In the Wings
Calling all Extras!
Roll Film
Take One!
The last Hurrah!
100
Application servers are usually grouped into two types: page-based and_________.
a. server-based b. component-based c. script-based d. group-based
100
_____is the protection of computer assets from unauthorized access, use,alteration or destruction.
a. Computer security b. Computer risk c. Computer damage d. Digital signature
100
_____refers to protecting against unauthorized data disclosures and ensuring the authenticity of the data source.
a. Necessity b. Secrecy c. Integrity d. Harmony
100
A(n)____is a small application program.
a. applet b. buffer c. cipher d. procedure
100
A(n)____is software that attaches itself to another program and can cause damage when the host program is activated.
a. applet b. cookie c. virus d. message digest
200
The term_____is defined as: a self-contained, modular unit of application logic that provides some business functionallity to other applications through an internet connection.
a. business logic b. Web services c. dedicated hosting d. application integration
200
Any act or object that poses a danger to computer assets is known as a(n)_____.
a. damage b. backup c. threat d. accident
200
Which of the following refers to preventing unauthorized data modification?
a. Integrity b. Secrecy c. Necessity d. Completeness
200
A(n)_____is a program hidden inside another program or Web page that masks it true purpose.
a. mask program b. Trojan horse c. hidden route d. insider program
200
The term_____describes the process of hiding information within another piece of information.
a. ACL b. steganography c. firewall d. decryption
300
The characteristics of the logic unit that make up specific Web services are described using the_____.
a. WSDL b. UDDI c. W3C d. SOAP
300
A(n)____is a person or device that is able to listen in on and copy internet transmissions.
a. eavesdropper b. controller c. dropper d. listener
300
_________ refers to preventing data delays or denials.
a. Integrity b. Secrecy c. Necessity d. Readiness
300
Java is a programming language developed by________.
a. Microsoft b. IBM c. Oracle d. Sun Microsystems
300
_____is the protection of an individual's rights to nondisclosure.
a. Secrecy b. Privacy c. Security d. Sensitivity
400
_________is used to look for hidden patterns in data.
a. Data mining b. Data base c. Data warehousing d. Report generation
400
Protection of assets using nonphysical means is called____.
a. countermeasure b. logical security c. security policy d. continuity plan
400
A(n)____only purpose is to provide a way for a Web site to place cookies on a Visitor''s computer.
a. ACL's b. digital ID's c. Web bug's d. gateway server's
400
A(n)_____ is an object that contains programs and properties that Web designers place on Web pages to perform particular tasks.
a. objective b. Java ++ c. ActiveX control d. plug-in
400
Special software applications called______provide the means to record information that passes through a computer or router that is handling Internet traffic.
a. Intruder programs b. copier programs c. sniffer programs d. backdoor programs
500
____software often includes powerful search tools that use proprietary semantic and statistical algorithms to help users find the content, human experts, and other resources that can aid in their research and decision-making tasks.
a. Web service b. Application server c. Knowledge management d. Data mining
500
Originally, the term ____was used to describe a dedicated programmer who enjoyed writing complex code that tested the limits of technology.
a. eavesdropper b. hacker c. cracker d. wardriver
500
______refers to programs that are embedded transparently in Web pages and that cause action to occur.
a. Action page b. Active content c. Home page d. Activity contol
500
ActiveX controls can run on computers running the_______operating system.
a. Windows b. Linux c. Unix d. Mac
500
A(n)_____allows anyone with knowledge of its existence to cause damage by observing transactions, deleting data, or stealing data.
a. sniffer b. backdoor c. auditor d. opener