Upgrade to remove ads
EXAM 70-687 Configuring Windows 8 - Lesson 8
Lesson 8 - Key Terms
Terms in this set (19)
Enable users to send text or other media they select in an IE browser window to another application, such as an email client t, or an Internet resource, such as a blog.
are separate software components, created by Microsoft or by third parties, that interact with the basic functions of the web browser.
certification authority (CA)
sends a digital certificate which contains its public key to a web server participating in a PKI. The server also generates a private key which it stores locally.
gathers information about application incompatibilities,
enables the browser to display older pages properly.
Prevents third-party websites from compiling information about an IE user's browsing practices.
Prevents IE from maintaining a permanent record of the user's activities during browsing session. Also enables you to surf the Internet without leaving any record of your activities.
Mandatory Integrity Control (MIC)
assigns various integrity access levels to processes running on the computer.
a technique that takes social engineering to a mass scale, uses convincing-looking websites that urge users to supply personal information, such as passwords and account numbers.
also known as audio feeds
an operational state designed to prevent attackers that do penetrate the computer's defenses from accessing vital system components.
public key infrastructure (PKI)
requires two encryptions keys, a public one and a private one.
simplifies the process of delivering updated content to designated users
Secure Sockets layer (SSL)
the protocol that most websites use when establishing secure connections with clients over the Internet.
provide different levels of access to specific applications, IE divides the addresses accessible with the web browser into several different security zone, each of which has a different set of privileges.
examines traffic for evidence of phishing activity and displays a warning to the user if it finds any.
term that describes any attempt to penetrate the security of system by convincing people to disclose secret information.
Trusted Sites zone
sites do not run in protected mode. and receive elevated privileges.
a standard defining a new protocol that enables Internet clients and servers to exchange data immediately as it becomes available, without the overhead created by HTTP and TCP
This set is often in folders with...
EXAM 70-687 Configuring Windows 8 - Lesson 7
EXAM 70-687 Configuring Windows 8 - Lesson 9
EXAM 70-687 Configuring Windows 8 - Lesson 6
EXAM 70-687 Configuring Windows 8 - Lesson 10
You might also like...
BUS 510: Chapter 5
Technology in Action Chapter 13
chapter 13 vocabulary
Other sets by this creator
EXAM 70-687 Configuring Windows 8 - Lesson 18
EXAM 70-687 Configuring Windows 8 - Lesson 17
Ethical Hacking and Network Security - Ch 13 - Net…
Ethical Hacking and Security - Chapter 12 - Crypto…