Match each term with the correct statement below:

A. provides remote access to the Linux shell prompt while encrypting the data being transferred
B. symmetric encryption algorithm with a variable key length up to 448 bits
C. symmetric encryption algorithm; successor to DES
D. one of the components of asymmetric encryption
E. key exchange method used to establish cryptographic keys securely
F. authentication process forming a layer between users and applications
G. a networking protocol that provides centralized authentication, authorization, and accounting
H. algorithm used to compute a checksum
I. extension of the Linux kernel used to provide security policies


A. OpenSSH
B. Blowfish
C. AES
D. Private key
E. Diffie-Helman
F. PAM
G. RADIUS
H. MD5
I. SELinux

Computer Science & Information Technology

You might also like to view...

Telling the C++ compiler that a function is ____ causes a copy of the function code to be placed in the program at the point the function is called.

a. inline b. online c. overloaded d. overline

Computer Science & Information Technology

A view in SharePoint is a special purpose list that is used to store files and information about those files

Indicate whether the statement is true or false

Computer Science & Information Technology

Computational tasks are tasks for which accurate answers need not be found. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Microsoft bundled its ________ browser in Windows 95.

What will be an ideal response?

Computer Science & Information Technology