Internet Security 1
Internet Security 2
E-Commerce
Web 1.0, 2.0, and 3.0
Net Neutrality and Web Applications
100
Information security is implemented at the individual machine level, the computer network level, and the ____ level.
What is internet?
100
Software companies rely on ____ to “fix” problems in their programs related to bugs and flaws.
What is updates?
100
Individual consumers use the _____ form of e-commerce to sell to other individuals on the Web.
What is C2C?
100
A ______ controls communication between Web clients and servers
What is protocol?
100
The principle that all sites on the Internet should be equally accessible
What is net neutrality?
200
Receiving a fraudulent e-mail that closely resembles a legitimate Web site, such as one from your bank, is known as a(n) ____ attack.
What is phishing?
200
Criminals collect items such as credit card numbers without the knowledge of the user through the use of ____.
What is spyware?
200
E-commerce hosting companies offer _____ that provide all the necessary software tools to deliver e-commerce applications.
What is servers?
200
____ is credited with the development of the Web.
Who is Tim Berners-Lee?
200
Broadband Internet service is regulated by _____________.
What is the Federal Communications Commission or FCC?
300
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
What is social engineering?
300
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
What is zombie?
300
Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT _____.
What is shipping?
300
The concept of ____ serves as the foundation for linking documents together on the Web.
What is hyperlinking?
300
The use of ___________ is growing faster than the time we spend browsing the Web or watching TV
What is mobile applications?
400
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
What is ports?
400
"Don’t forward e-mail virus hoaxes" is something you can do to _____________.
What is ensure internet security? Or protect yourself online?
400
____-based advertising can keep track of customers’ locations and provide them with discount coupons in their area.
What is location?
400
__________ is sometimes known as "brochureware."
What is Web 1.0?
400
___________ is defined as "a scenario in which objects, animals or people are provided with unique identifiers and the ability to automatically transfer data over a network without requiring human-to-human or human-to-computer interaction."
What is the Internet of Things?
500
A(n) ____ may be used to censor data that may not be dangerous but may be undesirable.
What is firewall?
500
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
What is internet server?
500
_______ fraud is one of the most prevalent types of fraud on the Internet.
What is auction?
500
______ is also known as the semantic Web.
What is Web 3.0?
500
Security, privacy, and data storage needs are concerns with what types of apps?
What is wearable?
M
e
n
u