Question: . Match the terms with their definitions: 1. Virtual a. A hash encrypted with the creator's private key private network (VPN) 2. Data b. A



. Match the terms with their definitions: 1. Virtual a. A hash encrypted with the creator's private key private network (VPN) 2. Data b. A company that issues pairs of public and private keys and verifies the identity of the owner of those keys loss prevention (DLP) c. A secret mark used to identify proprietary information 3. Digital signature 4. Digital certificate d. An encrypted tunnel used to transmit information securely across the Internet 5. Data e. Replacing real data with fake data masking 6. f. Unauthorized use of facts about another person to commit fraud or other crimes Symmetric encryption 7. Spam g. The process of turning ciphertext into plaintext 8. Plaintext h. Unwanted e-mail 9. Hashing i. A document or file that can be read by anyone who accesses it 10. j. Used to store an entity's public key, often found on websites Ciphertext 11. k. A procedure to filter outgoing traffic to prevent confidential information from leaving Information rights management (IRM) 12. I. A process that transforms a document or file into a fixed-length string of data Certificate authority 13. m. A document or file that must be decrypted to be read Nonrepudiation 14. Digital n. A copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable watermark 15. Asymmetric encryption o. An encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt 16. Key p. An encryption process that uses the same key to both encrypt and decrypt escrow 16. Key p. An encryption process that uses the same key to both encrypt and decrypt escrow q. The inability to unilaterally deny having created a document or file or having agreed to perform a transaction r. Software that limits what actions (read, copy, print, etc.) that users granted access to a file or document can perform
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
