Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
What is authentication?
Digital signature
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
Because some countries do not allow large encryption keys to be exported
The process of converting data into an unreadable form of text
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
An application that installs hidden services on systems
Because they provide data confidentiality
What is an illicit server?
Digital signature
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
Because some countries do not allow large encryption keys to be exported
The process of converting data into an unreadable form of text
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
An application that installs hidden services on systems
Because they provide data confidentiality
Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
Digital signature
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
Because some countries do not allow large encryption keys to be exported
The process of converting data into an unreadable form of text
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
An application that installs hidden services on systems
Because they provide data confidentiality
The connectivity that makes the Internet possible also makes systems vulnerable to:
Digital signature
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
Because some countries do not allow large encryption keys to be exported
The process of converting data into an unreadable form of text
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
An application that installs hidden services on systems
Because they provide data confidentiality
Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' email messages and restricting their access to certain Websites?
Digital signature
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
Because some countries do not allow large encryption keys to be exported
The process of converting data into an unreadable form of text
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
An application that installs hidden services on systems
Because they provide data confidentiality
What is the term for an electronic stamp that identifies a message's source and contents?
Digital signature
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
Because some countries do not allow large encryption keys to be exported
The process of converting data into an unreadable form of text
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
An application that installs hidden services on systems
Because they provide data confidentiality
What is encryption?
Digital signature
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
Because some countries do not allow large encryption keys to be exported
The process of converting data into an unreadable form of text
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
An application that installs hidden services on systems
Because they provide data confidentiality
Why are firewalls considered the first line of defense against LAN security breaches?
Digital signature
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
unwanted activity.
Because some countries do not allow large encryption keys to be exported
The process of converting data into an unreadable form of text
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
An application that installs hidden services on systems
Because they provide data confidentiality
Check it!