Answered step by step
Verified Expert Solution
Question
1 Approved Answer
9.1 Match the terms with their definitions: 1. Virtual private network (VPN) a. A hash encrypted with the creators private key 2. Data loss prevention
9.1 Match the terms with their definitions: 1. Virtual private network (VPN) | a. A hash encrypted with the creators private key |
2. Data loss prevention (DLP) | b. A company that issues pairs of public and private keys and verifies the identity of the owner of those keys |
3. Digital signature | c. A secret mark used to identify proprietary information |
4. Digital certificate | d. An encrypted tunnel used to transmit information securely across the Internet |
5. Data masking | e. Replacing real data with fake data |
6. Symmetric encryption | f. Unauthorized use of facts about another person to commit fraud or other crimes |
7. Spam | g. The process of turning ciphertext into plaintext |
8. Plaintext | h. Unwanted e-mail |
9. Hashing | i. A document or file that can be read by anyone who accesses it |
10. Ciphertext | j. Used to store an entitys public key, often found on websites |
11. Information rights management (IRM) | k. A procedure to filter outgoing traffic to prevent confidential information from leaving |
12. Certificate authority | l. A process that transforms a document or file into a fixed-length string of data |
13. Nonrepudiation | m. A document or file that must be decrypted to be read |
14. Digital watermark | n. A copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable |
15. Asymmetric encryption | o. An encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt |
16. Key escrow | p. An encryption process that uses the same key to both encrypt and decrypt |
q. The inability to unilaterally deny having created a document or file or having agreed to perform a transaction | |
r. Software that limits what actions (read, copy, print, etc.) that users granted access to a file or document can perform |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started