Guest User

Untitled

a guest
Jul 17th, 2018
206
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.88 KB | None | 0 0
  1. 1 Information in its original form is known as ____.
  2. Plaintext
  3. 2 The firewall also hides the ____ of systems behind the application layer firewall.
  4. addresses
  5. 3 Hash function is a _____ way function for creating a checksum from a piece of data.
  6. one
  7. 4 When performing data encryption using public key encryption technique, the _______ key is used.
  8. Public Key
  9. 5 After signing a piece of data using digital signature, the _______ is send together with the data.
  10. signature
  11. 6 In key certification, the certificate contains the ________ and the identity of the owner who created the _______.
  12. public key,private key
  13. 7 A VPN server that is a ____ should be placed in a dedicated DMZ.
  14. Standalone system
  15. 8 Diffie-Helman algorithm is used to create a ______ key.
  16. session
  17. 9 When a CA creates certificates for UserA and UserB, UserA trusts UserB because, UserA has the _______ of _______.
  18. public key of CA
  19. 10 Speed and security are the primary benefits of the ____ system.
  20. Hardware VPN
  21. 11 Application layer firewalls are ____ packages.
  22. software
  23. 12 In packet filtering firewalls, policy rules are enforced through the use of ____ inspection filters.
  24. packet
  25. 13 RSA is an example of ____.
  26. Public key encryption
  27. 14 The ____ algorithm is the standard algorithm for digital signatures.
  28. DSA
  29. 15 In ____ firewalls, Internet accessible systems are located between the firewalls.
  30. Dual
  31. 16 ____ rules are enforced through the use of proxies.
  32. Policy
  33. 17 When signing a piece of data using digital signature, the _______ key is used.
  34. private
  35. 18 The ____ mode of DES uses a previously-generated ciphertext as input to DES.
  36. Cipher Feedback
  37. 19 In order to speed up the process of data encryption and distribute the key, the data is encrypted using _________, and the key is encrypted using _________.
  38. Symmetric, public
  39. 20 ____ are used to pipe traffic along a SSH session.
  40. Tunnel
Add Comment
Please, Sign In to add comment