FUNDAMENTALS OF COMPUTER

WEB BROWSERS TECHNOLOGY

WORLD WIDE WEB

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Ali’s credit card information was leaked after he made a purchase from an online store. There was no secure communications between the store’s web server and Ali’s computer when he made the purchase. Which of the following protocol the store should provide to prevent this from happening again?
A
FTP
B
HTML
C
HTTP
D
HTTPS
Explanation: 

Detailed explanation-1: -A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the internet the way some telemarketers automatically dial random phone numbers.

Detailed explanation-2: -Hacking tools, password descramblers, network sniffers, and port scanners.

Detailed explanation-3: -With stolen data criminals can target company personnel to give sensitive information or to trick them to make payments. Such phishing attacks targeted against a specific individual are called spear-phishing. Criminals can also try to gain access to company networks to spy on them and infect them with malware.

There is 1 question to complete.