4.6 Flashcards

1
Q

Data – – – – – – – is most secure when it is stored on voice to protect my firewall anti-malware software and physical security

A

At rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data – – – – to be used yes must be accessible with rings inherent risk

A

Data in US

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This is when Dadtz is most of our normal especially when Dad and Rose leave your own trash in at work is it supposed to multitude of potential gabs intrusion and weak links

A

Tara emotion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

That is a Cryptid using a single key that only the sender and the receiver no. This is also known as symmetric Encryption

A

Private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

There is encrypted with a private Keynote only to the user and his decrypted with a mathematically related public key that can be available through third party source such as a public key server

A

Public key encryption or asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is a small file containing the users verified identification information and users public key

A

Digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital certificates is issued maintained and validated by an organization called

A

Certificate authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Do use certificate authorities to associate pokies was certain users is known as

A

Public-key infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This involves a process of ensuring that a user device or application is who they say they are

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is an encryption protocol suite that defines a rules for encryption authentication and key management for TCP/IP transmissions . It’s an enhancement to IPV4 and it’s native to IPV6. It works at the network layer of the OSI model and add security information to the header

A

Ip Sec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

189

A

189

How well did you know this?
1
Not at all
2
3
4
5
Perfectly