• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back

Which of the following characteristics relates to the term algorithm?

A set of rules and procedures—usually mathematical in nature—that can define how the encryption and decryption processes operate

Which of the following refers to encoding and decoding information using related but different keys for each process?

Asymmetric cryptography

Which term describes programs used to control access to computer resources, enforce policies, audit usage, and provide billing information?

Authentication, authorization, and accounting (AAA) services

Which term describes the act of working from a home, remote, or mobile location while connecting into the employer’s private network, often using a VPN?

Telecommuting

Which term describes the seemingly random and unusable output from a cryptographic function applied to original data?

Ciphertext
Which of the following characteristics describes an edge router?

The last device owned and controlled by an organization before an ISP or telco connection

What is compression?

Removal of redundant or superfluous data or space to reduce the size of a data set

Which term describes the process of converting ciphertext back into plain text?

Decryption

Which term describes a VPN created between two individual hosts across a local or intermediary network?

Host-to-host VPN

Which term describes a network, network link, or channel located between the endpoints of a VPN?

Intermediary network

Which term describes encryption that protects the entire original IP packet’s header and payload?

Tunnel mode encryption

Which of the following describes a dedicated leased line?

Allows communication between one site and another

By what mechanism do VPNs securely exchange session keys between endpoints?

Digital envelope

A personal firewall is an appliance firewall placed on the border or edge of an organization’s network.

False

A private key is kept secret and used only by the intended entity.

True

A one-way function refers to a mathematical operation performed in one direction; reversing the operation is easy.

False

Transport mode encryption protects only the original IP packet’s payload, which retains its original IP header.

True

Hashing verifies data integrity by using algorithms to produce unique numbers from datasets known as hash values.

True

When too much data crosses a network segment, throughput and latency are increased.

False

A split tunnel is a VPN connection that allows simultaneous access to the secured VPN link and unsecured access to the Internet across the same connection.

True

A VPN appliance can be placed inside and outside the corporate firewall.

True

Intranet access allows businesses, partners, vendors, suppliers, and so on to gain access to resources.

False

Symmetric cryptography encodes and decodes information using different keys for each process.

False

A digital envelope is a secure communication based on public-key cryptography that encodes a message or data with the public key of the intended recipient.

True

Nonrepudiation ensures that a sender cannot deny sending a message.

True

asda

asd