(TCO 4) Installing unauthorized hardware, such as a communication software and modem, _____.

SEC 280 Principles of Information Systems Security Week 3 Quiz Answers


(TCO 4) Installing unauthorized hardware, such as a communication software and modem, _____.

(TCO 4) The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called _____.

(TCO 4) The ROT13 cipher is an example of a _____.

(TCO 4) Encrypting a message by simply rearranging the order of the letters is a function of the _____.

(TCO 4) A special mathematical function that performs one-way encryption is called _____.

(TCO 4) The encryption method based on the idea of using a shared key for the encryption and decryption of data is _____.

(TCO 4) Why construct and implement a PKI?

(TCO 4) What is a certificate repository?

(TCO 4) What are the different fields within a digital certificate?

(TCO 4) A trust domain is defined as _____.