campus tour c) automobile manufactures providing a virtual driving experience d) all of the above
a) menace b) threat c) rogue d) virus
a) physical security b) computer security c) logical security d) all of the above
a) counter measure b) anti-terrorist tacket c) security measure d) threat blocker
a) authentication b) network manager c) crossing guard d) sniffer
a) click-stream b) log in c) password d) credit card information
a) integrity b) secrecy c) delay/denial d) privacy
a) CERT b) SSL c) NSF d) W3C
a) trojan horse b) virus c) worm d) cookie
a) trojan horses b) PCs c) MACs d) none of the above
a) masquerading b) dissembling c) identifying d) authenticating
a) digital b) incrypted c) autenticated d) scanned
a) the certificate holder's name,address,and e-mail address b) a special key that unlocks the digital certificate c) a certificate's expiration date d) all of the above
a) Microsoft,Inc b) Internet Explorer c) Verisigen,Inc d) BBB
a) symmetric b) asymmetric c) cipher d) plain
a) symmetric b) plain c) cipher d) asymmetric
a) symmetric b) asymmetric c) ciphered d) both A and B
a) symmetric encryption b) asymmetric encryption c) keys d) all of the above
a) symmetric b) strong c) SSL d) encrypted
a) SET b) cookie c) applet d) activeX control
a) The statement above is TRUE. b) The statement above is FALSE.
The 'Muddy Water' Issues that I need help on are as follows: I am having trouble with...
plug-ins browser extentions Multimedia Sound Players Video Players
Virtual Reality Modeling Language-VRML buffered play decryption Secure Sockets Layer-SSL Java applet
ActiveX components Shockwave cookie computer emergency response team Pretty Good Privacy-PGP
When you have completed this quiz, press the ALL DONE-CHECK TEST button below to check the test! Then you may go back and change the incorrect answers before you submit the test. You may check the answers as many times as you need until you achieve a perfect grade. Sometimes the pop-up box does not appear when you click on the button after checking the test the first time. If this happens, minimize the test and the answer box will be behind the browser. close the box and maximize the test to continue checking the test and finally submitting it.
When you have finished checking the test, press the SUBMIT button to send answers to your instructor
Users whose browser does not support JavaScript, when you have completed this quiz click the submit button below to send answers to your instructor