Section 1.2 Flashcards
1
Q
What are the 4 steps taken to check a file for integrity?
A
A hash is created for the original file
then the hash is encrypted using the creator’s private key
the recipient decrypts the hash with the creator’s public key
then a hash function is performed on the received file to compare with the hash from the original file
2
Q
AAA
A
Authentication, Authorization, and Accounting
3
Q
A