1.
A digital multimedia file available on the Internet to be downloaded is known as ________
2.
Web site that uses encryption techniques to secure its data is known as _______
3.
Program that automatically analyzes all network traffic, assesses system vulnerabilities is known as _____
4.
_________ is a communication technology used by some incoming mail servers.
5.
A cookie that was not created by the website that attempts to access it is known as _____
6.
_______ is a form of computer security hacking in which corrupt DNS data is introduced into the DNS resolver’s cache, causing the name server to return an incorrect IP address.
7.
_______ is a server that acts as an intermediary for requests from clients seeking resources from other servers.
8.
________ is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
9.
_______ is a type of surveillance technology used to monitor and record each keystroke typed on a specific computer’s keyboard.