Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

9.1 Match the terms with their definitions: 1. Virtual private network (VPN) a. A hash encrypted with the creators private key 2. Data loss prevention

9.1 Match the terms with their definitions:

1. Virtual private network (VPN)

a. A hash encrypted with the creators private key
2. Data loss prevention (DLP) b. A company that issues pairs of public and private keys and verifies the identity of the owner of those keys
3. Digital signature c. A secret mark used to identify proprietary information
4. Digital certificate d. An encrypted tunnel used to transmit information securely across the Internet
5. Data masking e. Replacing real data with fake data
6. Symmetric encryption f. Unauthorized use of facts about another person to commit fraud or other crimes
7. Spam g. The process of turning ciphertext into plaintext
8. Plaintext h. Unwanted e-mail
9. Hashing i. A document or file that can be read by anyone who accesses it
10. Ciphertext j. Used to store an entitys public key, often found on websites
11. Information rights management (IRM) k. A procedure to filter outgoing traffic to prevent confidential information from leaving
12. Certificate authority l. A process that transforms a document or file into a fixed-length string of data
13. Nonrepudiation m. A document or file that must be decrypted to be read
14. Digital watermark n. A copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable
15. Asymmetric encryption o. An encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt
16. Key escrow p. An encryption process that uses the same key to both encrypt and decrypt
q. The inability to unilaterally deny having created a document or file or having agreed to perform a transaction
r. Software that limits what actions (read, copy, print, etc.) that users granted access to a file or document can perform

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Sustainable Fashion Supply Chain Management

Authors: Tsan Ming Choi, T C Edwin Cheng

1st Edition

3319127020, 978-3319127026

More Books

Students also viewed these General Management questions

Question

What is the cross-price elasticity of demand?

Answered: 1 week ago