Match each item with a statement below:
A. when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
B. when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
C. provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
D. identifies a specific entity as the source or origin of a given piece of data
E. traditional technique for detecting if data inadvertently changes during transmission
F. takes the original data, divides it into digits, and encrypts each digit one at a time
G. divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
H. a fixed-size checksum created by cryptographic hash functions
I. the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
A. Snooping
B. Replay attack
C. Entity authentication
D. Data origin authentication
E. Checksum
F. Stream cipher
G. Block cipher
H. Message digest
I. Digital signature algorithm (DSA)
You might also like to view...
The ___________________ is the number of possible values of the digits or characters in a sort key.
a) radix b) asymptote c) thread d) order e) none of the above
If the marketing firm had recommended the use of an analogous color scheme, which of the following might have been in that color scheme?
a. red-orange and blue b. yellow-orange and yellow c. orange and blue-green d. green and red
Describe the differences between TFTP and FTP.
What will be an ideal response?
A(n) ________ data type is an old or outdated data type that is still used, usually because it still works for the user, even though newer technology or more efficient methods exist
Fill in the blank(s) with correct word