Читайте также:
|
|
A. Authentication
B. Confirmation
C. Processing
D. Timestamping
E. Validation
One of the two keys used in an asymmetric encryption system. For secure communication, the private key should only be known to its creator.
One of the two keys used in an asymmetric encryption system. The public key is made public to be used in conjunction with a corresponding private key.
A public-key encryption algorithm based on exponentiation in modular arithmetic. It is the only algorithm generally accepted as practical and secure for public-key encryption
A. RSA
B. Hill Cipher
C. Caesar Cipher
D. Vigenere Cipher
E. Playfair Cipher
Code embedded within a program that causes a copy of itself to be inserted in one or more other programs. Usually performs some unwanted function.
A. Virus
B. Worm
C. Zombie
D. Firewall
E. All of the statements
A process of identifying, analyzing and controlling critical information.
A. DMZ
B. OPSEC
C. Scanning
D. Firewall
E. Anti-virus
Embedded in a computer program that checks for a certain set of conditions to be present on the system. When these conditions are met, it executes some function resulting in unauthorized actions.
A. OPSEC
B. Virus
C. Logic Bomb
D. Worm
E. Trojan Horse
Дата добавления: 2015-08-18; просмотров: 114 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Match each term according to their meanings in Public-Key Cryptosystem | | | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC |