A server that acts as an intermediary between a client and other servers, caching data to improve performance and providing security by filtering requests.
Oops!
Check
Okay!
Check
10
A protocol used to establish secure encrypted connections between web browsers and servers, ensuring the privacy and integrity of data transferred.
Secure Socket Layer
Oops!
Check
Okay!
Check
banana
Go to last place!
Oops!
magnet
Take 10 points!
Okay!
shark
Other team loses 25 points!
Okay!
baam
Lose 25 points!
Oops!
10
Web-Server Operating Systems
The systems that provide the platform for web servers to run on, often optimized for hosting websites and handling web traffic.
Oops!
Check
Okay!
Check
15
User Account Permissions
The rights or privileges assigned to user accounts, determining what actions users can perform within a system or network, such as read, write, or execute.
Oops!
Check
Okay!
Check
heart
Other team wins 5 points!
Oops!
star
Double points!
Okay!
shark
Other team loses 25 points!
Okay!
thief
Give points!
5
10
15
20
25
10
The specific needs and measures that must be taken to protect systems, data, and networks from unauthorized access or threats
Security Requirements
Oops!
Check
Okay!
Check
10
The practices and measures taken to ensure that servers are protected from unauthorized access, cyber-attacks, and other security threats.
Server Security
Oops!
Check
Okay!
Check
10
A server designed to host applications, allowing clients to interact with those applications via network protocols like HTTP.
Application Server
Oops!
Check
Okay!
Check
10
Ensuring that passwords are not easily guessable or traceable, often through techniques like using complex combinations or encryption
Password Obscurity
Oops!
Check
Okay!
Check
15
Virus Protection
The use of tools and techniques to detect and eliminate viruses from a system, ensuring the integrity and security of data and applications.
Oops!
Check
Okay!
Check
10
A type of malware that infects files or systems by attaching itself to a legitimate program, spreading when the program is executed.
Virus
Oops!
Check
Okay!
Check
10
Measures taken to protect email communications from threats such as phishing, malware, and unauthorized access.
Email Security
Oops!
Check
Okay!
Check
15
Hypertext Transfer Protocol (HTTP)
The protocol used for transmitting web pages over the internet, allowing clients (browsers) to request and receive web content from servers.
Oops!
Check
Okay!
Check
15
Shared Network Resources Protection
The process of securing network resources (such as files, printers, or databases) from unauthorized access or misuse on a shared network.