Match each item with a statement below:
A. when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
B. when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
C. provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
D. identifies a specific entity as the source or origin of a given piece of data
E. traditional technique for detecting if data inadvertently changes during transmission
F. takes the original data, divides it into digits, and encrypts each digit one at a time
G. divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
H. a fixed-size checksum created by cryptographic hash functions
I. the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
A. Snooping
B. Replay attack
C. Entity authentication
D. Data origin authentication
E. Checksum
F. Stream cipher
G. Block cipher
H. Message digest
I. Digital signature algorithm (DSA)
You might also like to view...
What does the following comment refer to: “NAT destroys the ability to do host-to-host communication over the Internet”?
What will be an ideal response?
The values stored in arrays should never be constants.
Answer the following statement true (T) or false (F)
What is the order of the four switch states?
a. Listen, block, learn, and forward b. Block, learn, listen, and forward c. Block, listen, learn, and forward d. Block, listen, forward, and learn
The DIR command in Windows 10 is similar to the __________ command in CentOS 7.
find more file ls