Question: 1 Which computer terms (used in this chapter] are being described below? a a user is granted access only after successfully presenting two pieces of
1 Which computer terms (used in this chapter] are being described below?
a a user is granted access only after successfully presenting two pieces of evidence to verify or identify who they are b uses a cache to speed up access to web pages from a website c controls that are used on social networks and other websites to allow users to limit who can access data from their stored profile d protocol that is used to allow data to be sent securely over a network, such as the internet e software or hardware that sits between a computer and an external network which monitors and filters out all incoming and outgoing traffic f supplies domain names for internet hosts and is used to find IP addresses of domain names g use of unique human characteristics to identify a user as a form of authentication h made up of three types of identification:
- something you know - something you have - something you are i manipulation of people into breaking normal security procedures and best practices to gain illegal access to a user's computer system j malicious code stored on a user's hard drive or web server used to redirect a browser to a fake website without their knowledge
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
