Internet Services & Email and The World Wide Web
- Describe how a phishing attack works. Explain the role of the spam email, domain name, and website in the phishing attack
- Identify and describe the four basic techniques for arranging an enterprise’s Internet point of presence.
- Explain how the Web browser authenticates a server that uses SSL. What is the impact on business and our social lives?
- Explain the operation of server-side scripts and client-side scripts. How are they the same? How are they different?