Match each term with the correct statement below:
A. provides remote access to the Linux shell prompt while encrypting the data being transferred
B. symmetric encryption algorithm with a variable key length up to 448 bits
C. symmetric encryption algorithm; successor to DES
D. one of the components of asymmetric encryption
E. key exchange method used to establish cryptographic keys securely
F. authentication process forming a layer between users and applications
G. a networking protocol that provides centralized authentication, authorization, and accounting
H. algorithm used to compute a checksum
I. extension of the Linux kernel used to provide security policies
A. OpenSSH
B. Blowfish
C. AES
D. Private key
E. Diffie-Helman
F. PAM
G. RADIUS
H. MD5
I. SELinux
You might also like to view...
Telling the C++ compiler that a function is ____ causes a copy of the function code to be placed in the program at the point the function is called.
a. inline b. online c. overloaded d. overline
A view in SharePoint is a special purpose list that is used to store files and information about those files
Indicate whether the statement is true or false
Computational tasks are tasks for which accurate answers need not be found. _________________________
Answer the following statement true (T) or false (F)
Microsoft bundled its ________ browser in Windows 95.
What will be an ideal response?