Question: Match each term with the correct statement below. a . NAT b . VLAN f . Remote access c . Bascline g . PAT d

Match each term with the correct statement below.
a. NAT
b. VLAN
f. Remote access
c. Bascline
g. PAT
d. DMZ
h. HIDS
e. OSI model
i. Subnet addressing
77. Used to classify standard network devices based ce their function
78. A reference set of data agains which opeatival dra is compared
79. A software-based appliction that runs on a lscal hest cemputer that can detect an attack as it occurs
80. Each outgoing padket is giver a dfferer IP adatres
81. Each packet is given the same IP aldres lout a dfferer TCP port number.
82. Functions as a sqarate network that rets matside the secure network perimete
83. Allows an IP address to be spits amphere wathin ts 12 bits
84. Segmenting a network by separating devices into logical gr oups
85. Refers to any combination of hardware and sethware that mables remote users to access a local internal network
Match each term with the corred statement below.
a. Cleartext
EFS
b. Ciphertext
g. Steganography
c. Cryptography
h. Decryption
d. PGP
i. GPG
c. Key
The science of transforming information into a secure form so that it can be transmitted or stored and unauthorized persons cannot access it
Takes data, divides it into smaller sections, and hides it in unused portions of a file
Data that is in an unenorypted form
To change the secret message back to its original form
A mathematical value entered into the algorithm to produce ciphertert
Text that is "scrambled"
Versions run on Windows, UNIX, and Linux operating systems
Uses RSA for protecting digital signatures and 3DES or IDEA for symmetric encryption
A cryptography system for Windows operating systems that use the Windows NIFS file system.
7
Match each term with the correct statement below.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!