Question

In: Computer Science

Session 6.2 Quick Check What is a digital certificate? A self-replicating and self-executing program that sends...

Session 6.2 Quick Check

  1. What is a digital certificate?

  2. A self-replicating and self-executing program that sends copies of itself to other computers over a network is called a(n) ______________.

  3. Describe malware and name three examples of it.

  4. What is a web bug and how can it pose a security risk?

  5. What is a firewall?

  6. How can you tell that a webpage you are viewing with a browser is secure?

  7. What is a server certificate?

Solutions

Expert Solution

1) A Digital Certificate is an electronic document which will be used to prove the ownership of a public key with the entity that owns it. Digital certificate allows a person or organisation to securely exchange data over the internet using public key encryption. It is also called a public key certificate. It contains information about the key, information about the identity of its owner, and the digital signature of issuer.

2)A self-replicating and self-executing program that sends copies of itself to other computers over a network is called a worm.

3) Malware is the short form for malicious software, which is created to access a computer systems usually without user/admin's permission. Most common malware are viruses, worms and Trojan horses.

4)A web bug or a web beacon is a file object that will be place on a web page or an email to monitor user's activity. It will be a security risk because that small images has to be downloaded from the sender's server when the message is opened they can send the time and frequency of the recipient activity. Unlike a cookie user can not control the download. It can sent important information like recipient's IP, web activity and type of browser etc.

** 4 subparts per question can be answered**


Related Solutions

Searching the Web Session 3.2 Quick Check What is the following query trying to accomplish? Lions...
Searching the Web Session 3.2 Quick Check What is the following query trying to accomplish? Lions -football Why should the alt attribute be used when inserting images on a webpage? List at least four recommended SEO techniques. List three factors to consider when evaluating the quality of a website.
Session 5.1 Quick Check Describe push technology and pull technology, and provide examples of each. What...
Session 5.1 Quick Check Describe push technology and pull technology, and provide examples of each. What are three examples of Web 2.0 applications? A series of related messages in a newsgroup or email is called a(n) ______________. Most social websites have built-in ______________ that display content from different feeds. What is a podcatcher and what does it do? What is a mashup? What is a common income source for developers who create mashups?
What lines of reasoning support the hypothesis that the first self-replicating systems were based on RNA...
What lines of reasoning support the hypothesis that the first self-replicating systems were based on RNA molecules? What kinds of evidence support the three-domain concept of life? What evidence supports the idea that the mitochondrion and chloroplast were once free-living members of the domain Bacteria?
What lines of reasoning support the hypothesis that the first self-replicating systems were based on RNA...
What lines of reasoning support the hypothesis that the first self-replicating systems were based on RNA molecules? Why is the origin of cyanobacteria a critical step in evolution? What evidence supports the idea that mitochondria and chloroplasts were once free-living members of the domain bacteria? 4. What evidence supports the classification of life into three domains? Compare and contrast the physical and chemical conditions on Earth at the time life first arose with conditions today. a) Discuss two reasons why...
As a trainer, what would your role be in a self-directed learning program?
As a trainer, what would your role be in a self-directed learning program?
What is true about Random Access Files? Check all that apply. 1. The program can read...
What is true about Random Access Files? Check all that apply. 1. The program can read file data anywhere the read location is positioned. 2. Data must be sorted to to use random access functions. 3. Data can be read in any order specified in the program. 4. seekp and seekg can be used to access files by a given position.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT