………. security technology establishes an encrypted link between a Web server and browser. -Technology

1 Answer

Answer :

SSL security technology establishes an encrypted link between a Web server and browser.

Related questions

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : Google Chrome is an example of (a) Web browser (b) Web server (c) HTTP (d) WWW -Technology

Last Answer : (a) Web browser is the program that is used to explore the Internet.Thus, Google Chrome is an example of Web browser.

Description : Encrypted data is referred as cipher text. -Technology

Last Answer : TrueEncrypted data is presented in coded form. So, it is known as cipher text.

Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv

Last Answer : b. i, ii, iii 

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message.. A. 420 B. 320 C. 220 D. 120

Last Answer : C. 220

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : Safari is a Web browser developed by ……….. -Technology

Last Answer : Safari is a Web browser developed byApple.

Description : Which software browse the Internet in a systematic manner? (a) Web crawler (b) Web browser -Technology

Last Answer : (a) Web search engine works by storing information about many Web pages, retrieved by a Web crawler.

Description : What is the method of viewing the source code of the current page in the Web browser? -Technology

Last Answer : Right click on the Web page and then select View Source from the context menu.

Description : Which tag do we use to change the size and style (face) of the text of an HTML file viewed on a Web browser? -Technology

Last Answer : tag is used to change the size and style (face) of the text of an HTML file displayed on a Web browser. Two attributes of tag are as follows:size: It specifies the size of the text inside a tag.Syntaxface: It specifies the font name of the text inside a tag.Syntax

Description : To create an HTML page, you need (a) text editor (b) Web browser -Technology

Last Answer : (c) Because text editor is required to write HTML code and the Web browser is needed to display the page.

Description : The ……….. tag is used to make the Web browser ignore anything that the tag contains. -Technology

Last Answer : The tag is used to make the Web browser ignore anything that the tag contains.

Description : An image to be displayed in a Web page has to cover 25% of the browser window horizontally and 50% vertically. -Technology

Last Answer : An image to be displayed in a Web page has to cover 25% of the browser window horizontally and 50% vertically. The attributes height and width of the tag would be used for achieving this.

Description : An XML document can be viewed in a (a) Word processor (b) Web browser -Technology

Last Answer : (b) An XML document can be viewed in a Web browser.

Description : Mozilla Firebox is a (a) Web Browser (b) News Website (c) Graphing Package (d) Word Processor -Technology

Last Answer : Mozilla Firebox is aWeb Browser

Description : What is the purpose of a web browser? Give the name of any two popular web browsers. -Technology

Last Answer : A web browser is an application program used for exploring the information resources available on the World Wide Web to retrieve the required information. Two popular web browsers are Google Chrome and Mozilla Firefox.

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct

Last Answer : 1,2,3 are correct

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv  

Last Answer : a. i and ii

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : What do you need to put your web pages on the www: a) A connection to the internet b) A web browser c) A web server d) All of The Above e) None of The Above

Last Answer : d) All of The Above

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : A ………….. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : D) transkie

Description : What do you need to put your web pages on the www? (A) a connection to internet (B) a web browser (C) a web server (D) all of the above

Last Answer : (D) all of the above

Description : Which one of the following is not a Client-Server application ? (A) Internet chat (B) Web browser (C) E-mail (D) Ping 

Last Answer : (B) Web browser

Description : Web site to link multiple screens through web browser?

Last Answer : Just found it! Junkyard Jumbotron

Description : A website address is a unique name that identifies a specific ___ on the web a) Web browser b) Website c) PDA d) Link e) None of these

Last Answer : a) Web browse

Description : Firefox is a Web server. -Technology

Last Answer : False Firefox is a Web browser.

Description : When you copy a Web page or a file from a server to your local computer, this process is called (a) conferencing (b) downloading -Technology

Last Answer : (b) Because we store information from a server computer to a user computer.

Description : Why is it so important that users passwords to web sites remain in DB in encrypted form?

Last Answer : Because users are idiots and use the same password for everything. If a hacker gets access to the db they’ll know the users email and password and they probably use the same in for everything from fluther to paypal.

Description : The tag used in HTML to link a Web page with other Web page is (a) (b) -Technology

Last Answer : (a) anchor tag is used to create links.

Description : ………. attribute of the tag is used to name a section in a Web page to create an internal link. (a) href (b) name -Technology

Last Answer : (b) name attribute is used to create an internal link.

Description : An ……….. link allows a link to another Web page or another Website. -Technology

Last Answer : An externallink allows a link to another Web page or another Website.

Description : An link............ allows a link to another section on the same or different Web page. -Technology

Last Answer : An linkinternal allows a link to another section on the same or different Web page.

Description : Write the HTML code to generate the following Web page:1. Link color is green, active link color is blue and visited link color is red. -Technology

Last Answer : The HTML code isEat healthy, live healthy KHAO PIYO RESTAURANTCollect Information for .MenusTours Menus available are 1 INDIAN 2 ITALIAN 3 CONTINENTAL 4 THAI < /tab1e> For further queries and reservation

Description : A link used to navigate or open other web pages on a website on internet is called: -Technology

Last Answer : A link used to navigate or open other web pages on a website on internet is calledHyperlink

Description : A link used to navigate or open other web pages on a website on internet is called: -Technology

Last Answer : A link used to navigate or open other web pages on a website on internet is calledHyperlink .

Description : What is the fastest web browser for a PC?

Last Answer : Nothing overall is better than firefox, but I heard Google Chrome is faster.

Description : Name two common graphic files formats that most browser recognize. -Technology

Last Answer : The two common graphic file formats are: .gif and .jpg.

Description : How would you display text in the title bar of a browser? -Technology

Last Answer : To display text in a title bar of a browser, use the tag inside the tag in the HTML document.e.g. HTML document

Description : topmargin is used to specify the distance between the top of the document and top of the browser window. -Technology

Last Answer : True topmargin is an attribute of the tag, which is used to specify the distance between the top of the document and top of the browser window.

Description : How can text be displayed in place of image for users whose browser do not support images? -Technology

Last Answer : The alt attribute of the tag is used to display the text in place of the image for the users whose browser do not support images.

Description : The cellspacing attribute tells the browser how much space to include between the walls of the table. -Technology

Last Answer : False cellspacing attribute is used to create space between different cells in a table.

Description : Which amongst the following is not an example of browser ? (a)Chrome (b)Firefox (c)Avast (d)Edge -Technology

Last Answer : (c)Avast

Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management

Last Answer : Load Balancing