Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Telecommunications Technology
Quiz 13: Information Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
True/False
Does the term key management refer to a password-protected and encrypted file that holds an individual's identification information, including a public key?
Question 62
True/False
Is Kerberos a cross-platform authentication protocol that uses key encryption to verify the identity of clients?
Question 63
True/False
Can you use PGP to verify the authenticity of an e-mail sender?
Question 64
True/False
Does the handshake protocol authenticate the client and server, and establish terms for how they will securely exchange data?
Question 65
Short Answer
A(n) ____________________ should lead to recommendations for improving information security and must precede any of the protective measures described in this chapter.
Question 66
Short Answer
Computer programs that dial multiple telephone numbers in rapid succession, attempting to access and receive a handshake response from a modem, are known as ____________________.
Question 67
Short Answer
In ____________________, data is encrypted using a single key that only the sender and the receiver know.
Question 68
Short Answer
In ____________________ encryption, data is encrypted using two keys.
Question 69
Short Answer
The combination of the public key and private key is known as a(n) ____________________.
Question 70
Short Answer
A(n) ____________________ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
Question 71
Short Answer
____________________ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system.
Question 72
Short Answer
____________________ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
Question 73
Short Answer
The ____________________ protocol authenticates (or introduces) the client and server to each other and establishes terms for how they will securely exchange data.
Question 74
Short Answer
____________________ is the use of a transmission or recording device to capture conversations without the consent of the speakers.
Question 75
Multiple Choice
Match each statement below with the correct item -A security attack in which an outsider obtains internal IP addresses, then uses them to pretend that he or she has authority to access a private network from the Internet.