click below
click below
Normal Size Small Size show me how
CIW
LESSON 8
| Question | Answer |
|---|---|
| What are some Cookie types? | persistent session first-party third-party |
| The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data | Authentication |
| No user name or password are required, and authentication is handled transparently by the browser and server | Anonymous logon |
| A user name and password are required, and that information is sent as plain text | Basic authentication |
| Symmetric (private-key) encryption | The same key is used to encrypt and decrypt messages |
| Two keys are used to encrypt and decrypt messages: a public key and a private key | Asymmetric (public-key) |
| Uses hashes to verify the integrity of transmitted messages | Hash (one-way) encryption |
| You must have the proper digital certificate to gain access | Digital certificates |
| Used to log on to private and public networks, including the Internet | User names and passwords |
| Electronic signatures that verify the identity of the message sender | Digital signatures |
| Digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action | Non-repudiation |
| The process of converting data into an unreadable form of text | Encryption |
| The process of converting the encrypted data back to its original form | Decryption |
| A mathematical algorithm | Key |
| A protocol for secure exchanges | Secure Sockets Layer (SSL) |
| Damages computers and networks, often alters files to damage or destroy data | Virus |
| Resides in active memory and replicates itself until an entire disk is full | Worm |
| Installs hidden services on systems | Illicit server |
| Allows remote access to a computer by an attacker | Client code |
| Infects destination computer and enables the attacker to control it | Server code |
| A collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks | Firewall |