Match each term with the correct statement below:

A. provides remote access to the Linux shell prompt while encrypting the data being transferred
B. symmetric encryption algorithm with a variable key length up to 448 bits
C. symmetric encryption algorithm; successor to DES
D. one of the components of asymmetric encryption
E. key exchange method used to establish cryptographic keys securely
F. authentication process forming a layer between users and applications
G. a networking protocol that provides centralized authentication, authorization, and accounting
H. algorithm used to compute a checksum
I. extension of the Linux kernel used to provide security policies


A. OpenSSH
B. Blowfish
C. AES
D. Private key
E. Diffie-Helman
F. PAM
G. RADIUS
H. MD5
I. SELinux

Computer Science & Information Technology

You might also like to view...

Which of the following is true about backing up and recovering the VMM environment?

A. you use the VMM administrator console to backup the SQL database B. you use the Failover Cluster Manager to backup the library server C. the VMM server is backed up using the VMM administrator console D. you cannot perform a full server backup to a network folder

Computer Science & Information Technology

To place two nodes node1 and node2 in a HBox p, use ___________.

a. p.add(node1, node2); b. p.addAll(node1, node2); c. p.getChildren().add(node1, node2); d. p.getChildren().addAll(node1, node2);

Computer Science & Information Technology

If you remove a hidden worksheet with the Document Inspector, the data is not lost and you do not have to make a copy of the workbook

Indicate whether the statement is true or false

Computer Science & Information Technology

In Microsoft Exchange, which file is responsible for messages formatted with MAPI?

a. .edb b. .cfg c. .mbx d. .mapi

Computer Science & Information Technology