The operating systems specifically designed to run web servers, such as Linux, Windows Server, or UNIX, providing the necessary environment for web hosting.
Oops!
Check
Okay!
Check
15
Malware
Software specifically designed to cause harm or gain unauthorized access to computer systems, including viruses, worms, and trojans
Oops!
Check
Okay!
Check
baam
Lose 25 points!
Oops!
gold
Win 50 points!
Okay!
gift
Win 20 points!
Okay!
lifesaver
Give 20 points!
Oops!
10
The practices and measures taken to ensure that servers are protected from unauthorized access, cyber-attacks, and other security threats.
Server Security
Oops!
Check
Okay!
Check
10
A protocol used to establish secure encrypted connections between web browsers and servers, ensuring the privacy and integrity of data transferred.
Secure Socket Layer
Oops!
Check
Okay!
Check
lifesaver
Give 15 points!
Oops!
star
Double points!
Okay!
shark
Other team loses 20 points!
Okay!
lifesaver
Give 15 points!
Oops!
15
Hypertext Transfer Protocol (HTTP)
The protocol used for transmitting web pages over the internet, allowing clients (browsers) to request and receive web content from servers.
Oops!
Check
Okay!
Check
lifesaver
Give 10 points!
Oops!
gift
Win 10 points!
Okay!
shark
Other team loses 25 points!
Okay!
baam
Lose 10 points!
Oops!
15
A cryptographic protocol used to secure communications over a computer network, often seen as the successor to SSL for encrypting data transfers.
Transport Layer Security (TLS)
Oops!
Check
Okay!
Check
15
File and Print Server
A server that handles sending, receiving, and storing email messages for users within a network or the internet.
Oops!
Check
Okay!
Check
10
A server designed to host applications, allowing clients to interact with those applications via network protocols like HTTP.
Application Server
Oops!
Check
Okay!
Check
15
Desktop Computer Security
Measures taken to protect desktop computers from threats such as unauthorized access, malware, and data loss.
Oops!
Check
Okay!
Check
15
Password Protection
Methods and technologies used to secure passwords from unauthorized access, including encryption and strong password policies
Oops!
Check
Okay!
Check
trap
No points!
Oops!
star
Double points!
Okay!
gift
Win 25 points!
Okay!
banana
Go to last place!
Oops!
10
Measures to ensure the security of data transmitted over the internet, including protecting Internet Protocol (IP) addresses and ensuring secure connections.
Internet Protocol Security
Oops!
Check
Okay!
Check
10
Ensuring that passwords are not easily guessable or traceable, often through techniques like using complex combinations or encryption