Match each item with a statement below:
A. defined in RFC 821 and amended by RFC 1123
B. ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
C. specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
D. should be used as the first step to address security on mobile devices
E. every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
F. a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
G. the first program to be loaded in the computer during start-up
H. the basis of OS protection
I. a system of interconnected elements
A. SMTP
B. SSL
C. S/MIME
D. Authentication
E. Role-based access control
F. Sarbanes-Oxley Act
G. Operating system
H. Separation
I. Network
You might also like to view...
Describe what application and system security entails.
What will be an ideal response?
____ errors can be caused by an inadequate definition of the problem or an incorrect formula for a calculation.
A. Syntax B. Runtime C. Logic D. Processing
You should always use a(n) ________ program to remove software from your computer
Fill in the blank(s) with correct word
Describe the two physical sizes of DVDs and explain where you will most often find them.
What will be an ideal response?