SEC 280 Week 3 Quiz (Devry)
|
(TCO 4) Installing unauthorized hardware, such as a communication software and modem, _____.
|
|
|
(TCO 4) The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called _____.
|
|
|
(TCO 4) The ROT13 cipher is an example of a _____.
|
|
|
(TCO 4) Encrypting a message by simply rearranging the order of the letters is a function of the _____.
|
|
|
(TCO 4) A special mathematical function that performs one-way encryption is called _____.
|
|
|
(TCO 4) The encryption method based on the idea of using a shared key for the encryption and decryption of data is _____.
|
|
|
(TCO 4) Why construct and implement a PKI?
|
|
|
(TCO 4) What is a certificate repository?
|
|
|
(TCO 4) What are the different fields within a digital certificate?
|
|
|
(TCO 4) A trust domain is defined as _____.
|
|
No comments:
Post a Comment