Question 8
Question 8 of 8

Question image for Q8
Topics Tested

Including: brute-force attack, data interception, distributed denial of service (DDoS) attack, hacking, malware (virus, worm, Trojan horse, spyware, adware, ransomware), pharming, phishing, social engineering. Including: access levels, anti-malware, including anti-virus and anti-spyware, authentication (username and password, biometrics, two-step verification), automating software updates, checking the spelling and tone of communications, checking the URL attached to a link, firewalls, privacy settings, proxy-servers, secure socket layer (SSL) security protocol.

Describe the purpose and operation of hypertext transfer protocol (HTTP) and hypertext transfer protocol secure (HTTPS)