Web Development Lesson 8
19 Questions
100 Views

Web Development Lesson 8

Created by
@PromisingStonehenge

Questions and Answers

What is a persistent cookie?

  • A cookie that remains after the browser is closed (correct)
  • A cookie that is automatically deleted by the browser
  • A cookie that is deleted after the session
  • A cookie from a different website
  • What is a session cookie?

  • A cookie that is stored for the duration of the browsing session (correct)
  • A cookie that is stored permanently on the computer
  • A cookie that lasts until the browser is closed (correct)
  • A cookie used for authentication
  • What is a first-party cookie?

    A cookie that comes from the website currently being viewed.

    What is a third-party cookie?

    <p>A cookie that comes from a website other than the one currently being viewed.</p> Signup and view all the answers

    What is an anonymous logon?

    <p>No user name or password is required.</p> Signup and view all the answers

    What is basic authentication?

    <p>A user name and a password are required.</p> Signup and view all the answers

    What is secure authentication?

    <p>A user name and password are required, and the information is encrypted.</p> Signup and view all the answers

    What is a digital certificate?

    <p>A certificate required to gain access.</p> Signup and view all the answers

    What is a certificate authority?

    <p>An entity that proves the identity of individuals or companies online.</p> Signup and view all the answers

    What is a digital signature?

    <p>An electronic stamp that identifies a message's source and contents.</p> Signup and view all the answers

    What is non-repudiation?

    <p>The ability to prove that a transaction occurred.</p> Signup and view all the answers

    What is symmetric-key encryption?

    <p>An encryption method using the same key to encrypt and decrypt.</p> Signup and view all the answers

    What is asymmetric-key encryption?

    <p>An encryption method using two keys for encryption and decryption.</p> Signup and view all the answers

    What is hash encryption?

    <p>An encryption method using hashes to verify message integrity.</p> Signup and view all the answers

    What is a virus?

    <p>A malicious program designed to damage computer systems.</p> Signup and view all the answers

    What is a worm?

    <p>A self-replicating program that consumes system and network resources.</p> Signup and view all the answers

    What is a Trojan?

    <p>A program that appears harmless but produces harmful results.</p> Signup and view all the answers

    What is an illicit server?

    <p>An application that installs hidden services on systems.</p> Signup and view all the answers

    What is ICMP (Internet Control Message Protocol)?

    <p>A subset of Internet protocol used to determine network communication capabilities.</p> Signup and view all the answers

    Study Notes

    Cookies

    • Persistent Cookies: Stored on the computer, remain after the browser session ends.
    • Session Cookies: Last only during the current browsing session, deleted upon closing the browser.
    • First-Party Cookies: Originates from the website currently being viewed.
    • Third-Party Cookies: Comes from a website other than the one being viewed.

    Authentication Methods

    • Anonymous Logon: Requires no username or password; automatically handled by browser and server.
    • Basic Authentication: Requires a username and password for access.
    • Secure Authentication: Uses a username and password that are encrypted during transmission.

    Digital Security

    • Digital Certificate: Necessary for access, proving identity in digital communications.
    • Certificate Authority (CA): Establishes the identity of an individual or organization online.
    • Certificate Request: Submission process for obtaining a digital certificate.

    Digital Signatures and Security

    • Digital Signature: An electronic stamp verifying the source and content of a message.
    • Non-Repudiation: Capability to prove that a transaction or event occurred.

    Encryption Types

    • Symmetric-Key Encryption: Same key is used for both encrypting and decrypting messages.
    • Asymmetric-Key Encryption: Utilizes a pair of keys for message encryption and decryption.
    • Hash Encryption: Verifies the integrity of messages using hash functions.

    Malicious Software

    • Virus: Malicious software intended to cause damage to systems and networks.
    • Worm: Self-replicating program that consumes system and network resources.
    • Trojan: Appears harmless but can cause damage; trick users into execution.

    Illicit Operations

    • Illicit Server: Applications that install hidden services on systems, often associated with malicious activity.

    Networking Protocols

    • ICMP (Internet Control Messaging Protocol): A protocol used to check network communication capabilities.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on cookies with this flashcard quiz from Web Development Lesson 8. Understand the differences between persistent, session, and first-party cookies. Perfect for students looking to reinforce their learning in web technologies.

    More Quizzes Like This

    Sessions and Cookies Overview
    10 questions

    Sessions and Cookies Overview

    PalatialVerisimilitude avatar
    PalatialVerisimilitude
    Términos de uso de cookies
    12 questions
    PHP Advanced: Sessions and Cookies
    12 questions
    Types of Cookies and Functions
    6 questions
    Use Quizgecko on...
    Browser
    Browser