COMPTIA ITF+ - Lesson 17

Ace your homework & exams now with Quizwiz!

Proxy server

A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.

first-party cookie

A cookie that is created from the website currently being viewed.

Flash and Silverlight

Interactive web applications and videos on websites that require a plug-in

virus and worms

Malware designed to spread to other PCs

spyware

Malware that records all of the user's activity on PC (like keystrokes, screenshots, access to camera and mic)

Add-ons

Programs that provide additional functionality to Web browsers.

scripting

Simple programming based on JavaScript that can be included in web pages to make them more interactive or dynamic.

Adware

Software and/or files installed with user's consent and tracks history and sends the user ads

Trojan Horse

Software disguised as normal but malicious

host

a personal firewall (by a third party) installed by the user

cookies

a plain text file that is created by the website intended to store session info so the website is personalized to you

java

a programming language used to create interactivity on web pages

script blocker

add-on that disables script

hardware

appliance that has firmware installed on it

Client-side scripting

code runs on the client device (usually through a browser)

Server-side scripting

code runs on the server to display the current page the user is looking at

third-party cookies

cookies put on a computer by those other than the website being visited, such as advertisers inserting their own cookies on a web page

Windows Defender Wall

firewall on Windows that is pre-installed and pre-enabled on the PC

port number

identifies which port within an application (or which application protocol) was used to send the data

Personal Identifiable Information (PII)

information that is contained in cookies

Packet filtering

method used by firewall to monitor which packets are incoming and outgoing from the computer and/or network

Root certificates

pre-installed certificated that are automatically trusted by the web browser

Firewall

protection tool that restricts certain hosts and applications from accessing a computer and/or network

Open/free network

public WiFi

malware

software that is intended to damage or disable computers and computer systems.

Certificate Authority

third party that confirms a server's identity isn't malicious by issuing a digital certificate

extensions

type of add-on that adds function to a browser and runs scripts to interact with the current page; adds to the web browser's tool bar

themes

type of add-on that changes the appearance of web browsers

plug-ins

type of add-on that is required to play embedded content on a web page

packet filters

type of firewall that allow or deny packets based on specified criteria, such as port, IP address, or protocol.

Stateful Inspection

type of firewall that compares certain key parts of the packet to a database of trusted information

Asymmetric encryption

used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt.

Private browsing mode

version of the web browser that doesn't store cookies, history or temporary files


Related study sets

FAR flashcards chs 1-3 (some of them) + some Ch 6 Updates

View Set

Macro-Economics Final Exam Review

View Set

CS21 - Unit 5 Programming Logic Skills

View Set

Social Studies chapter 11 section 2

View Set