Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/20

Click to flip

20 Cards in this Set

  • Front
  • Back
Because public key enctyption requres the use of two different keys, it is also known as------
asymmetric encryption
--------is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt email data in transmission
PGP
An SSL-------allows the client and server to continue to exchange data securely as long as the client is still connected to the server.
session
-------protocol defines encryption, authentication, and key management for TCP/IP transmissions.
IPSec
--------is a cross platform authentication protocol that uses key encrpytion to verify the identity of clients and to securely exchange information after a client logs onto a system
Kerberos
-------are added to data at the source and verified at the destination.
Checksums
Transport layer protocols break large data units received from the Session layer into multiple smaller units, called----
segments
-------is a method of identifying segments that belong to the same group of subdivided data
sequencing
A specialized device, or a computer installed with specialized software, that selectively filters or blocks traffic between networks.
Firewall
The first public, or asymmetric, key algorithm
Diffie Hellman
a kerberos client or user
principal
Also called an application layer gateway.
Proxy server
consists of four 8-bit octets that can be expressed in either binary or dottet decimal notation.
ip address
Octets that represent host information are set to equal all 1's or in decimal notation 255
broadcast address
usually assigned an IP address that ends with an octet of .1.
internet gateway
a TCP/IP utility similar to nslookup
dig
Separates a network into multiple logically defined segments, or subnets.
subnetting
Identifies each element of a mail message according to content type.
MIME
Requires two network connections: one that connects to the internet and one that connects to the LAN
ICS host
the means by which the bus understands which device to acknoledge
IRQ number