Match each item with a statement below:

A. defined in RFC 821 and amended by RFC 1123
B. ensures that all of the data communications between a user's computer and the e-mail service provider's computer are encrypted
C. specifies the application/pkcs7-mime (S/MIME-type "enveloped-data") type for data enveloping in e-mail
D. should be used as the first step to address security on mobile devices
E. every user is assigned a job function (role) and access control is then enforced based on the different roles assigned to a user
F. a U.S. law, passed in 2002, to strengthen corporate governance and restore investor confidence
G. the first program to be loaded in the computer during start-up
H. the basis of OS protection
I. a system of interconnected elements


A. SMTP
B. SSL
C. S/MIME
D. Authentication
E. Role-based access control
F. Sarbanes-Oxley Act
G. Operating system
H. Separation
I. Network

Computer Science & Information Technology

You might also like to view...

Describe what application and system security entails.

What will be an ideal response?

Computer Science & Information Technology

____ errors can be caused by an inadequate definition of the problem or an incorrect formula for a calculation.

A. Syntax B. Runtime C. Logic D. Processing

Computer Science & Information Technology

You should always use a(n) ________ program to remove software from your computer

Fill in the blank(s) with correct word

Computer Science & Information Technology

Describe the two physical sizes of DVDs and explain where you will most often find them.

What will be an ideal response?

Computer Science & Information Technology