Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Which of the following characteristics relates to the term algorithm? |
A set of rules and procedures—usually mathematical in nature—that can define how the encryption and decryption processes operate |
|
Which of the following refers to encoding and decoding information using related but different keys for each process? |
Asymmetric cryptography
|
|
Which term describes programs used to control access to computer resources, enforce policies, audit usage, and provide billing information? |
Authentication, authorization, and accounting (AAA) services |
|
Which term describes the act of working from a home, remote, or mobile location while connecting into the employer’s private network, often using a VPN? |
Telecommuting |
|
Which term describes the seemingly random and unusable output from a cryptographic function applied to original data? |
Ciphertext
|
|
Which of the following characteristics describes an edge router?
|
The last device owned and controlled by an organization before an ISP or telco connection |
|
What is compression?
|
Removal of redundant or superfluous data or space to reduce the size of a data set |
|
Which term describes the process of converting ciphertext back into plain text? |
Decryption
|
|
Which term describes a VPN created between two individual hosts across a local or intermediary network? |
Host-to-host VPN |
|
Which term describes a network, network link, or channel located between the endpoints of a VPN? |
Intermediary network |
|
Which term describes encryption that protects the entire original IP packet’s header and payload? |
Tunnel mode encryption |
|
Which of the following describes a dedicated leased line? |
Allows communication between one site and another |
|
By what mechanism do VPNs securely exchange session keys between endpoints? |
Digital envelope
|
|
A personal firewall is an appliance firewall placed on the border or edge of an organization’s network. |
False
|
|
A private key is kept secret and used only by the intended entity. |
True |
|
A one-way function refers to a mathematical operation performed in one direction; reversing the operation is easy. |
False |
|
Transport mode encryption protects only the original IP packet’s payload, which retains its original IP header. |
True |
|
Hashing verifies data integrity by using algorithms to produce unique numbers from datasets known as hash values. |
True |
|
When too much data crosses a network segment, throughput and latency are increased. |
False
|
|
A split tunnel is a VPN connection that allows simultaneous access to the secured VPN link and unsecured access to the Internet across the same connection. |
True |
|
A VPN appliance can be placed inside and outside the corporate firewall. |
True |
|
Intranet access allows businesses, partners, vendors, suppliers, and so on to gain access to resources. |
False |
|
Symmetric cryptography encodes and decodes information using different keys for each process. |
False |
|
A digital envelope is a secure communication based on public-key cryptography that encodes a message or data with the public key of the intended recipient. |
True |
|
Nonrepudiation ensures that a sender cannot deny sending a message. |
True |
|
asda |
asd |