• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/9

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

9 Cards in this Set

  • Front
  • Back
URI
Uniform Resource Identifier: A standardized method of referring to a resource
URL
Uniform Resource Locator: A text string that specifies an Internet address and the method by which the address can be accessed.
Deep URL
A URL that includes a path past the domain into the folder structure of a Website
Absolute URL
A URL that gives the full path to a resource
Relative URL
A URL that gives an abbreviate path to a resource using the current page as a starting point. Like you are in a page, and the links refers to /contact.html without specifing the full address.
PAP
Password Authentication Protocol: authenticate dial-up connections. encrypted but still vulnerable.
CHAP
Challenge-handshake authentication protocol: is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake. This happens at the time of establishing the initial link, and may happen again at any time afterwards. The verification is based on a shared secret (such as the client user's password).

After the completion of the link establishment phase, the authenticator sends a "challenge" message to the peer.
The peer responds with a value calculated using a one-way hash function, such as an MD5 checksum hash.
The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection.
At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3.
SSL
Secure Sockets Layer: a protocol that provides authentication and encryption, used by most servers for secure exchanges over the Internet.
TLS
Transport Layer Security: Successor of SSL. Public standard.