• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
which component of physical security addresses outer level access control
perimeter security
what type of fire extingusiher is for electrical fires
type c
assuming asymetric encrytion coded with a value of 5 what would decode it
1/5 they are recipricals of each other
definintion of encryption
exchange of clear text into cypher text
what is decryption
exchange of cypher into clear test
a key available to any host
public ket
key available between two hosts
private key
what is cryptanalysis
act of breaking cypher or attempting to understand cypher text
when is cryptography employed
when settings in which data confidentiality and integrity are desirable
how does cryptography provide non repudiation
the sender cannot refute the fact that he or she did send that info or data
what are some samples of cryptography
tunneling protocals
email security
secure file transfer
secure access to web pages SSL
kerberos authentication
certificates
document security
which type of algorhythm uses a public key
asymetric
does telnet provide encryption functionality
no it transfers all info in clear text