Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
which component of physical security addresses outer level access control
|
perimeter security
|
|
what type of fire extingusiher is for electrical fires
|
type c
|
|
assuming asymetric encrytion coded with a value of 5 what would decode it
|
1/5 they are recipricals of each other
|
|
definintion of encryption
|
exchange of clear text into cypher text
|
|
what is decryption
|
exchange of cypher into clear test
|
|
a key available to any host
|
public ket
|
|
key available between two hosts
|
private key
|
|
what is cryptanalysis
|
act of breaking cypher or attempting to understand cypher text
|
|
when is cryptography employed
|
when settings in which data confidentiality and integrity are desirable
|
|
how does cryptography provide non repudiation
|
the sender cannot refute the fact that he or she did send that info or data
|
|
what are some samples of cryptography
|
tunneling protocals
email security secure file transfer secure access to web pages SSL kerberos authentication certificates document security |
|
which type of algorhythm uses a public key
|
asymetric
|
|
does telnet provide encryption functionality
|
no it transfers all info in clear text
|