I have answered the questions; however, I am uncertain if I am on the right track. Can you please let me know with some explanation if your answers are different?
1. Which best describes how malicious code can get on your computer?
a. Email attachments
b. Downloaded software from non-authoritative sources and websites
c. Sharing diskettes from computers without up to date antivirus software
d. All of the above
e. A and C only
My guess is "all of the above".
2. A way of verifying a message's integrity after transport across a network is through the use of:
a. A Message Authentication Code
b. Steganography
c. An encryption key
d. A cipher
My Guess is an encryption key as this appears to be the safest way to transmit a message.
3. Which of the following best describes examples of mobile code?
a. Java, Javascript, and ActiveX
b. HTML, the language of web pages
c. Postscript, the language of some LaserJet printers
d. All of the above
e. None of the above
My guess is (A) as HTML is for web pages and (C) I have no idea what it is used for.
4. Which statement best describes the advantages of public key encryption?
a. Keys are exchanged publicly without an eavesdropper being able to decrypt messages
b. Knowledge of one's public key does not yield knowledge of their private key
c. Encryption performance is faster than secret-key encryption
d. A and B only
e. None of the above
My guess is (A) is this correct..for some reason it doesn't look right.
5. Which statement best captures the advantage of secret key encryption?
a. It allows for faster encryption speeds than public key encryption
b. It only requires one key to be distributed for encryption and decryption
c. The keys are stronger than public keys and are more difficult to break
d. All of the above
e. A and B only.
My guess is (a).
6. Which of the following best describes what is removed from a hard drive when a file is deleted from the hard drive?
a. The MBR record, the FAT record, and the Directory Table entry.
b. The FAT record, the Directory Table entry, and the data clusters that the file occupied.
c. The FAT record and the Directory Table entry.
d. The FAT record, the Directory Table Entry, and the Partition Table.
My guess is (b).