Question: 9.1 Match the terms with their definitions: 1. Virtual private network (VPN) a. A hash encrypted with the creators private key 2. Data loss prevention
| 9.1 Match the terms with their definitions: 1. Virtual private network (VPN) | a. A hash encrypted with the creators private key |
| 2. Data loss prevention (DLP) | b. A company that issues pairs of public and private keys and verifies the identity of the owner of those keys |
| 3. Digital signature | c. A secret mark used to identify proprietary information |
| 4. Digital certificate | d. An encrypted tunnel used to transmit information securely across the Internet |
| 5. Data masking | e. Replacing real data with fake data |
| 6. Symmetric encryption | f. Unauthorized use of facts about another person to commit fraud or other crimes |
| 7. Spam | g. The process of turning ciphertext into plaintext |
| 8. Plaintext | h. Unwanted e-mail |
| 9. Hashing | i. A document or file that can be read by anyone who accesses it |
| 10. Ciphertext | j. Used to store an entitys public key, often found on websites |
| 11. Information rights management (IRM) | k. A procedure to filter outgoing traffic to prevent confidential information from leaving |
| 12. Certificate authority | l. A process that transforms a document or file into a fixed-length string of data |
| 13. Nonrepudiation | m. A document or file that must be decrypted to be read |
| 14. Digital watermark | n. A copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable |
| 15. Asymmetric encryption | o. An encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt |
| 16. Key escrow | p. An encryption process that uses the same key to both encrypt and decrypt |
| q. The inability to unilaterally deny having created a document or file or having agreed to perform a transaction | |
| r. Software that limits what actions (read, copy, print, etc.) that users granted access to a file or document can perform |
Step by Step Solution
There are 3 Steps involved in it
The question is complete Here is the solution with the terms matched to their definitions 1 Virtual ... View full answer
Get step-by-step solutions from verified subject matter experts
