Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1 Information in its original form is known as ____.
- Plaintext
- 2 The firewall also hides the ____ of systems behind the application layer firewall.
- addresses
- 3 Hash function is a _____ way function for creating a checksum from a piece of data.
- one
- 4 When performing data encryption using public key encryption technique, the _______ key is used.
- Public Key
- 5 After signing a piece of data using digital signature, the _______ is send together with the data.
- signature
- 6 In key certification, the certificate contains the ________ and the identity of the owner who created the _______.
- public key,private key
- 7 A VPN server that is a ____ should be placed in a dedicated DMZ.
- Standalone system
- 8 Diffie-Helman algorithm is used to create a ______ key.
- session
- 9 When a CA creates certificates for UserA and UserB, UserA trusts UserB because, UserA has the _______ of _______.
- public key of CA
- 10 Speed and security are the primary benefits of the ____ system.
- Hardware VPN
- 11 Application layer firewalls are ____ packages.
- software
- 12 In packet filtering firewalls, policy rules are enforced through the use of ____ inspection filters.
- packet
- 13 RSA is an example of ____.
- Public key encryption
- 14 The ____ algorithm is the standard algorithm for digital signatures.
- DSA
- 15 In ____ firewalls, Internet accessible systems are located between the firewalls.
- Dual
- 16 ____ rules are enforced through the use of proxies.
- Policy
- 17 When signing a piece of data using digital signature, the _______ key is used.
- private
- 18 The ____ mode of DES uses a previously-generated ciphertext as input to DES.
- Cipher Feedback
- 19 In order to speed up the process of data encryption and distribute the key, the data is encrypted using _________, and the key is encrypted using _________.
- Symmetric, public
- 20 ____ are used to pipe traffic along a SSH session.
- Tunnel
Add Comment
Please, Sign In to add comment