Description (TCO 4) Installing unauthorized hardware, such as a communication software and modem, _____. (TCO 4) The art of secret writing that enables an individual to hide the contents of a message from all but the intended recipient is called _____. (TCO 4) The ROT13 cipher is an example of a _____. (TCO 4) Encrypting a message by simply rearranging the order of the letters is a function of the _____. (TCO 4) A special mathematical function that performs one-way encryption is called _____. (TCO 4) The encryption method based on the idea of using a shared key for the encryption and decryption of data is _____. (TCO 4) Why construct and implement a PKI? (TCO 4) What is a certificate repository? (TCO 4) What are the different fields within a digital certificate? (TCO 4) A trust domain is defined as _____.