CIW
Help!
|
|
||||
---|---|---|---|---|---|
SPAM: | show 🗑
|
||||
Cookie types: | show 🗑
|
||||
You can configure your browser’s security settings to accept, reject or prompt before accepting: | show 🗑
|
||||
show | the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
🗑
|
||||
show | no user name or password are required, and authentication is handled transparently by the browser and server
🗑
|
||||
show | a user name and password are required, and that information is sent as plain text
🗑
|
||||
Symmetric (private-key) encryption: | show 🗑
|
||||
show | Two keys are used to encrypt and decrypt messages: a public key and a private key
🗑
|
||||
show | Uses hashes to verify the integrity of transmitted messages
🗑
|
||||
show | you must have the proper digital certificate to gain access
🗑
|
||||
User names and passwords: | show 🗑
|
||||
Digital signatures: | show 🗑
|
||||
show | digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action
🗑
|
||||
show | the process of converting data into an unreadable form of text
🗑
|
||||
Decryption: | show 🗑
|
||||
Key: | show 🗑
|
||||
Secure Sockets Layer (SSL): | show 🗑
|
||||
show | damages computers and networks, often alters files to damage or destroy data
🗑
|
||||
Worm: | show 🗑
|
||||
Trojan: | show 🗑
|
||||
Illicit server: | show 🗑
|
||||
Client code: | show 🗑
|
||||
Server code: | show 🗑
|
||||
show | Receive infected disc/drive from colleague or friend
Download infected file
Download illicit server attachment
Copy to your hard disk a document infected with a macro virus
🗑
|
||||
show | o Do not open the attachment
o Contact the sender to determine whether the attachment is legitimate
o If you cannot contact the sender, delete the attachment from the message
o Delete the attachment from the Deleted Items folder
🗑
|
||||
If you suspect a virus attack: | show 🗑
|
||||
Spyware | show 🗑
|
||||
show | The user is aware of their presence
The user has the option to disable outside access to cookie information
Use spyware detection applications to detect and eliminate spyware
🗑
|
||||
show | a software upgrade that permanently fixes known bugs and improves software performance
🗑
|
||||
Patch: | show 🗑
|
||||
Virus update: | show 🗑
|
||||
Typosquatting: | show 🗑
|
||||
Firewall: | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
hannahluvsu