Secure Web Browsing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

flashcard set

Earn XP

Description and Tags

Flashcards about safe web browsing

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

When using a computer and web browser, you must consider the ways to keep transmitted information secure and prevent __ from infecting your computer.

malicious software (malware)

2
New cards

Data transferred over a free network could be intercepted by anyone else connected to the network and by __.

the person that owns the network

3
New cards

To mitigate the interception of data, use a __ that encrypts the link between your client and the web or mail server.

security-enabled protocol (SSL/TLS)

4
New cards

Unencrypted Internet traffic processed over an Internet connection may be stored on __.

the ISP's computers

5
New cards

When using a public workstation, always be alert to the possibility that it could be infected with __.

malware

6
New cards

When using a public workstation, clear the __ before shutting down or logging off.

browser cache

7
New cards

When using a public workstation, make sure you do not allow __ to be cached.

passwords

8
New cards

If you operate a wireless network, it is important to __ it so that others do not make malicious use of it.

secure

9
New cards

It is also illegal to use open networks without explicit __ from the owner.

permission

10
New cards

If you try to guess or crack the password of someone's network, you are committing an __.

illegal act

11
New cards

The web browser is one of the most well-exploited vectors for infecting a system with __ or stealing information.

malware

12
New cards

__ is malicious software designed to infiltrate or damage computer systems.

malware

13
New cards

Viruses and worms are malware principally designed to __ to other PCs.

spread

14
New cards

__ is an apparently legitimate application that conceals malicious functions, such as spyware or a bot allowing remote control of the PC.

Trojan Horse

15
New cards

__ is software or configuration files installed with your agreement that helps a company track what pages you visit and display personalized adverts to you.

Adware

16
New cards

__ is malware installed covertly, possibly as a Trojan or as a result of a virus or worm infection, that tries to track everything you use the computer for.

Spyware

17
New cards

Legacy browsers are more likely to be __ to malware.

susceptible

18
New cards

Ensure that the browser software and any __ software used by the browser is updated with the latest security patches.

plug-in

19
New cards

Obvious symptoms of infection by spyware or adware are pop-ups or additional toolbars, the home page or search provider changing suddenly, searches returning results that are different from other computers, __.

slow performance, and excessive crashing (faults)

20
New cards

__ is where the user tries to open one page but gets sent to another, and may imitate the target page.

Redirection

21
New cards

In adware, redirection is just a blunt means of driving traffic through a site, but spyware may exploit it to capture __.

authentication details

22
New cards

Adverts for free anti-virus, or virus infection warnings, or system performance warnings are all likely to be __.

bogus

23
New cards

You can only mitigate the type of threat where malware infects your computer because OS or browser software is not up to date by installing the latest __.

software patches

24
New cards

You can only mitigate the threat of malware infecting your computer because OS or browser software is not up to date by installing the latest software __.

patches

25
New cards

Many websites and web applications used custom or proprietary features of IE that meant other browsers might fail to run the __ properly.

web application

26
New cards

Compatibility aside, your choice of browser is largely down to __.

personal preference

27
New cards

Do make sure you choose a browser whose developer is active in monitoring __ and providing software updates to fix them.

security issues

28
New cards

Scripting is usually based on __.

JavaScript

29
New cards

Animated or interactive content often uses a browser __.

add-on

30
New cards

Flash and Silverlight are two rival development environments used to provide __ and video.

interactive web applications

31
New cards

Java applications require the __ to be installed on Windows and for the Java plug- in to be enabled in the browser.

Java Virtual Machine

32
New cards

When a web page needs to use active content and it is either not permitted to by current security settings or because the required plug-in is not installed, the browser displays a __.

warning

33
New cards

Generally speaking, you should only install add-ons where the browser can identify that the publisher is a __.

trusted source

34
New cards

Most modern sites use __ for interactive content.

scripting

35
New cards

Most sites will use __ scripting, meaning that code runs on the server to display the page you are looking at.

server-side

36
New cards

Deactivating client-side scripting tends to __ most of the websites published on the Internet.

break

37
New cards

Modern browsers __ the scripts running on a page or browser tab so that they cannot change anything on other tabs or on the computer.

"sandbox"

38
New cards

While scripting is usually left enabled, all browsers provide tools for managing __.

add-ons

39
New cards

__ can add functionality to the browser and might install a toolbar or change menu options.

Extensions

40
New cards

__ are designed to play some sort of content embedded in a web page, such as Flash, Silverlight, or other video/multimedia format.

Plug-ins

41
New cards

You can view installed add-ons and choose to remove or enable/disable them using the browser __ button or menu.

settings

42
New cards

All extensions and plug-ins should be __ signed by the developer to indicate that the code is as-published.

digitally

43
New cards

You should be extremely wary of installing __ add-ons.

unsigned

44
New cards

A __ is a plain text file created by a website when you visit it used to store session information.

cookie

45
New cards

An __ can often be tied quite closely to a geographic location

IP address

46
New cards

First-party cookies are set by __.

the domain you visit

47
New cards

Third-party cookies are set by __.

another domain

48
New cards

__ might make use of cookies to track what sites you visit and display targeted adverts.

Spyware and adware

49
New cards

Confidential information, such as a password, should only be stored in a __ cookie.

secure

50
New cards

A __ is a 'sub-window' that appears over the main window, and can be implemented using scripts or add-ons.

pop-up