Section 1.2 Flashcards

1
Q

What are the 4 steps taken to check a file for integrity?

A

A hash is created for the original file

then the hash is encrypted using the creator’s private key

the recipient decrypts the hash with the creator’s public key

then a hash function is performed on the received file to compare with the hash from the original file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AAA

A

Authentication, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly