To use public/private keys for authentication, you must first generate a pair of RSA or Digital Signature Algorithm (DSA) keys with a tool such as ____________________.
Fill in the blank(s) with the appropriate word(s).
PuTTYgen
You might also like to view...
To counter attacks such as CCAs, RSA Security, Inc. recommends modifying the plaintext using a procedure known as ___________ .
Fill in the blank(s) with the appropriate word(s).
To share files with other users of the same computer using Apple OS X, you would place them in the ________ folder
A) Community B) Common C) Shared D) Public
The ____________________ notation indicates that a person(s) is receiving a copy of the letter without the addressee's knowledge.
Fill in the blank(s) with the appropriate word(s).
A URL consists of a ____, a domain name, sometimes the path to a specific Web page or location in a Web page, and the Web page name.
A. protocol B. format C. storage D. B2C